<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2018/06/russias-seat-at-trump-kim-summit-was-covert/</loc>
		<lastmod>2020-03-04T05:12:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Trump-Kim-Summit.jpg</image:loc>
			<image:title><![CDATA[Trump-Kim-Summit]]></image:title>
			<image:caption><![CDATA[Russia’s Seat at Trump-Kim]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/big-brother-chinas-social-credit-score/</loc>
		<lastmod>2020-03-04T05:13:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Social-Credit-Score.jpg</image:loc>
			<image:title><![CDATA[Social-Credit-Score]]></image:title>
			<image:caption><![CDATA[China’s Social Credit Score]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-prepare-for-a-data-breach-under-gdpr/</loc>
		<lastmod>2020-03-04T05:13:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/GDPR-Data-Breach.jpg</image:loc>
			<image:title><![CDATA[GDPR-Data-Breach]]></image:title>
			<image:caption><![CDATA[Data Breach Under GDPR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-flaws-allow-attackers-to-hijack-400-axis-camera-models/</loc>
		<lastmod>2020-03-04T05:13:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Application-Exceeds-Brief.jpg</image:loc>
			<image:title><![CDATA[Application-Exceeds-Brief]]></image:title>
			<image:caption><![CDATA[Application Exceeds its Brief]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/your-go-to-source-for-unnecessary-cyber-terror-alerts-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:13:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Stock-photo-of-shocked-man-Storyblocks.jpg</image:loc>
			<image:title><![CDATA[Surprised young man looking at the camera over white background]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1.jpg</image:loc>
			<image:caption><![CDATA[CISO/Security Vendor Relationship Podcast]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-boulevards-5-most-read-stories-for-the-week-june-11-15/</loc>
		<lastmod>2020-03-04T05:13:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/top-4-ways-to-find-the-next-generation-of-cybersecurity-talent/</loc>
		<lastmod>2020-03-04T05:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Next-Gen-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[TLS fingerprinting]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/intel-faces-yet-another-speculative-execution-flaw-in-its-cpus/</loc>
		<lastmod>2020-03-04T05:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto7716607.jpg</image:loc>
			<image:title><![CDATA[canstockphoto7716607]]></image:title>
			<image:caption><![CDATA[Intel Releases Microcode Spectre Patches]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/language-matters-when-it-comes-to-data-breach/</loc>
		<lastmod>2020-03-04T05:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Language-Matters.jpg</image:loc>
			<image:title><![CDATA[Language-Matters]]></image:title>
			<image:caption><![CDATA[Language Matters Data Breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/multipurpose-trojan-mysterybot-targets-android-devices/</loc>
		<lastmod>2020-03-04T05:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto33014599.jpg</image:loc>
			<image:title><![CDATA[canstockphoto33014599]]></image:title>
			<image:caption><![CDATA[Vollgar botnet]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/why-the-double-standard-of-reporting-breaches/</loc>
		<lastmod>2020-03-04T05:13:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Reporting-Breaches.jpg</image:loc>
			<image:title><![CDATA[Reporting-Breaches]]></image:title>
			<image:caption><![CDATA[Double Standard of Reporting Breaches]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cisos-dont-care-about-your-funny-sales-pitch-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:13:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/CISOSecurityVendorPodcast.jpg</image:loc>
			<image:title><![CDATA[Funny portraits]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1.jpg</image:loc>
			<image:caption><![CDATA[CISO/Security Vendor Relationship Podcast]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-kill-chain-model-works-when-analysts-see-the-full-picture/</loc>
		<lastmod>2020-03-04T05:13:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Kill-Chain-Model.jpg</image:loc>
			<image:title><![CDATA[Kill-Chain-Model]]></image:title>
			<image:caption><![CDATA[The Kill Chain Model]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/microsoft-fixes-11-critical-flaws-readies-patches-for-spectre-variant-4/</loc>
		<lastmod>2020-03-04T05:13:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/banks-highly-vulnerable-to-inside-attacks/</loc>
		<lastmod>2020-03-04T05:13:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Vulnerable-Banks.jpg</image:loc>
			<image:caption><![CDATA[Endpoint security financial services]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-boulevards-5-most-read-stories-for-the-week-june-4-8/</loc>
		<lastmod>2020-03-04T05:13:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/risk-of-the-unsecured-presidential-phone/</loc>
		<lastmod>2020-03-04T05:13:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SupplyChain-1.jpg</image:loc>
			<image:caption><![CDATA[Hamas]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/study-more-than-5-percent-of-monero-cryptocurrency-was-mined-by-malware/</loc>
		<lastmod>2020-03-04T05:13:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Stealing-Infrastructure.jpg</image:loc>
			<image:title><![CDATA[Stealing-Infrastructure]]></image:title>
			<image:caption><![CDATA[coinbit]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/flash-update-fixes-zero-day-flaw-used-in-targeted-attack/</loc>
		<lastmod>2020-03-04T05:13:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto40724714.jpg</image:loc>
			<image:title><![CDATA[canstockphoto40724714]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-espionage-of-former-cia-case-officer-jerry-chun-shing-lee-for-china/</loc>
		<lastmod>2020-03-04T05:13:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Espionage-CIA.jpg</image:loc>
			<image:title><![CDATA[Espionage-CIA]]></image:title>
			<image:caption><![CDATA[Espionage of Former CIA Case Officer]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cisco-patches-critical-flaws-in-ios-xe-and-prime-collaboration-provisioning/</loc>
		<lastmod>2020-03-04T05:13:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto7243964.jpg</image:loc>
			<image:title><![CDATA[canstockphoto7243964]]></image:title>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/modernized-industrial-systems-still-at-pre-internet-vulnerability-levels/</loc>
		<lastmod>2020-03-04T05:13:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Modernized-Industrial.jpg</image:loc>
			<image:caption><![CDATA[zero trust]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/microsoft-github-and-the-age-of-collaboration-now-we-stand/</loc>
		<lastmod>2020-03-04T05:13:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Age-Of-Collaboration.jpg</image:loc>
			<image:title><![CDATA[Age-Of-Collaboration]]></image:title>
			<image:caption><![CDATA[HR data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-mistakes-that-could-cripple-the-network/</loc>
		<lastmod>2020-03-04T05:13:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Security-Mistakes.jpg</image:loc>
			<image:title><![CDATA[danger]]></image:title>
			<image:caption><![CDATA[breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/zip-slip-vulnerability-affecting-thousands-of-apps-puts-systems-at-risk/</loc>
		<lastmod>2020-03-04T05:13:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto20764094.jpg</image:loc>
			<image:title><![CDATA[web insecurities]]></image:title>
			<image:caption><![CDATA[web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/rethinking-cybersecurity-its-all-about-the-data-not-the-malware/</loc>
		<lastmod>2020-03-04T05:13:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Rethinking-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[data leakage]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/vpnfilter-targets-more-devices-than-initially-reported/</loc>
		<lastmod>2020-03-04T05:13:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto512540.jpg</image:loc>
			<image:title><![CDATA[canstockphoto512540]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-healthy-is-your-mobile-fitness-app-7-common-security-vulnerabilities/</loc>
		<lastmod>2020-03-04T05:13:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Mobile-Fitness-App.jpg</image:loc>
			<image:title><![CDATA[Mobile-Fitness-App]]></image:title>
			<image:caption><![CDATA[Mobile Fitness App Vulnerabilities]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/quantum-research-puts-expiration-date-on-modern-cryptography-methods/</loc>
		<lastmod>2020-03-04T05:13:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Quantum-Research.jpg</image:loc>
			<image:caption><![CDATA[defense in depth]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-vendors-buy-their-first-pack-of-condoms-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:13:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/drugs-1914587_1280.jpg</image:loc>
			<image:title><![CDATA[drugs-1914587_1280]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1.jpg</image:loc>
			<image:caption><![CDATA[CISO/Security Vendor Relationship Podcast]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-boulevards-5-most-read-stories-for-the-week-may-28-jun-1/</loc>
		<lastmod>2020-03-04T05:13:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/panera-bread-dos-and-donts-of-data-breach-crisis-management/</loc>
		<lastmod>2020-03-04T05:13:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Panera-Bread-Breach.jpg</image:loc>
			<image:title><![CDATA[Panera-Bread-Breach]]></image:title>
			<image:caption><![CDATA[Panera Bread Data Breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/vpnfilter-continues-to-target-devices-in-ukraine/</loc>
		<lastmod>2020-03-04T05:13:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Fileless-Malware.jpg</image:loc>
			<image:caption><![CDATA[virus]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/employee-security-training-if-you-train-them-they-will-comply/</loc>
		<lastmod>2020-03-04T05:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Employee-Security-Training.jpg</image:loc>
			<image:title><![CDATA[Employee-Security-Training]]></image:title>
			<image:caption><![CDATA[Employee Security Training]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/are-departing-employees-taking-your-data-with-them/</loc>
		<lastmod>2020-03-04T05:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Departing-Employees.jpg</image:loc>
			<image:title><![CDATA[Departing-Employees]]></image:title>
			<image:caption><![CDATA[ISO/IEC 27001]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/rig-exploit-kit-starts-using-ie-zero-day-flaw-patched-in-may/</loc>
		<lastmod>2020-03-04T05:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto36381683.jpg</image:loc>
			<image:title><![CDATA[canstockphoto36381683]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/organizations-are-overlooking-mobile-devices-for-gdpr-compliance/</loc>
		<lastmod>2020-03-04T05:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Mobile-Devices.jpg</image:loc>
			<image:title><![CDATA[Mobile-Devices]]></image:title>
			<image:caption><![CDATA[Mobile Devices for GDPR Compliance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/good-leadership-results-in-better-security-practices-james-comeys-keynote-address-to-opentext-enfuse-2018/</loc>
		<lastmod>2020-03-04T05:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/encryption.jpg</image:loc>
			<image:title><![CDATA[encryption]]></image:title>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/1280px-James_Comey_official_portrait.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/introducing-the-ciso-security-vendor-relationship-podcast-with-mike-johnson-and-david-spark/</loc>
		<lastmod>2020-03-04T05:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/CISOPodcast.jpg</image:loc>
			<image:title><![CDATA[CISOPodcast]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1.jpg</image:loc>
			<image:caption><![CDATA[CISO/Security Vendor Relationship Podcast]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/protecting-your-privileged-user-accounts/</loc>
		<lastmod>2020-03-04T05:13:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/User-Accounts.jpg</image:loc>
			<image:title><![CDATA[User-Accounts]]></image:title>
			<image:caption><![CDATA[Protecting Your Privileged User Accounts]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/git-vulnerability-leads-to-remote-code-execution/</loc>
		<lastmod>2020-03-04T05:13:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto47950254-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto47950254]]></image:title>
			<image:caption><![CDATA[security testing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/router-attack-users-should-reset-routers-to-factory-default-not-just-reboot/</loc>
		<lastmod>2020-03-04T05:13:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto21888336.jpg</image:loc>
			<image:title><![CDATA[canstockphoto21888336]]></image:title>
			<image:caption><![CDATA[Unpatched Vulnerability Exposes WordPress]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/pulling-the-rug-out-on-ddos-carpet-bombers/</loc>
		<lastmod>2020-03-04T05:13:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/DDoS-Carpet-Bombers.jpg</image:loc>
			<image:title><![CDATA[DDoS-Carpet-Bombers]]></image:title>
			<image:caption><![CDATA[DDoS Carpet Bombers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bringing-sanity-and-clarity-to-ssh-management-for-stronger-security/</loc>
		<lastmod>2020-03-04T05:13:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/SSH-Management.jpg</image:loc>
			<image:title><![CDATA[SSH-Management]]></image:title>
			<image:caption><![CDATA[SSH Management for Stronger Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/new-tariffs-expected-to-increase-hacks-on-intellectual-property/</loc>
		<lastmod>2020-03-04T05:13:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Tariffs-Increase-Hacks.jpg</image:loc>
			<image:caption><![CDATA[hybrid SOC]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/incompetent-intelligence-the-case-of-black-cube/</loc>
		<lastmod>2020-03-04T05:13:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Incompetent-Intelligence.jpg</image:loc>
			<image:title><![CDATA[Incompetent-Intelligence]]></image:title>
			<image:caption><![CDATA[The Case of Black Cube]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hacker-group-targeting-industrial-controllers-expands-its-operations/</loc>
		<lastmod>2020-03-04T05:13:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Cyberwar2.jpg</image:loc>
			<image:title><![CDATA[Cyberwar2]]></image:title>
			<image:caption><![CDATA[Adobe Fixes Flash Player]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/z-wave-iot-devices-vulnerable-to-security-downgrade-attack/</loc>
		<lastmod>2020-03-04T05:13:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto37869733.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37869733]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/allegory-of-the-synthetic-data-cave/</loc>
		<lastmod>2020-03-04T05:13:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Synthetic-Data-Cave.jpg</image:loc>
			<image:title><![CDATA[Synthetic-Data-Cave]]></image:title>
			<image:caption><![CDATA[Synthetic Data Cave]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cpu-os-makers-coordinate-to-fix-new-spectre-vulnerability/</loc>
		<lastmod>2020-03-04T05:13:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto33014599.jpg</image:loc>
			<image:title><![CDATA[canstockphoto33014599]]></image:title>
			<image:caption><![CDATA[Vollgar botnet]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-threat-actors-try-to-overwhelm-the-defenses-of-ad-networks/</loc>
		<lastmod>2020-03-04T05:13:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Ad-Networks.jpg</image:loc>
			<image:title><![CDATA[Ad-Networks]]></image:title>
			<image:caption><![CDATA[Defenses of Ad Networks]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/adserverspic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/adserverspic2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/adserverspic3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/adserverspic4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/adserverspic5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/adserverspic6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/adserverspic7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qa-sailpoint-ceo-mark-mcclean-discusses-enterprise-identity/</loc>
		<lastmod>2020-03-04T05:13:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Enterprise-Identity.jpg</image:loc>
			<image:title><![CDATA[Enterprise-Identity]]></image:title>
			<image:caption><![CDATA[Mark McClain Discusses Enterprise Identity]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/McClain_Mark.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/nation-state-actor-builds-massive-army-of-compromised-routers/</loc>
		<lastmod>2020-03-04T05:13:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto29297811.jpg</image:loc>
			<image:title><![CDATA[canstockphoto29297811]]></image:title>
			<image:caption><![CDATA[Spyware Skygofree Targets Android]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/chrome-will-drop-the-secure-connection-indicator-later-this-year/</loc>
		<lastmod>2020-03-04T05:13:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/https.jpg</image:loc>
			<image:title><![CDATA[https]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-boulevards-5-most-read-stories-for-the-week-may-14-may-18/</loc>
		<lastmod>2020-03-04T05:13:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/agro-espionage-how-china-tried-to-steal-u-s-rice-research/</loc>
		<lastmod>2020-03-04T05:13:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Rice-Research.jpg</image:loc>
			<image:title><![CDATA[Rice-Research]]></image:title>
			<image:caption><![CDATA[China Steals U.S. Rice Research]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/whois-is-changing-analyst-impact/</loc>
		<lastmod>2020-03-04T05:13:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/WHOIS.jpg</image:loc>
			<image:title><![CDATA[WHOIS]]></image:title>
			<image:caption><![CDATA[WHOIS is Changing]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/WHOISpic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/WHOISpic2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/WHOISpic3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/WHOISpic4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-do-self-driving-cars-have-to-do-with-machine-learning-for-cybersecurity/</loc>
		<lastmod>2020-03-04T05:13:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Self-Driving-Cars.jpg</image:loc>
			<image:title><![CDATA[Self-Driving-Cars]]></image:title>
			<image:caption><![CDATA[Machine Learning for Cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/6-practical-steps-to-implement-devsecops-in-the-cloud/</loc>
		<lastmod>2020-03-04T05:13:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/DevSecOps-Cloud.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-Cloud]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/making-a-big-impact-with-a-small-security-budget/</loc>
		<lastmod>2020-03-04T05:13:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Small-Security-Budget.jpg</image:loc>
			<image:title><![CDATA[Small-Security-Budget]]></image:title>
			<image:caption><![CDATA[Small Security Budget]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/10-percent-of-ios-apps-have-a-data-compromising-vulnerability/</loc>
		<lastmod>2020-03-04T05:13:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto50016839.jpg</image:loc>
			<image:title><![CDATA[canstockphoto50016839]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/vpns-arent-dead-they-just-need-to-evolve/</loc>
		<lastmod>2020-03-04T05:13:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/VPNs-Arent-Dead.jpg</image:loc>
			<image:title><![CDATA[VPNs-Arent-Dead]]></image:title>
			<image:caption><![CDATA[VPNs Aren’t Dead]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/3-most-common-and-risky-insider-security-behaviors/</loc>
		<lastmod>2020-03-04T05:13:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Insider-Security.jpg</image:loc>
			<image:title><![CDATA[Insider-Security]]></image:title>
			<image:caption><![CDATA[Risky Insider Security Behaviors]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hackers-start-using-hard-to-block-ddos-amplification-technique/</loc>
		<lastmod>2020-03-04T05:13:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Extremist.jpg</image:loc>
			<image:caption><![CDATA[brute-force]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-boulevards-5-most-read-stories-for-the-week-may-7-may-11/</loc>
		<lastmod>2020-03-04T05:13:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/password-apathy-time-to-rethink-security/</loc>
		<lastmod>2020-03-04T05:13:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Password-Apathy.jpg</image:loc>
			<image:caption><![CDATA[password]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/leaked-point-of-sale-malware-source-code-could-fuel-new-variants/</loc>
		<lastmod>2020-03-04T05:13:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/canstockphoto52488256.jpg</image:loc>
			<image:title><![CDATA[canstockphoto52488256]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-gdpr-affects-iam-usage/</loc>
		<lastmod>2020-03-04T05:13:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/IAM-Usage.jpg</image:loc>
			<image:title><![CDATA[IAM-Usage]]></image:title>
			<image:caption><![CDATA[GDPR Affects IAM Usage]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/adobe-patches-zero-day-vulnerability-in-acrobat-reader/</loc>
		<lastmod>2020-03-04T05:13:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Email-Compromised.jpg</image:loc>
			<image:title><![CDATA[Email-Compromised]]></image:title>
			<image:caption><![CDATA[Safeguard Email Compromised Attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/researchers-warn-of-serious-flaws-in-pgp-and-s-mime-email-encryption/</loc>
		<lastmod>2020-03-04T05:13:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto1806067.jpg</image:loc>
			<image:title><![CDATA[canstockphoto1806067]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ransomware-uses-process-hiding-technique-to-evade-antivirus/</loc>
		<lastmod>2020-03-04T05:13:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto16040110.jpg</image:loc>
			<image:title><![CDATA[canstockphoto16040110]]></image:title>
			<image:caption><![CDATA[corporate networks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/microsoft-patches-two-actively-exploited-zero-day-vulnerabilities/</loc>
		<lastmod>2020-03-04T05:13:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto33014599.jpg</image:loc>
			<image:title><![CDATA[canstockphoto33014599]]></image:title>
			<image:caption><![CDATA[Vollgar botnet]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/detecting-bad-actors-early-in-the-kill-chain/</loc>
		<lastmod>2020-03-04T05:13:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Kill-Chain.jpg</image:loc>
			<image:title><![CDATA[Kill-Chain]]></image:title>
			<image:caption><![CDATA[Early in the Kill Chain]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tech-companies-make-vow-against-participation-in-government-sponsored-cyberattacks/</loc>
		<lastmod>2020-03-04T05:13:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Tech-Companies.jpg</image:loc>
			<image:title><![CDATA[Tech-Companies]]></image:title>
			<image:caption><![CDATA[Government-Sponsored Cyberattacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/7-scary-stats-about-gdpr-noncompliance/</loc>
		<lastmod>2020-03-04T05:13:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/GDPR-Noncompliance.jpg</image:loc>
			<image:title><![CDATA[GDPR-Noncompliance]]></image:title>
			<image:caption><![CDATA[Stats About GDPR Noncompliance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tips-for-using-iam-in-a-gig-economy/</loc>
		<lastmod>2020-03-04T05:13:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Gig-Economy.jpg</image:loc>
			<image:title><![CDATA[Gig-Economy]]></image:title>
			<image:caption><![CDATA[IAM in a Gig Economy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-boulevards-5-most-read-stories-for-the-week-april-30-may-4/</loc>
		<lastmod>2020-03-04T05:13:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/all-is-fair-in-love-and-war-except-when-swiping-right/</loc>
		<lastmod>2020-03-04T05:13:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Love-and-War.jpg</image:loc>
			<image:title><![CDATA[Love-and-War]]></image:title>
			<image:caption><![CDATA[Fair in Love and War]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/implementing-the-zero-trust-model/</loc>
		<lastmod>2020-03-04T05:13:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Zero-Trust.jpg</image:loc>
			<image:title><![CDATA[Zero-Trust]]></image:title>
			<image:caption><![CDATA[Implementing Zero Trust Model]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-3-ways-of-devsecops-part-1/</loc>
		<lastmod>2020-03-04T05:13:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Ways-of-DevSecOps.jpg</image:loc>
			<image:title><![CDATA[Ways-of-DevSecOps]]></image:title>
			<image:caption><![CDATA[Ways of DevSecOps]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Infographic1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hackers-start-exploiting-recently-found-flaws-in-gpon-routers/</loc>
		<lastmod>2020-03-04T05:13:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto34390927-800x450.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34390927-800x450]]></image:title>
			<image:caption><![CDATA[insider threat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cyberespionage-group-abuses-lojack-theft-recovery-software/</loc>
		<lastmod>2020-03-04T05:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto39874704.jpg</image:loc>
			<image:title><![CDATA[canstockphoto39874704]]></image:title>
			<image:caption><![CDATA[fileless malware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/patch-for-critical-oracle-weblogic-vulnerability-can-be-bypassed/</loc>
		<lastmod>2020-03-04T05:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Phishing2.jpg</image:loc>
			<image:title><![CDATA[Phishing2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-fileless-malware-will-continue-its-rapid-expansion/</loc>
		<lastmod>2020-03-04T05:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Fileless-Malware.jpg</image:loc>
			<image:caption><![CDATA[virus]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/spam-bots-and-fake-accounts-helping-solve-the-security-identity-crisis/</loc>
		<lastmod>2020-03-04T05:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Spam-Bots.jpg</image:loc>
			<image:title><![CDATA[Spam-Bots]]></image:title>
			<image:caption><![CDATA[Spam Bots and Fake Accounts]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cryptomining-worm-massminer-exploits-multiple-vulnerabilities/</loc>
		<lastmod>2020-03-04T05:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Stealing-Infrastructure.jpg</image:loc>
			<image:title><![CDATA[Stealing-Infrastructure]]></image:title>
			<image:caption><![CDATA[coinbit]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-boulevards-5-most-read-stories-for-the-week-april-23-27/</loc>
		<lastmod>2020-03-04T05:13:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/securing-the-network-and-your-organizations-future-with-a-soc/</loc>
		<lastmod>2020-03-04T05:13:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Organizations-Future.jpg</image:loc>
			<image:title><![CDATA[Organizations-Future]]></image:title>
			<image:caption><![CDATA[Securing the Network]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/large-necurs-botnet-uses-new-spam-detection-evasion-trick/</loc>
		<lastmod>2020-03-04T05:13:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42371749.jpg</image:loc>
			<image:caption><![CDATA[spear phishing attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ca-technologies-yann-guernion-talks-gdpr-and-automation/</loc>
		<lastmod>2020-03-04T05:13:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/GDPR-Automation.jpg</image:loc>
			<image:title><![CDATA[GDPR-Automation]]></image:title>
			<image:caption><![CDATA[data privacy]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/YannGuernion.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/offensive-security-enabling-ethical-hackers-to-disclose-flaws-without-consequence/</loc>
		<lastmod>2020-03-04T05:13:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Offensive-Security.jpg</image:loc>
			<image:title><![CDATA[Offensive-Security]]></image:title>
			<image:caption><![CDATA[Offensive Security Hacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/many-sap-deployments-at-risk-due-to-insecure-configuration/</loc>
		<lastmod>2020-03-04T05:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/NIST.jpg</image:loc>
			<image:title><![CDATA[NIST]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/police-shuts-down-largest-ddos-for-hire-marketplace/</loc>
		<lastmod>2020-03-04T05:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Defense.jpg</image:loc>
			<image:title><![CDATA[Defense]]></image:title>
			<image:caption><![CDATA[Akamai]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/when-the-application-exceeds-its-brief/</loc>
		<lastmod>2020-03-04T05:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Application-Exceeds-Brief.jpg</image:loc>
			<image:title><![CDATA[Application-Exceeds-Brief]]></image:title>
			<image:caption><![CDATA[Application Exceeds its Brief]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Hootsuite-CTB.png</image:loc>
			<image:caption><![CDATA[Security Boulevard - Hootsuite-Burgess]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/danger-outsourcing-cybersecurity-foreign-based-firms/</loc>
		<lastmod>2020-03-04T05:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Outsourcing-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Outsourcing-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Outsourcing Cybersecurity to Foreign-Based Firms]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/confronting-security-issues-in-todays-mobile-workforce/</loc>
		<lastmod>2020-03-04T05:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Mobile-Workforce.jpg</image:loc>
			<image:title><![CDATA[Mobile-Workforce]]></image:title>
			<image:caption><![CDATA[Confronting Mobile Security Issues]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/top-3-takeaways-from-rsa-2018/</loc>
		<lastmod>2020-03-04T05:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto16444161.jpg</image:loc>
			<image:title><![CDATA[canstockphoto16444161]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/get-ready-for-another-critical-drupal-patch-related-to-drupalgeddon2/</loc>
		<lastmod>2020-03-04T05:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Warfare.jpg</image:loc>
			<image:title><![CDATA[Warfare]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/routers-prove-to-be-an-easy-target-for-russian-hackers/</loc>
		<lastmod>2020-03-04T05:13:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Routers-Target.jpg</image:loc>
			<image:title><![CDATA[Routers-Target]]></image:title>
			<image:caption><![CDATA[Easy Target for Russian Hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/when-scammers-fill-the-tech-support-void/</loc>
		<lastmod>2020-03-04T05:13:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Tech-Support-Void.jpg</image:loc>
			<image:caption><![CDATA[FTC]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/techsupporscam.png</image:loc>
			<image:caption><![CDATA[Security Boulevard - Tech Support Scam ]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-boulevards-5-most-read-stories-for-the-week-april-16-20/</loc>
		<lastmod>2020-03-04T05:13:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/internet-explorer-zero-day-exploit-reportedly-exploited-in-targeted-attacks/</loc>
		<lastmod>2020-03-04T05:13:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto25149504.jpg</image:loc>
			<image:caption><![CDATA[FaceApp]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/time-is-running-out-how-to-get-ready-for-gdpr/</loc>
		<lastmod>2020-03-04T05:13:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Ready-for-GDPR.jpg</image:loc>
			<image:title><![CDATA[Ready-for-GDPR]]></image:title>
			<image:caption><![CDATA[Get Ready for GDPR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-stop-cryptomining-and-cryptojacking-attacks/</loc>
		<lastmod>2020-03-04T05:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Cryptojacking-Attacks.jpg</image:loc>
			<image:title><![CDATA[Cryptojacking-Attacks]]></image:title>
			<image:caption><![CDATA[Stop Cryptomining Cryptojacking Attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/higher-education-a-top-target-for-crypto-mining/</loc>
		<lastmod>2020-03-04T05:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Cryptomining.jpg</image:loc>
			<image:title><![CDATA[Cryptomining]]></image:title>
			<image:caption><![CDATA[Top Target for Cryptomining]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/mobile-surveillance-malware-found-on-google-play/</loc>
		<lastmod>2020-03-04T05:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SupplyChain-1.jpg</image:loc>
			<image:caption><![CDATA[Hamas]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/everything-must-go-effective-data-removal-business-closes/</loc>
		<lastmod>2020-03-04T05:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Data-Removal.jpg</image:loc>
			<image:title><![CDATA[Data-Removal]]></image:title>
			<image:caption><![CDATA[Effective Data Removal]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/widely-used-webex-clients-have-critical-vulnerability/</loc>
		<lastmod>2020-03-04T05:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Demand.jpg</image:loc>
			<image:title><![CDATA[Demand]]></image:title>
			<image:caption><![CDATA[SDP]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-patches-move-faster-keep-up-with-bad-guys/</loc>
		<lastmod>2020-03-04T05:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Security-Patches.jpg</image:loc>
			<image:title><![CDATA[Security-Patches]]></image:title>
			<image:caption><![CDATA[Security Patches Move Faster]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/oracle-fixes-critical-vulnerabilities-in-business-applications/</loc>
		<lastmod>2020-03-04T05:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto7561667.jpg</image:loc>
			<image:title><![CDATA[canstockphoto7561667]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-boulevards-5-most-read-stories-for-the-week-april-9-13/</loc>
		<lastmod>2020-03-04T05:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/heads-up-u-s-businesses-data-regulation-is-coming/</loc>
		<lastmod>2020-03-04T05:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Data-Breaches.jpg</image:loc>
			<image:title><![CDATA[Data-Breaches]]></image:title>
			<image:caption><![CDATA[Data Regulation Data Breaches]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/does-your-bug-bounty-program-need-an-overhaul/</loc>
		<lastmod>2020-03-04T05:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Bug-Bounty.jpg</image:loc>
			<image:title><![CDATA[Bug-Bounty]]></image:title>
			<image:caption><![CDATA[Bug Bounty Program Overhaul]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/hackers-start-exploiting-drupalgeddon2-vulnerability-to-install-coin-miners/</loc>
		<lastmod>2020-03-04T05:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Stealing-Infrastructure.jpg</image:loc>
			<image:title><![CDATA[Stealing-Infrastructure]]></image:title>
			<image:caption><![CDATA[coinbit]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/zuckerberg-unveils-the-cyber-naivete-of-congress/</loc>
		<lastmod>2020-03-04T05:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Stormy-Daniels-Lawsuit.jpg</image:loc>
			<image:title><![CDATA[Stormy-Daniels-Lawsuit]]></image:title>
			<image:caption><![CDATA[Stormy Daniels Lawsuit Contracts]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/many-android-devices-miss-patches-but-are-still-hard-to-hack/</loc>
		<lastmod>2020-03-04T05:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto8670695.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8670695]]></image:title>
			<image:caption><![CDATA[bots]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/new-document-attack-exploits-design-behavior-rather-than-macros/</loc>
		<lastmod>2020-03-04T05:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto17445614.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17445614]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/microsoft-fixes-66-vulnerabilities-across-its-products/</loc>
		<lastmod>2020-03-04T05:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Employee-Convenience.jpg</image:loc>
			<image:caption><![CDATA[cyber insurance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/whats-under-your-armor-gaps-in-corporate-security-exposed-in-breaches/</loc>
		<lastmod>2020-03-04T05:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Security-Exposed.jpg</image:loc>
			<image:caption><![CDATA[direct memory attack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/do-cybercriminals-ever-get-extradited/</loc>
		<lastmod>2020-03-04T05:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Cybercriminals-Extradited.jpg</image:loc>
			<image:title><![CDATA[Cybercriminals-Extradited]]></image:title>
			<image:caption><![CDATA[Do Cybercriminals Get Extradited]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-boulevard-chats-bitdiscovery-a-revolutionary-way-to-track-all-of-your-digital-assets/</loc>
		<lastmod>2020-03-04T05:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/DigitalAssets.jpg</image:loc>
			<image:title><![CDATA[DigitalAssets]]></image:title>
			<image:caption><![CDATA[BitDiscovery Track Digital Assets]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/foreign-or-domestic-does-it-matter-where-your-technology-is-made/</loc>
		<lastmod>2020-03-04T05:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Foreign-Made-Software.jpg</image:loc>
			<image:title><![CDATA[Foreign-Made-Software]]></image:title>
			<image:caption><![CDATA[foreign made software]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/when-your-greatest-cybersecurity-doubters-are-in-the-c-suite/</loc>
		<lastmod>2020-03-04T05:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Cybersecurity-Doubters-1.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity-Doubters]]></image:title>
			<image:caption><![CDATA[Cybersecurity Doubters C-Suite]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-boulevards-5-most-read-stories-for-the-week-april-2-6/</loc>
		<lastmod>2020-03-04T05:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tax-day-identity-theft-begins-much-earlier-than-april-15/</loc>
		<lastmod>2020-03-04T05:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Tax-Day.jpg</image:loc>
			<image:title><![CDATA[Tax-Day]]></image:title>
			<image:caption><![CDATA[Tax Day Identity Theft]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/serious-flaws-endanger-apps-built-with-spring-framework/</loc>
		<lastmod>2020-03-04T05:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto18318675.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18318675]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/3-payloads-in-healthcare-data-breaches/</loc>
		<lastmod>2020-03-04T05:13:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Healthcare-Data-Breaches.jpg</image:loc>
			<image:title><![CDATA[Healthcare-Data-Breaches]]></image:title>
			<image:caption><![CDATA[Healthcare Data Breaches]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/large-percentage-of-malware-downloads-are-signed-with-valid-certificates/</loc>
		<lastmod>2020-03-04T05:13:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto36381683.jpg</image:loc>
			<image:title><![CDATA[canstockphoto36381683]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/3-tips-in-training-machine-learning-for-security-work/</loc>
		<lastmod>2020-03-04T05:13:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Machine-Security-Work.jpg</image:loc>
			<image:title><![CDATA[Machine-Security-Work]]></image:title>
			<image:caption><![CDATA[Training Machine Learning]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/shimmytoons-multi-factor-authentication/</loc>
		<lastmod>2020-03-04T05:13:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Shimmytoons5.jpg</image:loc>
			<image:title><![CDATA[Shimmytoons1]]></image:title>
			<image:caption><![CDATA[Shimmytoons: Multi-Factor Authentication]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/bobres.png</image:loc>
			<image:caption><![CDATA[bob reselman]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/10-best-practices-for-data-security-in-a-gdpr-world/</loc>
		<lastmod>2020-03-04T05:13:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Data-Security-Practices.jpg</image:loc>
			<image:title><![CDATA[Data-Security-Practices]]></image:title>
			<image:caption><![CDATA[Best Practices for Data Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/meltdown-and-spectre-the-next-chapter/</loc>
		<lastmod>2020-03-04T05:13:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Threat-Detection.jpg</image:loc>
			<image:title><![CDATA[Threat-Detection]]></image:title>
			<image:caption><![CDATA[Meltdown Spectre Threat Detection]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/intel-wont-patch-spectre-on-all-cpus/</loc>
		<lastmod>2020-03-04T05:13:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17786197.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17786197]]></image:title>
			<image:caption><![CDATA[automation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/2018-emerging-threats-show-new-sophistication-in-hackers/</loc>
		<lastmod>2020-03-04T05:13:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Emerging-Threats.jpg</image:loc>
			<image:title><![CDATA[Emerging-Threats]]></image:title>
			<image:caption><![CDATA[Sophistication in Hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cloudflare-launches-public-dns-service-with-encryption-capabilities/</loc>
		<lastmod>2020-03-04T05:13:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto48854326.jpg</image:loc>
			<image:title><![CDATA[canstockphoto48854326]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-blogger-awards-2018-voting-is-open/</loc>
		<lastmod>2020-03-04T05:13:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto28615480.jpg</image:loc>
			<image:title><![CDATA[canstockphoto28615480]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/ssbloggersawards2018.png</image:loc>
			<image:caption><![CDATA[security blogger awards]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Screen-Shot-2018-04-02-at-9.22.02-PM.png</image:loc>
			<image:caption><![CDATA[most educational blog]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Screen-Shot-2018-04-02-at-9.23.15-PM.png</image:loc>
			<image:caption><![CDATA[most entertaining blog]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Screen-Shot-2018-04-02-at-9.23.26-PM.png</image:loc>
			<image:caption><![CDATA[best new security blog or podcast]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Screen-Shot-2018-04-02-at-9.23.42-PM.png</image:loc>
			<image:caption><![CDATA[best security podcast]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Screen-Shot-2018-04-02-at-9.23.52-PM.png</image:loc>
			<image:caption><![CDATA[best corporate security blog]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-boulevards-5-most-read-stories-for-the-week-march-26-30/</loc>
		<lastmod>2020-03-04T05:13:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/has-your-intelligence-education-prepared-you-for-the-tests-to-come/</loc>
		<lastmod>2020-03-04T05:13:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Security-Intelligence-Education.jpg</image:loc>
			<image:title><![CDATA[Security-Intelligence-Education]]></image:title>
			<image:caption><![CDATA[Security Intelligence Education Prepared]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/low-priority-threats-the-achilles-heel-of-security-teams/</loc>
		<lastmod>2020-03-04T05:13:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Low-Priority-Security.jpg</image:loc>
			<image:title><![CDATA[Low-Priority-Security]]></image:title>
			<image:caption><![CDATA[Low Priority Threats Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/real-time-analytics-for-pci-compliance/</loc>
		<lastmod>2020-03-04T05:13:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/PCI-Compliance.jpg</image:loc>
			<image:caption><![CDATA[data lifecycle]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/PCIcompliance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/microsoft-issues-emergency-patch-for-recently-found-kernel-vulnerability/</loc>
		<lastmod>2020-03-04T05:13:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto23740067.jpg</image:loc>
			<image:title><![CDATA[canstockphoto23740067]]></image:title>
			<image:caption><![CDATA[Adobe Confirms Unpatched Flash]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/meltdown-patches-left-windows-7-and-server-2008-systems-even-more-vulnerable/</loc>
		<lastmod>2020-03-04T05:13:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto10920146.jpg</image:loc>
			<image:title><![CDATA[canstockphoto10920146]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/drupal-websites-at-risk-due-to-highly-critical-vulnerability/</loc>
		<lastmod>2020-03-04T05:13:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto35078002.jpg</image:loc>
			<image:title><![CDATA[canstockphoto35078002]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/employee-convenience-trumps-infosec/</loc>
		<lastmod>2020-03-04T05:13:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Employee-Convenience.jpg</image:loc>
			<image:caption><![CDATA[cyber insurance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/benefits-of-a-multicultural-cybersecurity-workforce/</loc>
		<lastmod>2020-03-04T05:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Multicultural-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Multicultural-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Multicultural Cybersecurity Workforce Benefits]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/rsac-final-keynote-lineup-features-plenty-of-women/</loc>
		<lastmod>2020-03-04T05:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto47584768.jpg</image:loc>
			<image:title><![CDATA[canstockphoto47584768]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/u-s-infrastructure-vulnerable-to-russia-and-others/</loc>
		<lastmod>2020-03-04T05:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Infrastructure-Vulnerable.jpg</image:loc>
			<image:title><![CDATA[Infrastructure-Vulnerable]]></image:title>
			<image:caption><![CDATA[U.S. Infrastructure Vulnerable Russia]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Russian-CKTAW-Diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/spanish-authorities-arrest-leader-of-cybercriminal-gang-behind-1-billion-heist/</loc>
		<lastmod>2020-03-04T05:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto46664719.jpg</image:loc>
			<image:title><![CDATA[canstockphoto46664719]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/identifying-false-positives-to-improve-email-security/</loc>
		<lastmod>2020-03-04T05:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/False-Positives.jpg</image:loc>
			<image:title><![CDATA[False-Positives]]></image:title>
			<image:caption><![CDATA[Improve Email Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/gdpr-countdown-checklist-3-strategic-to-dos-for-cybersecurity-teams/</loc>
		<lastmod>2020-03-04T05:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Cybersecurity-Teams.jpg</image:loc>
			<image:caption><![CDATA[compliance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/over-2k-publicly-accessible-etcd-servers-leak-sensitive-credentials/</loc>
		<lastmod>2020-03-04T05:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto512540.jpg</image:loc>
			<image:title><![CDATA[canstockphoto512540]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-facebook-privacy-breach-what-it-can-teach-us-about-privacy-threats-before-gdpr/</loc>
		<lastmod>2020-03-04T05:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Facebooks-Privacy-Breach.jpg</image:loc>
			<image:caption><![CDATA[privacy social media]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-safeguard-your-enterprise-against-business-email-compromise-attacks/</loc>
		<lastmod>2020-03-04T05:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Email-Compromised.jpg</image:loc>
			<image:title><![CDATA[Email-Compromised]]></image:title>
			<image:caption><![CDATA[Safeguard Email Compromised Attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/us-charges-9-iranians-data-theft-cyberespionage-campaign/</loc>
		<lastmod>2020-03-04T05:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto26105426.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26105426]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-boulevards-5-most-read-stories-for-the-week-march-19-23/</loc>
		<lastmod>2020-03-04T05:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/welcome-to-the-era-of-cloud-insecurity-7-threats-unveiled/</loc>
		<lastmod>2020-03-04T05:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Cloud-Insecurity.jpg</image:loc>
			<image:title><![CDATA[Cloud-Insecurity]]></image:title>
			<image:caption><![CDATA[Cloud Insecurity Threats Unveiled]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/cloudinsecuritypic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/6-ways-machine-learning-can-help-security/</loc>
		<lastmod>2020-03-04T05:14:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/machine-learning.jpg</image:loc>
			<image:title><![CDATA[machine-learning]]></image:title>
			<image:caption><![CDATA[Machine Learning Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/lessons-for-boards-from-yahoos-80-million-shareholder-settlement/</loc>
		<lastmod>2020-03-04T05:14:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Data-Breach-Settlement.jpg</image:loc>
			<image:title><![CDATA[Data-Breach-Settlement]]></image:title>
			<image:caption><![CDATA[Yahoos Data Breach Settlement]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/implications-us-cert-concerns-russia-targeting-critical-infrastructure/</loc>
		<lastmod>2020-03-04T05:14:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto15266229.jpg</image:loc>
			<image:title><![CDATA[canstockphoto15266229]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/amd-confirms-chip-flaws-and-promises-fixes-soon/</loc>
		<lastmod>2020-03-04T05:14:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Manufacturers.jpg</image:loc>
			<image:title><![CDATA[Manufacturers]]></image:title>
			<image:caption><![CDATA[cryptojacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/nation-state-cyberespionage-iran-and-north-korea/</loc>
		<lastmod>2020-03-04T05:14:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Iran-North-Korea.jpg</image:loc>
			<image:title><![CDATA[Iran-North-Korea]]></image:title>
			<image:caption><![CDATA[Nation State Cyberespionage]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/veterans-are-a-good-bet-to-fill-cybersecurity-skills-gap/</loc>
		<lastmod>2020-03-04T05:14:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Veterans-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Veterans-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Veterans Cybersecurity Skills Gap]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/orbitz-suffers-data-breach-impacting-880k-customers/</loc>
		<lastmod>2020-03-04T05:14:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Breach.jpg</image:loc>
			<image:title><![CDATA[Breach]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/new-attack-vectors-brought-by-the-cloud-and-aws/</loc>
		<lastmod>2020-03-04T05:14:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Attack-Vectors.jpg</image:loc>
			<image:title><![CDATA[Attack-Vectors]]></image:title>
			<image:caption><![CDATA[New Attack Vectors Cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/march-madness-phishing-threats-why-are-we-still-falling-for-them/</loc>
		<lastmod>2020-03-04T05:14:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/March-Madness-Phishing.jpg</image:loc>
			<image:title><![CDATA[March-Madness-Phishing]]></image:title>
			<image:caption><![CDATA[March Madness Phishing Attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/end-user-education-and-remote-support-security/</loc>
		<lastmod>2020-03-04T05:14:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Brute-Force-Attacks.jpg</image:loc>
			<image:title><![CDATA[Brute-Force-Attacks]]></image:title>
			<image:caption><![CDATA[Brute-Force Attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/attackers-deliver-cryptominer-to-postgresql-servers-as-scarlett-johansson-pic/</loc>
		<lastmod>2020-03-04T05:14:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/DarkSide.jpg</image:loc>
			<image:title><![CDATA[DarkSide]]></image:title>
			<image:caption><![CDATA[Dark Side Quantum Computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/nation-state-cyberespionage-russia-and-china/</loc>
		<lastmod>2020-03-04T05:14:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Cyberespionage-Russia-China.jpg</image:loc>
			<image:title><![CDATA[Cyberespionage-Russia-China]]></image:title>
			<image:caption><![CDATA[Nation State Cyberespionage Russia China]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-boulevards-5-most-read-stories-for-the-week-march-12-16/</loc>
		<lastmod>2020-03-04T05:14:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/evident-io-buy-gives-palo-alto-cloud-strategy/</loc>
		<lastmod>2020-03-04T05:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Top12.jpg</image:loc>
			<image:title><![CDATA[Top12]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/evident.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/microsoft-offers-250k-bounty-for-meltdown-like-bugs-in-cpus/</loc>
		<lastmod>2020-03-04T05:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/CyberOfficers.jpg</image:loc>
			<image:title><![CDATA[CyberOfficers]]></image:title>
			<image:caption><![CDATA[IT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/top-6-quickest-ways-to-draw-a-gdpr-fine/</loc>
		<lastmod>2020-03-04T05:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/GDPR-Fine.jpg</image:loc>
			<image:title><![CDATA[GDPR-Fine]]></image:title>
			<image:caption><![CDATA[Ways to Draw GDPR Fine]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/combating-w-2-fraud-an-avalanche-of-false-positives-and-wasted-time/</loc>
		<lastmod>2020-03-04T05:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Combating-W-2-Fraud.jpg</image:loc>
			<image:title><![CDATA[Combating-W-2-Fraud]]></image:title>
			<image:caption><![CDATA[Combating W-2 Fraud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/are-you-compliant-with-nist-800-171/</loc>
		<lastmod>2020-03-04T05:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Compliant-With-NIST.jpg</image:loc>
			<image:title><![CDATA[Compliant-With-NIST]]></image:title>
			<image:caption><![CDATA[HIPAA]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/free-https-wildcard-certificates-are-now-available/</loc>
		<lastmod>2020-03-04T05:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto30863139.jpg</image:loc>
			<image:title><![CDATA[canstockphoto30863139]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-boulevards-5-read-stories-week-march-4-10/</loc>
		<lastmod>2020-03-04T05:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/canstockphoto32146701.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32146701]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s Most Read Stories]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-firm-claims-amd-chips-have-critical-vulnerabilities/</loc>
		<lastmod>2020-03-04T05:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto42851015.jpg</image:loc>
			<image:title><![CDATA[canstockphoto42851015]]></image:title>
			<image:caption><![CDATA[Ubuntu]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/preparing-gdpr-need-know-now/</loc>
		<lastmod>2020-03-04T05:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Preparing-For-GDPR.jpg</image:loc>
			<image:title><![CDATA[Preparing-For-GDPR]]></image:title>
			<image:caption><![CDATA[Preparing For GDPR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/worm-infects-redis-and-windows-servers-with-cryptomining-malware/</loc>
		<lastmod>2020-03-04T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Cryptocurrency.jpg</image:loc>
			<image:title><![CDATA[Cryptocurrency]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/rsac-the-conference-they-love-to-hate/</loc>
		<lastmod>2020-03-04T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto8436504.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8436504]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/attackers-infect-computers-with-cyberespionage-malware-via-hacked-routers/</loc>
		<lastmod>2020-03-04T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto33004903.jpg</image:loc>
			<image:title><![CDATA[GRU]]></image:title>
			<image:caption><![CDATA[Sandworm]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/mitigating-cyber-risks-everyday-technology-use/</loc>
		<lastmod>2020-03-04T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Mitigating-Cyber-Risks.jpg</image:loc>
			<image:title><![CDATA[Mitigating-Cyber-Risks]]></image:title>
			<image:caption><![CDATA[Mitigating Cyber Risks Technology]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/eu-gdpr-checklist-start-preparing-now/</loc>
		<lastmod>2020-03-04T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/EU-GDPR-Checklist.jpg</image:loc>
			<image:title><![CDATA[EU-GDPR-Checklist]]></image:title>
			<image:caption><![CDATA[EU GDPR Checklist]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/spectre-inspired-attacks-can-steal-data-from-intel-sgx-enclaves/</loc>
		<lastmod>2020-03-04T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto512540.jpg</image:loc>
			<image:title><![CDATA[canstockphoto512540]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/stealing-infrastructure-cryptocurrency-mining-attacks-container-environments/</loc>
		<lastmod>2020-03-04T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Stealing-Infrastructure.jpg</image:loc>
			<image:title><![CDATA[Stealing-Infrastructure]]></image:title>
			<image:caption><![CDATA[coinbit]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-strategies-companies-prone-inertia-even-post-attack/</loc>
		<lastmod>2020-03-04T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Security-Strategies.jpg</image:loc>
			<image:title><![CDATA[Security-Strategies]]></image:title>
			<image:caption><![CDATA[asset management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/poisoning-col-sergei-skripal-russian-retribution/</loc>
		<lastmod>2020-03-04T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto8230880.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8230880]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/exim-flaw-puts-hundreds-of-thousands-of-email-servers-at-risk/</loc>
		<lastmod>2020-03-04T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto24629730.jpg</image:loc>
			<image:title><![CDATA[canstockphoto24629730]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/global-corruption-index-keep-nose-clean-business-abroad/</loc>
		<lastmod>2020-03-04T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Global-Corruption.jpg</image:loc>
			<image:title><![CDATA[Global-Corruption]]></image:title>
			<image:caption><![CDATA[Global Corruption Business Abroad]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Corruptions_Index.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/github-hit-by-record-ddos-attack-through-exposed-memcached-servers/</loc>
		<lastmod>2020-03-04T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-boulevards-5-read-stories-week-feb-12-16-2/</loc>
		<lastmod>2020-03-04T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/canstockphoto32146701.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32146701]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s Most Read Stories]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/microsoft-starts-delivering-intel-microcode-patches-for-spectre/</loc>
		<lastmod>2020-03-04T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto49342104.jpg</image:loc>
			<image:title><![CDATA[canstockphoto49342104]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/facebooks-ad-confirmation-process-wont-stop-russians/</loc>
		<lastmod>2020-03-04T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Facebook-Ad-Russians.jpg</image:loc>
			<image:title><![CDATA[Facebook-Ad-Russians]]></image:title>
			<image:caption><![CDATA[Facebook Ad Confirmation Russians]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/recent-flash-zero-day-flaw-now-exploited-in-widespread-attacks/</loc>
		<lastmod>2020-03-04T05:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto46664719.jpg</image:loc>
			<image:title><![CDATA[canstockphoto46664719]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/some-sso-systems-vulnerable-to-authentication-bypass/</loc>
		<lastmod>2020-03-04T05:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Authentication-Bypass.jpg</image:loc>
			<image:title><![CDATA[Authentication-Bypass]]></image:title>
			<image:caption><![CDATA[Systems Vulnerable Authentication Bypass]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/infographic-pci-compliance-and-gdpr/</loc>
		<lastmod>2020-03-04T05:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto19097276-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto19097276]]></image:title>
			<image:caption><![CDATA[CCPA]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/GDPR-Gif.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/iot-security-glass-half-empty-or-half-full/</loc>
		<lastmod>2020-03-04T05:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/IoT-Security.jpg</image:loc>
			<image:title><![CDATA[IoT-Security]]></image:title>
			<image:caption><![CDATA[IoT Security Glass Half Full]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/voting-machines-murica/</loc>
		<lastmod>2020-03-04T05:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Murica.jpg</image:loc>
			<image:title><![CDATA[Murica]]></image:title>
			<image:caption><![CDATA[Voting Machines in 'Murica]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/cisco-patches-critical-flaws-in-elastic-services-controller-and-ucdm/</loc>
		<lastmod>2020-03-04T05:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto14098974-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto14098974]]></image:title>
			<image:caption><![CDATA[Cisco Elastic Services Controller]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/npm-update-crashes-linux-systems/</loc>
		<lastmod>2020-03-04T05:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/FTP.jpg</image:loc>
			<image:title><![CDATA[FTP]]></image:title>
			<image:caption><![CDATA[Npm Update Crashes Linux Systems]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/spectre-patches-reach-more-cpus-as-new-attack-variants-appear/</loc>
		<lastmod>2020-03-04T05:14:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Manufacturers.jpg</image:loc>
			<image:title><![CDATA[Manufacturers]]></image:title>
			<image:caption><![CDATA[cryptojacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/ddos-defense-devastation/</loc>
		<lastmod>2020-03-04T05:14:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Defense.jpg</image:loc>
			<image:title><![CDATA[Defense]]></image:title>
			<image:caption><![CDATA[Akamai]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/5-ways-reduce-cybersecurity-risk-win-over-ceos-ctos/</loc>
		<lastmod>2020-03-04T05:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Win.jpg</image:loc>
			<image:title><![CDATA[Win]]></image:title>
			<image:caption><![CDATA[Reduce Cybersecurity Risk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/usg-increases-global-intellectual-property-protection-efforts/</loc>
		<lastmod>2020-03-04T05:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/USG.jpg</image:loc>
			<image:title><![CDATA[USG]]></image:title>
			<image:caption><![CDATA[Global Intellectual Property Protection Efforts]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/report-software-vulnerabilities-increased-30-percent-2017/</loc>
		<lastmod>2020-03-04T05:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Ransomware.jpg</image:loc>
			<image:title><![CDATA[Ransomware]]></image:title>
			<image:caption><![CDATA[Ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/identity-documents-exposed-in-fedex-owned-amazon-s3-bucket/</loc>
		<lastmod>2020-03-04T05:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto20807558.jpg</image:loc>
			<image:title><![CDATA[canstockphoto20807558]]></image:title>
			<image:caption><![CDATA[Identity Documents Exposed FedEx]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/security-boulevards-5-read-stories-week-feb-12-16/</loc>
		<lastmod>2020-03-04T05:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/canstockphoto32146701.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32146701]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s Most Read Stories]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/favorite-tv-shows-get-right-hilariously-wrong-air-gap-technology/</loc>
		<lastmod>2020-03-04T05:14:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/TV.jpg</image:loc>
			<image:title><![CDATA[TV]]></image:title>
			<image:caption><![CDATA[TV Air Gap Technology]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/hackers-exploit-right-to-left-override-bug-in-telegram-to-distribute-malware/</loc>
		<lastmod>2020-03-04T05:14:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Manufacturers.jpg</image:loc>
			<image:title><![CDATA[Manufacturers]]></image:title>
			<image:caption><![CDATA[cryptojacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/hhs-deputy-cio-amelie-koran-on-securitys-challenges/</loc>
		<lastmod>2020-03-04T05:14:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Koran.jpg</image:loc>
			<image:title><![CDATA[Koran]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Amelie_Koran.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/7-application-security-steps-olympic-bound-traveler/</loc>
		<lastmod>2020-03-04T05:14:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Olympics.jpg</image:loc>
			<image:title><![CDATA[Olympics]]></image:title>
			<image:caption><![CDATA[Application Security Olympics Traveler]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/uber-settles-ip-suit-with-waymo-for-245-million/</loc>
		<lastmod>2020-03-04T05:14:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Uber.jpg</image:loc>
			<image:title><![CDATA[Uber]]></image:title>
			<image:caption><![CDATA[Uber Settles IP Suit]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/microsoft-fixes-50-flaws-in-windows-outlook-office-and-browsers/</loc>
		<lastmod>2020-03-04T05:14:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto45782708.jpg</image:loc>
			<image:title><![CDATA[canstockphoto45782708]]></image:title>
			<image:caption><![CDATA[Microsoft Fixes 50 Flaws]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/destructive-malware-used-to-attack-winter-olympics-infrastructure/</loc>
		<lastmod>2020-03-04T05:14:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/FTP.jpg</image:loc>
			<image:title><![CDATA[FTP]]></image:title>
			<image:caption><![CDATA[Npm Update Crashes Linux Systems]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/intel-releases-microcode-spectre-patches-for-skylake-cpus/</loc>
		<lastmod>2020-03-04T05:14:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto7716607.jpg</image:loc>
			<image:title><![CDATA[canstockphoto7716607]]></image:title>
			<image:caption><![CDATA[Intel Releases Microcode Spectre Patches]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/adobe-fixes-flash-player-zero-day-vulnerability/</loc>
		<lastmod>2020-03-04T05:14:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Cyberwar2.jpg</image:loc>
			<image:title><![CDATA[Cyberwar2]]></image:title>
			<image:caption><![CDATA[Adobe Fixes Flash Player]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/microns-ip-was-stolen-and-company-wants-back/</loc>
		<lastmod>2020-03-04T05:14:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/China.jpg</image:loc>
			<image:title><![CDATA[China]]></image:title>
			<image:caption><![CDATA[Micron's IP was Stolen]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/lenovo-warns-thinkpads-vulnerable-wi-fi-flaws/</loc>
		<lastmod>2020-03-04T05:14:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto14729899.jpg</image:loc>
			<image:title><![CDATA[endpoint security]]></image:title>
			<image:caption><![CDATA[multi-vector EDR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/exposing-culture-compliance-cramming/</loc>
		<lastmod>2020-03-04T05:14:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Exposing.jpg</image:loc>
			<image:title><![CDATA[Exposing]]></image:title>
			<image:caption><![CDATA[PCI DSS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/unpatched-vulnerability-exposes-wordpress-sites-to-denial-of-service-attacks/</loc>
		<lastmod>2020-03-04T05:14:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto21888336.jpg</image:loc>
			<image:title><![CDATA[canstockphoto21888336]]></image:title>
			<image:caption><![CDATA[Unpatched Vulnerability Exposes WordPress]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/adobe-confirms-unpatched-flash-player-vulnerability-used-in-attacks/</loc>
		<lastmod>2020-03-04T05:14:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto23740067.jpg</image:loc>
			<image:title><![CDATA[canstockphoto23740067]]></image:title>
			<image:caption><![CDATA[Adobe Confirms Unpatched Flash]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/china-gifts-the-african-union-a-21st-century-trojan-horse/</loc>
		<lastmod>2020-03-04T05:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Trojan.jpg</image:loc>
			<image:title><![CDATA[Trojan]]></image:title>
			<image:caption><![CDATA[China Gifts African Union]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/lenovo-fingerprint-reader-software-failed-to-properly-secure-credentials/</loc>
		<lastmod>2020-03-04T05:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto1837332-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto1837332 (1)]]></image:title>
			<image:caption><![CDATA[Lenovo Fingerprint Reader Software Failed]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-looming-enterprise-iot-security-threat/</loc>
		<lastmod>2020-03-04T05:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Looming.jpg</image:loc>
			<image:caption><![CDATA[attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/hardware-security-best-for-securing-healthcare-finance-iot/</loc>
		<lastmod>2020-03-04T05:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Healthcare.jpg</image:loc>
			<image:title><![CDATA[Healthcare]]></image:title>
			<image:caption><![CDATA[Securing Healthcare Finance IoT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/hackers-use-eternalblue-exploit-to-infect-500k-computers-with-cryptominer/</loc>
		<lastmod>2020-03-04T05:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto7243964.jpg</image:loc>
			<image:title><![CDATA[canstockphoto7243964]]></image:title>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/security-analytics-concepts-used-game-design-can-improve-visualization-insights/</loc>
		<lastmod>2020-03-04T05:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Analytics.jpg</image:loc>
			<image:title><![CDATA[Analytics]]></image:title>
			<image:caption><![CDATA[Game Design Improve Visualization]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/criminals-use-jackpotting-attack-to-steal-cash-from-u-s-atms/</loc>
		<lastmod>2020-03-04T05:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto20764094.jpg</image:loc>
			<image:title><![CDATA[web insecurities]]></image:title>
			<image:caption><![CDATA[web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/prioritizing-safety-cyber-hygiene-even-begin/</loc>
		<lastmod>2020-03-04T05:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Clean.jpg</image:loc>
			<image:title><![CDATA[Clean]]></image:title>
			<image:caption><![CDATA[Prioritizing Safety Cyber Hygiene]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/over-15-million-users-infected-with-monero-mining-malware/</loc>
		<lastmod>2020-03-04T05:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto37353110.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37353110]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/more-oems-pull-spectre-patches-as-intel-confirms-reboot-issues/</loc>
		<lastmod>2020-03-04T05:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Desert.jpg</image:loc>
			<image:title><![CDATA[Desert]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/dutch-spies-monitored-russian-cozy-bear-hackers-in-real-time-for-years/</loc>
		<lastmod>2020-03-04T05:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto15368699.jpg</image:loc>
			<image:title><![CDATA[canstockphoto15368699]]></image:title>
			<image:caption><![CDATA[Dutch Spies Monitored Russian Hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/apple-finally-ships-meltdown-patch-for-older-macos-systems/</loc>
		<lastmod>2020-03-04T05:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto15310697.jpg</image:loc>
			<image:title><![CDATA[canstockphoto15310697]]></image:title>
			<image:caption><![CDATA[Apple Ships Meltdown Patch]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/the-growing-mobile-menace-for-enterprises/</loc>
		<lastmod>2020-03-04T05:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Menace2.jpg</image:loc>
			<image:title><![CDATA[Menace2]]></image:title>
			<image:caption><![CDATA[Growing Mobile Menace Enterprises]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/ddos-attacks-evolve-remain-potent-threat/</loc>
		<lastmod>2020-03-04T05:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/DDoS.jpg</image:loc>
			<image:title><![CDATA[DDoS]]></image:title>
			<image:caption><![CDATA[DDoS-for-hire]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/lebanon-based-spy-group-identified-in-mobile-spying-effort/</loc>
		<lastmod>2020-03-04T05:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto8541886.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8541886]]></image:title>
			<image:caption><![CDATA[Lebanon Based Spy Group]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/triton-malware-exploited-zero-day-flaw-in-schneider-electric-safety-controllers/</loc>
		<lastmod>2020-03-04T05:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto119333.jpg</image:loc>
			<image:title><![CDATA[canstockphoto119333]]></image:title>
			<image:caption><![CDATA[Triton Malware Exploited Flaw]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/bad-rabbit-no-match-secure-remote-browsing/</loc>
		<lastmod>2020-03-04T05:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Browsing.jpg</image:loc>
			<image:title><![CDATA[Browsing]]></image:title>
			<image:caption><![CDATA[Bad Rabbit Secure Remote Browsing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/counterintelligence-alleged-chinese-spy-jerry-chun-shing-lee/</loc>
		<lastmod>2020-03-04T05:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Spy.jpg</image:loc>
			<image:title><![CDATA[Spy]]></image:title>
			<image:caption><![CDATA[Chinese Spy Jerry Chun Shing Lee]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/oracle-fixes-200-plus-vulnerabilities-in-business-critical-applications/</loc>
		<lastmod>2020-03-04T05:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17608370.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17608370]]></image:title>
			<image:caption><![CDATA[Qualys endpoint]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/ransomware-tools-attacks-become-business-focused/</loc>
		<lastmod>2020-03-04T05:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Ransomware.jpg</image:loc>
			<image:title><![CDATA[Ransomware]]></image:title>
			<image:caption><![CDATA[Ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/intel-investigating-reboots-caused-cpu-firmware-patches/</loc>
		<lastmod>2020-03-04T05:15:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto32934910.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32934910]]></image:title>
			<image:caption><![CDATA[remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/highly-sophisticated-spyware-skygofree-targets-android-users/</loc>
		<lastmod>2020-03-04T05:15:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto29297811.jpg</image:loc>
			<image:title><![CDATA[canstockphoto29297811]]></image:title>
			<image:caption><![CDATA[Spyware Skygofree Targets Android]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/meltdown-patch-is-causing-problems-for-some-ubuntu-linux-users/</loc>
		<lastmod>2020-03-04T05:15:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/WordPress.jpg</image:loc>
			<image:caption><![CDATA[ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/skype-finally-gets-end-to-end-encryption/</loc>
		<lastmod>2020-03-04T05:15:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Bolster.jpg</image:loc>
			<image:title><![CDATA[Bolster]]></image:title>
			<image:caption><![CDATA[Skype End-to-End Encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/nation-states-criminals-silencing-fourth-estate/</loc>
		<lastmod>2020-03-04T05:15:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Silencing.jpg</image:loc>
			<image:title><![CDATA[Silencing]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/blockchains-hype-hope-transactional-security/</loc>
		<lastmod>2020-03-04T05:15:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Blockchain.jpg</image:loc>
			<image:title><![CDATA[Blockchain]]></image:title>
			<image:caption><![CDATA[Blockchain Transactional Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/d-link-nas-backdoor-found-years-later-in-western-digital-my-cloud-boxes/</loc>
		<lastmod>2020-03-04T05:15:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Backdoor.jpg</image:loc>
			<image:title><![CDATA[Backdoor]]></image:title>
			<image:caption><![CDATA[Western Digital My Cloud Boxes]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/google-develops-application-level-defense-against-spectre-cpu-attack/</loc>
		<lastmod>2020-03-04T05:15:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto9837967-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto9837967]]></image:title>
			<image:caption><![CDATA[cybersecurity DevOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/emc-patches-serious-flaws-in-data-protection-suite/</loc>
		<lastmod>2020-03-04T05:15:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto36381683.jpg</image:loc>
			<image:title><![CDATA[canstockphoto36381683]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/microsoft-kills-old-office-equation-editor-due-to-new-flaw/</loc>
		<lastmod>2020-03-04T05:15:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Bolster.jpg</image:loc>
			<image:title><![CDATA[Bolster]]></image:title>
			<image:caption><![CDATA[Skype End-to-End Encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/privileged-access-management-critical-in-todays-security-landscape/</loc>
		<lastmod>2020-03-04T05:15:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Privileged.jpg</image:loc>
			<image:title><![CDATA[Privileged]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/dormant-dangerous-avoiding-administrative-rights-misuse/</loc>
		<lastmod>2020-03-04T05:15:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Admin.jpg</image:loc>
			<image:title><![CDATA[Admin]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/nist-framework-thats-not-like-others/</loc>
		<lastmod>2020-03-04T05:15:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/NIST.jpg</image:loc>
			<image:title><![CDATA[NIST]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/ciso-challenges-2018/</loc>
		<lastmod>2020-03-04T05:15:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto45707744.jpg</image:loc>
			<image:title><![CDATA[canstockphoto45707744]]></image:title>
			<image:caption><![CDATA[CISO Challenges in 2018]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/major-cpu-flaws-meltdown-and-spectre-put-most-computers-at-risk/</loc>
		<lastmod>2020-03-04T05:15:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto21609321.jpg</image:loc>
			<image:title><![CDATA[canstockphoto21609321]]></image:title>
			<image:caption><![CDATA[architecture]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/can-now-help-identify-middleboxes-holding-back-tls-1-3-adoption/</loc>
		<lastmod>2020-03-04T05:15:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto15266229.jpg</image:loc>
			<image:title><![CDATA[canstockphoto15266229]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/hackers-infect-magento-shops-malware-extension-flaw/</loc>
		<lastmod>2020-03-04T05:15:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto39874704.jpg</image:loc>
			<image:title><![CDATA[canstockphoto39874704]]></image:title>
			<image:caption><![CDATA[fileless malware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/information-warfare-year-ahead/</loc>
		<lastmod>2020-03-04T05:15:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Warfare.jpg</image:loc>
			<image:title><![CDATA[Warfare]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/backdoors-found-three-wordpress-plug-ins/</loc>
		<lastmod>2020-03-04T05:15:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto33014599.jpg</image:loc>
			<image:title><![CDATA[canstockphoto33014599]]></image:title>
			<image:caption><![CDATA[Vollgar botnet]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/script-kiddie-responsible-large-satori-botnet/</loc>
		<lastmod>2020-03-04T05:15:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Botnet.jpg</image:loc>
			<image:title><![CDATA[Botnet]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/public-cloud-security-strained-complexity/</loc>
		<lastmod>2020-03-04T05:15:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Public.jpg</image:loc>
			<image:title><![CDATA[Public]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/attackers-exploit-android-application-package-flaw-hide-malware/</loc>
		<lastmod>2020-03-04T05:15:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto50246510.jpg</image:loc>
			<image:title><![CDATA[canstockphoto50246510]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/lithuania-bans-kaspersky-lab-products-on-critical-systems/</loc>
		<lastmod>2020-03-04T05:15:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto42851015.jpg</image:loc>
			<image:title><![CDATA[canstockphoto42851015]]></image:title>
			<image:caption><![CDATA[Ubuntu]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/devsecops-2018-year-quality-security-finally-merge/</loc>
		<lastmod>2020-03-04T05:15:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Merge.jpg</image:loc>
			<image:title><![CDATA[Merge]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/global-undersea-cables-vulnerable-russias-special-ops/</loc>
		<lastmod>2020-03-04T05:15:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Undersea.jpg</image:loc>
			<image:title><![CDATA[Undersea]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/yet-another-wordpress-extension-changes-owner-gets-backdoored/</loc>
		<lastmod>2020-03-04T05:15:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/data-forensics-new-frontier-malware-prevention-detection/</loc>
		<lastmod>2020-03-04T05:15:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Forensics.jpg</image:loc>
			<image:title><![CDATA[Forensics]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/u-s-officially-accuses-north-korea-wannacry-attack/</loc>
		<lastmod>2020-03-04T05:15:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Sins2.jpg</image:loc>
			<image:title><![CDATA[Sins2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/chinas-economic-espionage-via-non-attributable-hand/</loc>
		<lastmod>2020-03-04T05:15:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Hand.jpg</image:loc>
			<image:title><![CDATA[Hand]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/predicting-2018-security-spending-will-increase-manufacturers-shift-hardware-security/</loc>
		<lastmod>2020-03-04T05:15:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Manufacturers.jpg</image:loc>
			<image:title><![CDATA[Manufacturers]]></image:title>
			<image:caption><![CDATA[cryptojacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/new-triton-malware-framework-attacks-critical-infrastructure/</loc>
		<lastmod>2020-03-04T05:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto46261895-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto46261895]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/many-websites-vulnerable-19-year-old-tls-decryption-attack/</loc>
		<lastmod>2020-03-04T05:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto36889966-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto36889966]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/global-traffic-high-profile-sites-believed-hijacked/</loc>
		<lastmod>2020-03-04T05:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto35078002.jpg</image:loc>
			<image:title><![CDATA[canstockphoto35078002]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/deja-vu-russian-active-measures/</loc>
		<lastmod>2020-03-04T05:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/DejaVu.jpg</image:loc>
			<image:caption><![CDATA[personal data]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Bezmenovs-Chart.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Vladimir-Posner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/expect-data-privacy-trends-2018/</loc>
		<lastmod>2020-03-04T05:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/PrivacyTrends.jpg</image:loc>
			<image:title><![CDATA[PrivacyTrends]]></image:title>
			<image:caption><![CDATA[cloud file service]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/faster-breach-detection-one-step-time/</loc>
		<lastmod>2020-03-04T05:15:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Breach.jpg</image:loc>
			<image:title><![CDATA[Breach]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/microsoft-fixes-34-security-flaws-windows-office-ie-edge/</loc>
		<lastmod>2020-03-04T05:15:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto1464679.jpg</image:loc>
			<image:title><![CDATA[canstockphoto1464679]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/contending-cybersecurity-age-ai-vs-ai/</loc>
		<lastmod>2020-03-04T05:15:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/AI.jpg</image:loc>
			<image:title><![CDATA[AI]]></image:title>
			<image:caption><![CDATA[AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/top-5-security-trends-2018/</loc>
		<lastmod>2020-03-04T05:15:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Trends.jpg</image:loc>
			<image:title><![CDATA[Trends]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/cryptocurrency-icos-caveat-emptor/</loc>
		<lastmod>2020-03-04T05:15:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Bitcoin.jpg</image:loc>
			<image:title><![CDATA[Bitcoin]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/mitm-vulnerabilities-mobile-banking-apps/</loc>
		<lastmod>2020-03-04T05:15:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto40810760.jpg</image:loc>
			<image:title><![CDATA[canstockphoto40810760]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/army-commission-civilians-cyber-officers/</loc>
		<lastmod>2020-03-04T05:15:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/CyberOfficers.jpg</image:loc>
			<image:title><![CDATA[CyberOfficers]]></image:title>
			<image:caption><![CDATA[IT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/google-chrome-update-focuses-enterprise-security/</loc>
		<lastmod>2020-03-04T05:15:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Equifax2.jpg</image:loc>
			<image:title><![CDATA[Equifax2]]></image:title>
			<image:caption><![CDATA[patching]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/iot-botnet-satori-grows-rapidly-thanks-zero-day-flaw/</loc>
		<lastmod>2020-03-04T05:15:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto8652089.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8652089]]></image:title>
			<image:caption><![CDATA[Cisco IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/flaws-development-tools-expose-android-app-makers-attacks/</loc>
		<lastmod>2020-03-04T05:15:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/FreeTool.jpg</image:loc>
			<image:title><![CDATA[FreeTool]]></image:title>
			<image:caption><![CDATA[Akamai JavaScript]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/attackers-inject-persistent-cryptomining-browsers/</loc>
		<lastmod>2020-03-04T05:15:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto40359264.jpg</image:loc>
			<image:title><![CDATA[canstockphoto40359264]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/brace-hybrid-threats-extortion-fueled-attacks-next-year/</loc>
		<lastmod>2020-03-04T05:15:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto19491930-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto19491930]]></image:title>
			<image:caption><![CDATA[network security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/cisos-can-successfully-talk-security-ceos/</loc>
		<lastmod>2020-03-04T05:15:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SAP.jpg</image:loc>
			<image:title><![CDATA[protecting]]></image:title>
			<image:caption><![CDATA[c-suite]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/paypal-subsidiary-tio-networks-suffers-breach-affecting-1-6-million-users/</loc>
		<lastmod>2020-03-04T05:15:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto34390927.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34390927]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/public-execution-exploit-affects-thousands-email-servers/</loc>
		<lastmod>2020-03-04T05:15:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/millions-health-records-risk-due-vulnerable-openemr-configurations/</loc>
		<lastmod>2020-03-04T05:15:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Health.jpg</image:loc>
			<image:title><![CDATA[Health]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/ubers-shady-competitive-intelligence-unit-revealed-court/</loc>
		<lastmod>2020-03-04T05:15:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto48825966.jpg</image:loc>
			<image:title><![CDATA[canstockphoto48825966]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/apple-fixes-macos-high-sierra-root-access-vulnerability/</loc>
		<lastmod>2020-03-04T05:15:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto38023191.jpg</image:loc>
			<image:title><![CDATA[canstockphoto38023191]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/china-continues-xenophobic-counterintelligence-campaigns/</loc>
		<lastmod>2020-03-04T05:15:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/CounterIntelligence.jpg</image:loc>
			<image:title><![CDATA[CounterIntelligence]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Screengrab-from-PRC-govt-film.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/joker-china-national-security-cartoon-China.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/David-foreign-spy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/data-loss-prevention-needs-little-help-friends/</loc>
		<lastmod>2020-03-04T05:15:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Help.jpg</image:loc>
			<image:title><![CDATA[Help]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/hp-patches-high-risk-vulnerability-business-printers/</loc>
		<lastmod>2020-03-04T05:15:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto15917736-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto15917736 (1)]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/security-boulevard-chat-update-security-compliance-chef/</loc>
		<lastmod>2020-03-04T05:15:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Update2.jpg</image:loc>
			<image:title><![CDATA[security marketing]]></image:title>
			<image:caption><![CDATA[Marketing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/dangerous-intel-chip-flaw-patches-becoming-available/</loc>
		<lastmod>2020-03-04T05:15:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto34418615.jpg</image:loc>
			<image:title><![CDATA[crisis response]]></image:title>
			<image:caption><![CDATA[crisis]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/capital-one-debuts-beta-critical-stack-container-orchestration-platform/</loc>
		<lastmod>2020-03-04T05:15:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto9837967-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto9837967]]></image:title>
			<image:caption><![CDATA[cybersecurity DevOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/intel-warns-of-serious-processor-flaws/</loc>
		<lastmod>2020-03-04T05:15:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto7716607.jpg</image:loc>
			<image:title><![CDATA[canstockphoto7716607]]></image:title>
			<image:caption><![CDATA[Intel Releases Microcode Spectre Patches]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/insecure-storage-buckets-expose-1-8-billion-online-posts-scraped-u-s-military/</loc>
		<lastmod>2020-03-04T05:15:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto49531661.jpg</image:loc>
			<image:title><![CDATA[canstockphoto49531661]]></image:title>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/120-malware-detections-triggered-on-nsa-employees-computer/</loc>
		<lastmod>2020-03-04T05:15:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto39874704.jpg</image:loc>
			<image:title><![CDATA[canstockphoto39874704]]></image:title>
			<image:caption><![CDATA[fileless malware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/oracle-patches-critical-vulnerabilities-peoplesoft-applications/</loc>
		<lastmod>2020-03-04T05:15:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17786197.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17786197]]></image:title>
			<image:caption><![CDATA[automation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/extremist-groups-using-internet-foment-online-radicalization/</loc>
		<lastmod>2020-03-04T05:15:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Extremist.jpg</image:loc>
			<image:caption><![CDATA[brute-force]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/corporate-consumer-views-diverge-securing-customer-data/</loc>
		<lastmod>2020-03-04T05:15:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Diverge.jpg</image:loc>
			<image:title><![CDATA[Diverge]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/quarantine-flaw-antivirus-products-allows-privilege-escalation/</loc>
		<lastmod>2020-03-04T05:15:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto5755420.jpg</image:loc>
			<image:title><![CDATA[canstockphoto5755420]]></image:title>
			<image:caption><![CDATA[threat intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/top-12-hybrid-cloud-security-threats/</loc>
		<lastmod>2020-03-04T05:15:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Top12.jpg</image:loc>
			<image:title><![CDATA[Top12]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/adobe-releases-critical-security-patches/</loc>
		<lastmod>2020-03-04T05:15:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Equifax2.jpg</image:loc>
			<image:title><![CDATA[Equifax2]]></image:title>
			<image:caption><![CDATA[patching]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/devops-connect-devsecops-days-coming-rsac/</loc>
		<lastmod>2020-03-04T05:15:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/RSCA18.jpg</image:loc>
			<image:title><![CDATA[RSCA18]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/sowbug-cyberespionage-group-hits-south-america-south-asia/</loc>
		<lastmod>2020-03-04T05:15:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto2540255.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2540255]]></image:title>
			<image:caption><![CDATA[infosec]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/fancy-bear-adopts-new-dde-attack-microsoft-office/</loc>
		<lastmod>2020-03-04T05:15:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17608370.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17608370]]></image:title>
			<image:caption><![CDATA[Qualys endpoint]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/secblvd-chats-aqua-security-seeks-lock-container-security/</loc>
		<lastmod>2020-03-04T05:15:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/LockDown.jpg</image:loc>
			<image:title><![CDATA[LockDown]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/russia-expert-active-measures-including-cyber-meddling/</loc>
		<lastmod>2020-03-04T05:15:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Russia.jpg</image:loc>
			<image:title><![CDATA[Russia]]></image:title>
			<image:caption><![CDATA[election Russians]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/USSR-ActiveMeasure1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Russian-Social-Media-Capabilities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/trojan-silence-uses-stealth-attack-banks/</loc>
		<lastmod>2020-03-04T05:15:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto36889966-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto36889966]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/fake-whatsapp-google-play-shows-easy-users-can-tricked/</loc>
		<lastmod>2020-03-04T05:15:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto18318595.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18318595]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/fancy-bear-cyberspies-hide-phishing-pages-behind-blogspot-links/</loc>
		<lastmod>2020-03-04T05:15:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Phishing2.jpg</image:loc>
			<image:title><![CDATA[Phishing2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/hezbollah-amplifies-message-savvy-use-media/</loc>
		<lastmod>2020-03-04T05:15:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Media.jpg</image:loc>
			<image:title><![CDATA[Media]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/online-retailers-increase-security-holiday-shopping/</loc>
		<lastmod>2020-03-04T05:15:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/HolidayShopping2.jpg</image:loc>
			<image:title><![CDATA[HolidayShopping2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/oracle-provides-workaround-critical-flaw-identity-manager/</loc>
		<lastmod>2020-03-04T05:15:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/FreeTool.jpg</image:loc>
			<image:title><![CDATA[FreeTool]]></image:title>
			<image:caption><![CDATA[Akamai JavaScript]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/update-wordpress-website-now-researcher-warns/</loc>
		<lastmod>2020-03-04T05:15:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/WordPress.jpg</image:loc>
			<image:caption><![CDATA[ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/equifaxs-servers-reportedly-glaring-holes-long-data-breach/</loc>
		<lastmod>2020-03-04T05:15:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Holes.jpg</image:loc>
			<image:title><![CDATA[Holes]]></image:title>
			<image:caption><![CDATA[OT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/kaspersky-says-hand-cookie-jar/</loc>
		<lastmod>2020-03-04T05:15:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto17606369.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17606369]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/iot-reaper-botnet-much-smaller-initially-believed/</loc>
		<lastmod>2020-03-04T05:15:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto8652089.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8652089]]></image:title>
			<image:caption><![CDATA[Cisco IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/bad-rabbit-ransomware-highlights-perils-poor-network-management/</loc>
		<lastmod>2020-03-04T05:15:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42974088.jpg</image:loc>
			<image:title><![CDATA[canstockphoto42974088]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/listicle-7-strategies-secure-enterprise-iot/</loc>
		<lastmod>2020-03-04T05:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Strategies.jpg</image:loc>
			<image:caption><![CDATA[digital economy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/cybersecurity-machine-learning-ai-impact/</loc>
		<lastmod>2020-03-04T05:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/MachineLearning.jpg</image:loc>
			<image:title><![CDATA[MachineLearning]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/make-security-business-partner-avoid-job-burnout/</loc>
		<lastmod>2020-03-04T05:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Partner.jpg</image:loc>
			<image:title><![CDATA[Partner]]></image:title>
			<image:caption><![CDATA[CCO]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/prng-government-crypto-certification/</loc>
		<lastmod>2020-03-04T05:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto34390927-800x450.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34390927-800x450]]></image:title>
			<image:caption><![CDATA[insider threat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/proposed-active-cyber-defense-bill-channels-mao-zedong/</loc>
		<lastmod>2020-03-04T05:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Zedong.jpg</image:loc>
			<image:title><![CDATA[Zedong]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/supply-chain-attack-hits-maker-popular-macos-apps/</loc>
		<lastmod>2020-03-04T05:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SupplyChain-1.jpg</image:loc>
			<image:caption><![CDATA[Hamas]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/doj-ag-tout-responsible-encryption-privacy/</loc>
		<lastmod>2020-03-04T05:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Bolster.jpg</image:loc>
			<image:title><![CDATA[Bolster]]></image:title>
			<image:caption><![CDATA[Skype End-to-End Encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/no-mr-equifax-ceo-dont-get-blame-one-guy-breach/</loc>
		<lastmod>2020-03-04T05:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto32934910.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32934910]]></image:title>
			<image:caption><![CDATA[remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/dangerous-kracks-wi-fi-security-puts-devices-risk/</loc>
		<lastmod>2020-03-04T05:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/08/canstockphoto18318562.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18318562]]></image:title>
			<image:caption><![CDATA[DAM]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/adobe-fixes-critical-flash-player-vulnerability-exploited-wild/</loc>
		<lastmod>2020-03-04T05:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto22514211.jpg</image:loc>
			<image:title><![CDATA[canstockphoto22514211]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/three-quarters-enterprise-applications-least-one-vulnerability/</loc>
		<lastmod>2020-03-04T05:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto20936828.jpg</image:loc>
			<image:title><![CDATA[canstockphoto20936828]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/sophisticated-malware-attack-launched-via-fake-sec-emails/</loc>
		<lastmod>2020-03-04T05:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Emails.jpg</image:loc>
			<image:title><![CDATA[Emails]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/hyatt-hotels-hit-credit-card-breach-11-countries/</loc>
		<lastmod>2020-03-04T05:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto37353110.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37353110]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/defense-honest-security-reporting/</loc>
		<lastmod>2020-03-04T05:15:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/equifax-website-taken-distributing-adware/</loc>
		<lastmod>2020-03-04T05:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Emails.jpg</image:loc>
			<image:title><![CDATA[Emails]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/security-experts-stress-urgency-better-election-security-following-defcon-report/</loc>
		<lastmod>2020-03-04T05:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Stress.jpg</image:loc>
			<image:title><![CDATA[Stress]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/critical-dns-flaw-exposes-windows-computers-hacking/</loc>
		<lastmod>2020-03-04T05:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Equifax2.jpg</image:loc>
			<image:title><![CDATA[Equifax2]]></image:title>
			<image:caption><![CDATA[patching]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/dissecting-chinas-global-bilateral-cybersecurity-strategy/</loc>
		<lastmod>2020-03-04T05:15:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto25308788.jpg</image:loc>
			<image:title><![CDATA[canstockphoto25308788]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/russian-bulls-eye-nsa/</loc>
		<lastmod>2020-03-04T05:15:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto3516555.jpg</image:loc>
			<image:title><![CDATA[identity]]></image:title>
			<image:caption><![CDATA[credential theft]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/russian-hackers-reportedly-stole-nsa-secrets-antivirus-programs-help/</loc>
		<lastmod>2020-03-04T05:15:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto138708.jpg</image:loc>
			<image:title><![CDATA[canstockphoto138708]]></image:title>
			<image:caption><![CDATA[ML firewalls]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/privacy-surveillance-self-defense/</loc>
		<lastmod>2020-03-04T05:15:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SelfDefense.jpg</image:loc>
			<image:title><![CDATA[SelfDefense]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/security-desensitization-another-data-breach-blah-blah-blah/</loc>
		<lastmod>2020-03-04T05:15:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto15235793.jpg</image:loc>
			<image:title><![CDATA[canstockphoto15235793]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/sonic-drive-blames-credit-card-breach-malware/</loc>
		<lastmod>2020-03-04T05:15:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto777964.jpg</image:loc>
			<image:title><![CDATA[canstockphoto777964]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/ongoing-security-skills-gap-projected-survey/</loc>
		<lastmod>2020-03-04T05:15:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto37220030.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37220030]]></image:title>
			<image:caption><![CDATA[CISO]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/cryptocurrency-embrace-no-eschew/</loc>
		<lastmod>2020-03-04T05:15:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Cryptocurrency.jpg</image:loc>
			<image:title><![CDATA[Cryptocurrency]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/yahoos-3-billion-accounts-compromised-2013/</loc>
		<lastmod>2020-03-04T05:15:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/08/canstockphoto18318562.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18318562]]></image:title>
			<image:caption><![CDATA[DAM]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/5-embarrassing-cyber-consulting-firm-breaches/</loc>
		<lastmod>2020-03-04T05:15:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Embarrassing.jpg</image:loc>
			<image:title><![CDATA[Embarrassing]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/critical-dnsmasq-flaws-put-networking-devices-linux-systems-risk/</loc>
		<lastmod>2020-03-04T05:15:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto18318353.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18318353]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/black-duck-releases-free-tool-help-avoid-becoming-next-equifax/</loc>
		<lastmod>2020-03-04T05:15:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/FreeTool.jpg</image:loc>
			<image:title><![CDATA[FreeTool]]></image:title>
			<image:caption><![CDATA[Akamai JavaScript]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/waymo-uber-smokin-due-diligence-report-fire/</loc>
		<lastmod>2020-03-04T05:15:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto46928351.jpg</image:loc>
			<image:title><![CDATA[canstockphoto46928351]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/not-macs-get-firmware-security-fixes-researchers-find/</loc>
		<lastmod>2020-03-04T05:15:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/eu-let-cyberwar-games-begin/</loc>
		<lastmod>2020-03-04T05:15:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Cyberwar2.jpg</image:loc>
			<image:title><![CDATA[Cyberwar2]]></image:title>
			<image:caption><![CDATA[Adobe Fixes Flash Player]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/global-voting-susceptible-shenanigans/</loc>
		<lastmod>2020-03-04T05:15:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Voting2.jpg</image:loc>
			<image:title><![CDATA[Voting2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/7-deadly-sins-security-practitioners/</loc>
		<lastmod>2020-03-04T05:15:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Sins2.jpg</image:loc>
			<image:title><![CDATA[Sins2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/navigating-critical-first-48-hours-data-breach/</loc>
		<lastmod>2020-03-04T05:15:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Navigating.jpg</image:loc>
			<image:title><![CDATA[Navigating]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/swedes-surveillance-new-data-retention-law-proposed/</loc>
		<lastmod>2020-03-04T05:15:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Retention.jpg</image:loc>
			<image:title><![CDATA[Retention]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/one-thing-necessary-healthy-appsec-program/</loc>
		<lastmod>2020-03-04T05:15:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/deloitte-confirms-email-server-compromise/</loc>
		<lastmod>2020-03-04T05:15:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto23556029.jpg</image:loc>
			<image:caption><![CDATA[ethical hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/40-enterprise-computers-infected-second-stage-ccleaner-malware/</loc>
		<lastmod>2020-03-04T05:15:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/08/canstockphoto2552677-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2552677 (1)]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/fast-food-chain-sonic-investigates-potentially-large-credit-card-breach/</loc>
		<lastmod>2020-03-04T05:15:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto21888336.jpg</image:loc>
			<image:title><![CDATA[canstockphoto21888336]]></image:title>
			<image:caption><![CDATA[Unpatched Vulnerability Exposes WordPress]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/poorly-managed-public-cloud-databases-public-health-hazard/</loc>
		<lastmod>2020-03-04T05:15:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto35008730.jpg</image:loc>
			<image:caption><![CDATA[cloud miconfigurations]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/uber-waymo-billion-dollar-showdown/</loc>
		<lastmod>2020-03-04T05:15:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto37868437.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37868437]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/security-boulevard-chats-top/</loc>
		<lastmod>2020-03-04T05:15:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Lessons.jpg</image:loc>
			<image:title><![CDATA[Lessons]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/whats-your-ediscovery-process/</loc>
		<lastmod>2020-03-04T05:15:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto18192539-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18192539]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/ccleaner-supply-chain-attack-targeted-technology-companies/</loc>
		<lastmod>2020-03-04T05:15:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto23159600.jpg</image:loc>
			<image:title><![CDATA[canstockphoto23159600]]></image:title>
			<image:caption><![CDATA[digital strategy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/another-cloud-storage-leak-exposes-verizon-files/</loc>
		<lastmod>2020-03-04T05:15:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto32425148-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32425148]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/5-essential-duties-cisos-dread/</loc>
		<lastmod>2020-03-04T05:15:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17405520.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17405520]]></image:title>
			<image:caption><![CDATA[fraud COVID]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/attackers-use-undocumented-word-feature-fingerprint-victims-software/</loc>
		<lastmod>2020-03-04T05:15:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto13362191.jpg</image:loc>
			<image:title><![CDATA[canstockphoto13362191]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/russian-criminal-monetized-identity-theft-50-million/</loc>
		<lastmod>2020-03-04T05:15:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto48825966.jpg</image:loc>
			<image:title><![CDATA[canstockphoto48825966]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/ccleaner-performance-optimization-comes-side-system-compromise/</loc>
		<lastmod>2020-03-04T05:15:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42371635.jpg</image:loc>
			<image:title><![CDATA[canstockphoto42371635]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/like-equifax-thousands-companies-use-vulnerable-apache-struts-versions/</loc>
		<lastmod>2020-03-04T05:15:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto20764094.jpg</image:loc>
			<image:title><![CDATA[web insecurities]]></image:title>
			<image:caption><![CDATA[web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/equifax-confirms-hackers-broke-apache-struts-flaw/</loc>
		<lastmod>2020-03-04T05:15:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto47950254-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto47950254]]></image:title>
			<image:caption><![CDATA[security testing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/hackers-steal-more-than-3tb-of-data-from-vevo/</loc>
		<lastmod>2020-03-04T05:15:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto36889966-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto36889966]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/insecure-elasticsearch-nodes-host-malware-command-control-servers/</loc>
		<lastmod>2020-03-04T05:15:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto24629730.jpg</image:loc>
			<image:title><![CDATA[canstockphoto24629730]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/irs-tax-fraud-irss-woeful-cybersecurity/</loc>
		<lastmod>2020-03-04T05:15:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42381372.jpg</image:loc>
			<image:title><![CDATA[security platform]]></image:title>
			<image:caption><![CDATA[Enso]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/GAO-Recommendations-IRS-2016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/equifax-story-roundup-equifax-separating-fact-fog-protect/</loc>
		<lastmod>2020-03-04T05:15:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto9837967-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto9837967]]></image:title>
			<image:caption><![CDATA[cybersecurity DevOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/eus-looming-gdpr-privacy-regulation-scaring/</loc>
		<lastmod>2020-03-04T05:15:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto5157692-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto5157692]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/security-boulevard-chats-bond-jane-bond-w-chenxi-wang-jane-bond-project/</loc>
		<lastmod>2020-03-04T05:15:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Bond2-1.jpg</image:loc>
			<image:title><![CDATA[Bond2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/forrester-report-outlines-true-cost-data-breaches/</loc>
		<lastmod>2020-03-04T05:15:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto19653961-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto19653961]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/mind-cybersecurity-skills-gap/</loc>
		<lastmod>2020-03-04T05:15:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto27395702.jpg</image:loc>
			<image:title><![CDATA[canstockphoto27395702]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/equifax-data-breach-qa-forrester-analyst-heidi-shey/</loc>
		<lastmod>2020-03-04T05:15:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto2552677.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2552677]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Heidi-Shey-NEOPDF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/blueborne-attack-can-compromise-bluetooth-enabled-devices/</loc>
		<lastmod>2020-03-04T05:15:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42371749.jpg</image:loc>
			<image:caption><![CDATA[spear phishing attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/equifax-rated-f-application-security-breach/</loc>
		<lastmod>2020-03-04T05:15:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto32425148-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32425148]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/its-not-you-its-not-me-its-we-devsecops/</loc>
		<lastmod>2020-03-04T05:15:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/open-source-devops-securitys-best-teacher/</loc>
		<lastmod>2020-03-04T05:15:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto30568388.jpg</image:loc>
			<image:title><![CDATA[canstockphoto30568388]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/equifax-data-breach-hits-half-american-consumers/</loc>
		<lastmod>2020-03-04T05:15:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto43700424.jpg</image:loc>
			<image:title><![CDATA[canstockphoto43700424]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/08/devops-chat-developers-security-pete-chestna-veracode/</loc>
		<lastmod>2020-03-04T05:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto25305740.jpg</image:loc>
			<image:title><![CDATA[canstockphoto25305740]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/critical-vulnerability-found-apache-struts/</loc>
		<lastmod>2020-03-04T05:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/dragonfly-cyberspy-group-ramps-attacks-energy-sector/</loc>
		<lastmod>2020-03-04T05:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto8441441.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8441441]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/security-boulevard-now/</loc>
		<lastmod>2020-03-04T05:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/asterisk-flaw-exposes-voip-calls-eavesdropping/</loc>
		<lastmod>2020-03-04T05:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto18533281.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18533281]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/security-boulevard-chats-devsecops-thing-w-mike-kail-cybric/</loc>
		<lastmod>2020-03-04T05:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tiktok-is-spyware-warns-reddit-ceo-we-dont-care-say-users/</loc>
		<lastmod>2020-03-04T05:27:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/tiktok-spyware-pd.jpg</image:loc>
			<image:title><![CDATA[tiktok-spyware--pd]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/meeting-trusted-data-privacy-compliance/</loc>
		<lastmod>2020-03-04T05:27:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Consumer-Data-Protection-Act.jpg</image:loc>
			<image:caption><![CDATA[data privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/clearview-a-startup-probably-holding-your-image-gets-hacked/</loc>
		<lastmod>2020-03-04T05:27:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/facial-recognition-ibm-research-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[facial-recognition--ibm-research--cc-by-nd]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/is-the-security-skills-shortage-overblown/</loc>
		<lastmod>2020-03-04T05:27:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Skills-Gap-Security.jpg</image:loc>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/making-the-move-to-multifactor-authentication/</loc>
		<lastmod>2020-03-04T05:27:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Automation-Lingua-Franca.jpg</image:loc>
			<image:caption><![CDATA[multifactor authentication]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-it-ops-can-maintain-security-and-agility-in-a-hybrid-cloud-world/</loc>
		<lastmod>2020-03-04T05:27:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Mitigating-Risks.jpg</image:loc>
			<image:caption><![CDATA[IT ops]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/malwarebytes-report-apple-os-x-threats-quadrupled-in-2019/</loc>
		<lastmod>2020-03-04T05:27:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/cyber.jpg</image:loc>
			<image:title><![CDATA[cyber]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/StatCounter-os_combined-ww-monthly-201901-202001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-personality-influences-cybersecurity-behavior/</loc>
		<lastmod>2020-03-04T05:27:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Compliance-Headaches.jpg</image:loc>
			<image:caption><![CDATA[personality]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/reduce-cloud-security-complexity-with-zero-touch-automation/</loc>
		<lastmod>2020-03-04T05:27:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto25409210.jpg</image:loc>
			<image:title><![CDATA[cloud security]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-devsecops-landscape-is-maturing-we-want-to-hear-about-your-journey/</loc>
		<lastmod>2020-03-04T05:27:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/canstockphoto11867964.jpg</image:loc>
			<image:title><![CDATA[canstockphoto11867964]]></image:title>
			<image:caption><![CDATA[DevSecOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/apple-goes-rogue-drops-unilateral-tls-certificate-guillotine/</loc>
		<lastmod>2020-03-04T05:27:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/tim-cook-iphonedigital-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[tim-cook--iphonedigital--cc-by-sa]]></image:title>
			<image:caption><![CDATA[TLS certificate]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/rsa-conference-2020-the-human-element-is-alive-and-well/</loc>
		<lastmod>2020-03-04T05:27:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/canstockphoto10834794.jpg</image:loc>
			<image:title><![CDATA[canstockphoto10834794]]></image:title>
			<image:caption><![CDATA[human]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/DigitalAnarchist.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/disa-breach-could-impact-200000-says-trumps-it-agency/</loc>
		<lastmod>2020-03-04T05:27:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/disa-cio-fyi-dod-pd.jpg</image:loc>
			<image:title><![CDATA[disa-cio-fyi--dod--pd]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/best-practices-for-vulnerability-disclosure-marketing/</loc>
		<lastmod>2020-03-04T05:27:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/canstockphoto29121291.jpg</image:loc>
			<image:title><![CDATA[canstockphoto29121291]]></image:title>
			<image:caption><![CDATA[vulnerability disclosure marketing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/election-security-a-2020-myth/</loc>
		<lastmod>2020-03-04T05:27:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/canstockphoto59918992.jpg</image:loc>
			<image:title><![CDATA[canstockphoto59918992]]></image:title>
			<image:caption><![CDATA[election security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/Rube-Goldberg-invention-cartoon-voting-machine-election.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/chernobyl-and-its-cyber-lessons-part-2-incident-response/</loc>
		<lastmod>2020-03-04T05:27:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/canstockphoto32031098.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32031098]]></image:title>
			<image:caption><![CDATA[incident response Chernobyl]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/survey-trump-not-as-smart-as-the-it-director/</loc>
		<lastmod>2020-03-04T05:27:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/trump-state-dept-pd.jpg</image:loc>
			<image:title><![CDATA[Official Portrait, President Donald J. Trump]]></image:title>
			<image:caption><![CDATA[Trump IT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cybersecurity-2020-innovate-or-surrender-the-digital-economy/</loc>
		<lastmod>2020-03-04T05:27:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Strategies.jpg</image:loc>
			<image:caption><![CDATA[digital economy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/companies-dont-trust-themselves-with-zero-trust/</loc>
		<lastmod>2020-03-04T05:27:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Cybersecurity-Automation-Ambitions.jpg</image:loc>
			<image:caption><![CDATA[zero trust]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/iran-backdoors-dozens-of-companies-via-vpn-1-day-vulnerabilities/</loc>
		<lastmod>2020-03-04T05:27:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/fox-kits-zion-national-park-cc-by.jpg</image:loc>
			<image:title><![CDATA[fox-kits--zion-national-park--cc-by]]></image:title>
			<image:caption><![CDATA[VPN backdoors]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/assessing-sign-in-with-apples-impact-on-development/</loc>
		<lastmod>2020-03-04T05:27:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/IAM-Solution-Organization.jpg</image:loc>
			<image:caption><![CDATA[passwords]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/500-google-chrome-extensions-stealing-your-data-for-years/</loc>
		<lastmod>2020-03-04T05:27:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/phishing-christiaan-colen-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[phishing--christiaan-colen--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Chrome extensions]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/devops-chats-tufin-securecloud-secures-hybrid-cloud-environments/</loc>
		<lastmod>2020-03-04T05:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Cloud-Breach.jpg</image:loc>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/scalability-critical-in-manufacturing-iot-cybersecurity/</loc>
		<lastmod>2020-03-04T05:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/canstockphoto47063224.jpg</image:loc>
			<image:title><![CDATA[canstockphoto47063224]]></image:title>
			<image:caption><![CDATA[IoT manufacturing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-klaxon-sounds-on-rings-privacy-trust-issues/</loc>
		<lastmod>2020-03-04T05:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/Ring.camera.jpeg</image:loc>
			<image:title><![CDATA[Ring.camera]]></image:title>
			<image:caption><![CDATA[Ring]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cisos-and-the-transformative-iot-cybersecurity-mandate/</loc>
		<lastmod>2020-03-04T05:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cybersecurity-Skills-Gap.jpg</image:loc>
			<image:caption><![CDATA[remote workforce]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-we-can-learn-from-cyber-resilient-leaders/</loc>
		<lastmod>2020-03-04T05:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Leadership-Security.jpg</image:loc>
			<image:caption><![CDATA[CISO role]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/more-ceos-ditching-social-media-over-security-concerns/</loc>
		<lastmod>2020-03-04T05:27:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SupplyChain-1.jpg</image:loc>
			<image:caption><![CDATA[Hamas]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/2017-equifax-hack-it-was-the-chinese-army-alleges-doj/</loc>
		<lastmod>2020-03-04T05:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/apt10-doj-pd.jpg</image:loc>
			<image:title><![CDATA[apt10--doj--pd]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/is-your-web-host-taking-cybersecurity-seriously/</loc>
		<lastmod>2020-03-04T05:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Life-Insurance-Privacy.jpg</image:loc>
			<image:caption><![CDATA[web host]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/rip-passwords-hello-biometrics/</loc>
		<lastmod>2020-03-04T05:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Facial-Recognition-Surveillance.jpg</image:loc>
			<image:caption><![CDATA[data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/busted-wacom-secretly-tracks-how-you-use-your-apps/</loc>
		<lastmod>2020-03-04T05:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/secret-christelle-prieur-pixabay.jpg</image:loc>
			<image:title><![CDATA[secret--christelle-prieur--pixabay]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/3-strategies-for-better-security-and-compliance/</loc>
		<lastmod>2020-03-04T05:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Cybersecurity-Teams.jpg</image:loc>
			<image:caption><![CDATA[compliance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/biggest-password-mistakes-notes-from-an-expert/</loc>
		<lastmod>2020-03-04T05:27:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Password-Apathy.jpg</image:loc>
			<image:caption><![CDATA[password]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/your-smartphone-ground-zero-for-cyberattacks/</loc>
		<lastmod>2020-03-04T05:27:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/2FA-Broken-Evolving.jpg</image:loc>
			<image:caption><![CDATA[access]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/are-we-phish-in-a-barrel/</loc>
		<lastmod>2020-03-04T05:27:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Phishing-Exploits-Gullibility.jpg</image:loc>
			<image:caption><![CDATA[phishing attack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/forgot-to-renew-your-tls-certificate-microsoft/</loc>
		<lastmod>2020-03-04T05:27:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/teams-cert-geraldinelemeur-cc-by.jpg</image:loc>
			<image:title><![CDATA[LE WEB PARIS 2013 - CONFERENCES - PLENARY 1 - SATYA NADELLA]]></image:title>
			<image:caption><![CDATA[certificate]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/security-strategy-moving-away-from-tried-and-true/</loc>
		<lastmod>2020-03-04T05:27:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Cybersecurity-Challenges-Climb.jpg</image:loc>
			<image:caption><![CDATA[security strategy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/5-tools-to-make-the-case-for-security-budget/</loc>
		<lastmod>2020-03-04T05:27:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SAP.jpg</image:loc>
			<image:title><![CDATA[protecting]]></image:title>
			<image:caption><![CDATA[c-suite]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mobile-app-security-securing-from-the-start/</loc>
		<lastmod>2020-03-04T05:27:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/android-rob-bulmahn-cc-by.jpg</image:loc>
			<image:title><![CDATA[android--rob-bulmahn--cc-by]]></image:title>
			<image:caption><![CDATA[app security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/devops-chats-analyzing-whitehat-securitys-devsecops-survey-results/</loc>
		<lastmod>2020-03-04T05:27:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/New-Executive-Order.jpg</image:loc>
			<image:caption><![CDATA[WhiteHat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cyberattacks-are-changing-heres-how/</loc>
		<lastmod>2020-03-04T05:27:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/FUD-Security-Breach.jpg</image:loc>
			<image:caption><![CDATA[cyberattack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/7-key-features-of-a-breach-and-attack-system/</loc>
		<lastmod>2020-03-04T05:27:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/AI-Federal-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[Qualys]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/facebooks-latest-privacy-fail-costs-company-550m/</loc>
		<lastmod>2020-03-04T05:27:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/zuckerberg-anthony-quintano-cc-by.jpg</image:loc>
			<image:title><![CDATA[zuckerberg--anthony-quintano--cc-by]]></image:title>
			<image:caption><![CDATA[Facebook privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/vehicle-security-what-a-cybertruck-should-really-look-like/</loc>
		<lastmod>2020-03-04T05:27:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/1600px-Tesla_Cybertruck_outside_unveil.jpg</image:loc>
			<image:title><![CDATA[Tesla_Cybertruck]]></image:title>
			<image:caption><![CDATA[vehicle security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/for-msps-and-smbs-the-best-defense-is-an-educated-defense/</loc>
		<lastmod>2020-03-04T05:27:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto26421253.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26421253]]></image:title>
			<image:caption><![CDATA[Netsurion]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/assessing-the-dangers-caused-by-cryptojacking/</loc>
		<lastmod>2020-03-04T05:27:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Manufacturers.jpg</image:loc>
			<image:title><![CDATA[Manufacturers]]></image:title>
			<image:caption><![CDATA[cryptojacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/low-intensity-conflict-cyber-irans-next-move/</loc>
		<lastmod>2020-03-04T05:27:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/canstockphoto55966032.jpg</image:loc>
			<image:title><![CDATA[canstockphoto55966032]]></image:title>
			<image:caption><![CDATA[low-intensity conflict]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/survey-smbs-plan-to-embrace-ai-but-dont-know-the-risks/</loc>
		<lastmod>2020-03-04T05:27:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto45375694.jpg</image:loc>
			<image:title><![CDATA[canstockphoto45375694]]></image:title>
			<image:caption><![CDATA[AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/detect-cyberattacks-early-for-business-resiliency/</loc>
		<lastmod>2020-03-04T05:27:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto6511232.jpg</image:loc>
			<image:title><![CDATA[canstockphoto6511232]]></image:title>
			<image:caption><![CDATA[coronavirus]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/microsoft-leaks-250m-customer-details-in-azure-fat-finger-faux-pas/</loc>
		<lastmod>2020-03-04T05:27:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/support-Gregg-Jackson-pixabay.jpg</image:loc>
			<image:title><![CDATA[support--Gregg-Jackson--pixabay]]></image:title>
			<image:caption><![CDATA[customers Azure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-ways-to-prevent-data-leakage/</loc>
		<lastmod>2020-03-04T05:27:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Rethinking-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[data leakage]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-ways-to-get-the-most-from-your-pam-program/</loc>
		<lastmod>2020-03-04T05:27:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/DevSecOps-RSAC.jpg</image:loc>
			<image:caption><![CDATA[meeting]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/who-should-the-ciso-report-to-in-2020/</loc>
		<lastmod>2020-03-04T05:27:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Job-Seekers.jpg</image:loc>
			<image:caption><![CDATA[CISOs report to]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/devops-chats-security-for-developers-with-shiftleft/</loc>
		<lastmod>2020-03-04T05:27:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto26816885.jpg</image:loc>
			<image:title><![CDATA[DevOps and Security]]></image:title>
			<image:caption><![CDATA[DevSecOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/best-practices-in-database-security-planning/</loc>
		<lastmod>2020-03-04T05:27:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Dark-Patterns-Personal-Data.jpg</image:loc>
			<image:caption><![CDATA[database security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/it-teams-need-more-than-password-managers/</loc>
		<lastmod>2020-03-04T05:28:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Preventing-Security-Breaches.jpg</image:loc>
			<image:caption><![CDATA[healthcare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-pros-offer-best-bangs-for-2020-budget/</loc>
		<lastmod>2020-03-04T05:28:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Skills-Gap-CISOs.jpg</image:loc>
			<image:caption><![CDATA[security budget]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/oracle-spews-334-patches-many-critical-you-know-the-drill/</loc>
		<lastmod>2020-03-04T05:28:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/drill-marco-verch-cc-by.jpg</image:loc>
			<image:title><![CDATA[Electric drill holding a man in his hand]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/keep-telnet-off-the-internet-heres-why/</loc>
		<lastmod>2020-03-04T05:28:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/linux-donald-clark-pixabay.jpg</image:loc>
			<image:title><![CDATA[linux--donald-clark--pixabay]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/top-3-myths-about-homomorphic-encryption/</loc>
		<lastmod>2020-03-04T05:28:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Advanced-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Advanced-Cybersecurity]]></image:title>
			<image:caption><![CDATA[homomorphic encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/protecting-web-apps-against-client-side-javascript-attacks/</loc>
		<lastmod>2020-03-04T05:28:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/TCP-IP-Log-Data.jpg</image:loc>
			<image:title><![CDATA[TCP-IP-Log-Data]]></image:title>
			<image:caption><![CDATA[value data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/compliance-and-privacy-in-the-gdpr-era/</loc>
		<lastmod>2020-03-04T05:28:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Employee-Convenience.jpg</image:loc>
			<image:caption><![CDATA[cyber insurance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cloud-misconfigurations-the-security-problem-coming-from-inside-it/</loc>
		<lastmod>2020-03-04T05:28:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto35008730.jpg</image:loc>
			<image:caption><![CDATA[cloud miconfigurations]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/patch-tuesday-panic-extraordinarily-serious-bug-in-cryptoapi/</loc>
		<lastmod>2020-03-04T05:28:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/satya-panic-geraldinelemeur-cc-by.jpg</image:loc>
			<image:title><![CDATA[LE WEB PARIS 2013 - CONFERENCES - PLENARY 1 - SATYA NADELLA]]></image:title>
			<image:caption><![CDATA[patch]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/billions-of-medical-images-leaked-in-huge-privacy-puzzle/</loc>
		<lastmod>2020-03-04T05:28:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/mri-puzzle-stephen-hampshire-cc-by.jpg</image:loc>
			<image:title><![CDATA[mri-puzzle--stephen-hampshire--cc-by]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/businesses-warned-on-iran-cyberattacks/</loc>
		<lastmod>2020-03-04T05:28:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/canstockphoto1683907.jpg</image:loc>
			<image:title><![CDATA[canstockphoto1683907]]></image:title>
			<image:caption><![CDATA[Iran]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-non-human-entities-that-plague-the-cloud/</loc>
		<lastmod>2020-03-04T05:28:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Resilient-Cloud-Security.jpg</image:loc>
			<image:title><![CDATA[Resilient-Cloud-Security]]></image:title>
			<image:caption><![CDATA[entities cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/predict-2020-a-look-at-what-the-new-year-will-bring/</loc>
		<lastmod>2020-03-04T05:28:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/Blog-1.png</image:loc>
			<image:title><![CDATA[Blog-1]]></image:title>
			<image:caption><![CDATA[Predict 2020]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fcc-subsidized-sprint-phones-have-malware-preinstalled/</loc>
		<lastmod>2020-03-04T05:28:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/umx.jpg</image:loc>
			<image:title><![CDATA[umx]]></image:title>
			<image:caption><![CDATA[phones malware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/firefox-critical-zero-day-being-exploited-patch-now/</loc>
		<lastmod>2020-03-04T05:28:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/firefox-peter-trimming-cc-by.jpg</image:loc>
			<image:title><![CDATA[firefox-peter-trimming-cc-by]]></image:title>
			<image:caption><![CDATA[Firefox]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/encrypted-traffic-analysis-will-be-mandatory-soon/</loc>
		<lastmod>2020-03-04T05:28:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/canstockphoto14376163.jpg</image:loc>
			<image:title><![CDATA[canstockphoto14376163]]></image:title>
			<image:caption><![CDATA[encrypted traffic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-quick-guide-to-sd-wan-security/</loc>
		<lastmod>2020-03-04T05:28:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto26816885.jpg</image:loc>
			<image:title><![CDATA[DevOps and Security]]></image:title>
			<image:caption><![CDATA[DevSecOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/shielding-applications-to-prevent-ddos-attacks/</loc>
		<lastmod>2020-03-04T05:28:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Fileless-Malware.jpg</image:loc>
			<image:caption><![CDATA[virus]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/rethinking-network-performance-and-internal-security/</loc>
		<lastmod>2020-03-04T05:28:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/SMB-Good-Security.jpg</image:loc>
			<image:caption><![CDATA[code-signing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/london-stock-exchange-outage-a-cyberattack-by-iran/</loc>
		<lastmod>2020-03-04T05:28:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/soleimani-iran-cc-by.jpg</image:loc>
			<image:title><![CDATA[????? ???????? ??????????? ????????? ????? ???????? ?? ?????? ???? ?????]]></image:title>
			<image:caption><![CDATA[London Stock Exchange cyberattack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/hackers-are-targeting-your-small-business/</loc>
		<lastmod>2020-03-04T05:28:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/canstockphoto27452930.jpg</image:loc>
			<image:title><![CDATA[canstockphoto27452930]]></image:title>
			<image:caption><![CDATA[small business]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xiaomi-iot-cameras-leak-private-stills-via-google-home-hub/</loc>
		<lastmod>2020-03-04T05:28:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/xiaomi-cam-error.jpg</image:loc>
			<image:title><![CDATA[xiaomi-cam-error]]></image:title>
			<image:caption><![CDATA[Xiaomi cameras]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2020-tax-season-scams-already-underway/</loc>
		<lastmod>2020-03-04T05:28:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/canstockphoto5276460.jpg</image:loc>
			<image:title><![CDATA[canstockphoto5276460]]></image:title>
			<image:caption><![CDATA[2020 tax scams]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/4-questions-and-answers-about-implementing-orchestration-in-federal-agencies/</loc>
		<lastmod>2020-03-04T05:28:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto47950254-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto47950254]]></image:title>
			<image:caption><![CDATA[security testing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/end-of-life-devices-pose-data-breach-risk/</loc>
		<lastmod>2020-03-04T05:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Dark-Patterns-Personal-Data.jpg</image:loc>
			<image:caption><![CDATA[database security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/network-operators-must-automate-their-way-to-5g/</loc>
		<lastmod>2020-03-04T05:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/canstockphoto25828841.jpg</image:loc>
			<image:title><![CDATA[canstockphoto25828841]]></image:title>
			<image:caption><![CDATA[5G]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/deepfakes-pose-new-security-challenges/</loc>
		<lastmod>2020-03-04T05:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/canstockphoto14758614.jpg</image:loc>
			<image:title><![CDATA[canstockphoto14758614]]></image:title>
			<image:caption><![CDATA[deepfake]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cyberattacks-top-5-ways-you-could-be-hacked-in-2020/</loc>
		<lastmod>2020-03-04T05:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Fileless-Malware-RSAC.jpg</image:loc>
			<image:caption><![CDATA[Zerologon]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/privacy-where-security-and-ethics-miss-the-mark/</loc>
		<lastmod>2020-03-04T05:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Security-Paranoia.jpg</image:loc>
			<image:caption><![CDATA[privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-new-privacy-rules-change-corporate-cybersecurity/</loc>
		<lastmod>2020-03-04T05:28:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Data-Protection-Officer.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/companies-ignoring-third-party-breach-alerts/</loc>
		<lastmod>2020-03-04T05:28:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/canstockphoto3693866.jpg</image:loc>
			<image:title><![CDATA[canstockphoto3693866]]></image:title>
			<image:caption><![CDATA[breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/predictions-2020-iot-and-digital-transformation/</loc>
		<lastmod>2020-03-04T05:28:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Strategies.jpg</image:loc>
			<image:caption><![CDATA[digital economy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/happy-holidays-from-security-boulevard/</loc>
		<lastmod>2020-03-04T05:28:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/HappyHolidays.png</image:loc>
			<image:title><![CDATA[HappyHolidays]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/first-amendment-fight-twitter-threat-ends-in-conviction/</loc>
		<lastmod>2020-03-04T05:28:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/canstockphoto14905993.jpg</image:loc>
			<image:title><![CDATA[canstockphoto14905993]]></image:title>
			<image:caption><![CDATA[First Amendment]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/totok-app-deleted-uae-accused-of-spyware-scandal/</loc>
		<lastmod>2020-03-04T05:28:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/sheikh-khalifa-kremlin-pd.jpg</image:loc>
			<image:title><![CDATA[Khalifa bin Zayed bin Sultan Al Nahyan]]></image:title>
			<image:caption><![CDATA[ToTok]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/predictions-2020-is-security-automation-the-answer/</loc>
		<lastmod>2020-03-04T05:28:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Managed-Security-Services.jpg</image:loc>
			<image:caption><![CDATA[automation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/predictions-2020-keeping-secure-in-the-new-year/</loc>
		<lastmod>2020-03-04T05:28:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cybersecurity-Challenges.jpg</image:loc>
			<image:caption><![CDATA[Styra]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/rapid-cloud-adoption-introduces-security-risks/</loc>
		<lastmod>2020-03-04T05:28:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Simplifying-Security-Cloud.jpg</image:loc>
			<image:title><![CDATA[Simplifying-Security-Cloud]]></image:title>
			<image:caption><![CDATA[data classification]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/digital-banks-targeted-in-account-takeover-scams/</loc>
		<lastmod>2020-03-04T05:28:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Web-Mobile-DevSecOps.jpg</image:loc>
			<image:caption><![CDATA[data security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/bankpic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/bankpic2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/bankpic3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/bankpic4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-more-cybersecurity-changes-the-more-it-stays-the-same/</loc>
		<lastmod>2020-03-04T05:28:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/IT-Security-Fault.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/shady-tracking-firms-are-selling-your-gps-location-history/</loc>
		<lastmod>2020-03-04T05:28:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/gps-us-pnt-pd.jpg</image:loc>
			<image:title><![CDATA[gps--us-pnt--pd]]></image:title>
			<image:caption><![CDATA[location tracking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ryuk-cult-character-to-ransomware-villain/</loc>
		<lastmod>2020-03-04T05:28:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/How-Who-Cyberattacks.jpg</image:loc>
			<image:caption><![CDATA[Ryuk]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/ryuk-ransomware-screenshot.png</image:loc>
			<image:caption><![CDATA[Ryuk ransomware encrypted files (.ryk extension)]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hello-5g-goodbye-passwords-security-predictions-for-the-new-decade/</loc>
		<lastmod>2020-03-04T05:28:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Endpoints-Entropy-Chaos.jpg</image:loc>
			<image:caption><![CDATA[Sumo Logic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hacking-ring-security-cameras-amazon-makes-it-easy/</loc>
		<lastmod>2020-03-04T05:28:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/ring-brandon-oconnor-pd.jpg</image:loc>
			<image:title><![CDATA[ring--brandon-oconnor-pd]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/siem-more-relevant-than-ever-when-securing-the-edge/</loc>
		<lastmod>2020-03-04T05:28:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/SIEM-Real-Time.jpg</image:loc>
			<image:title><![CDATA[SIEM-Real-Time]]></image:title>
			<image:caption><![CDATA[SIEM with Real-Time Event Contextualization]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cameras-the-backdoor-of-the-security-industry/</loc>
		<lastmod>2020-03-04T05:28:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Security-Awareness-Officer-Role.jpg</image:loc>
			<image:title><![CDATA[camera]]></image:title>
			<image:caption><![CDATA[AI surveillance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybersecurity-chernobyl-and-its-cyber-lessons/</loc>
		<lastmod>2020-03-04T05:28:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/canstockphoto2398905.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2398905]]></image:title>
			<image:caption><![CDATA[cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/predictions-2020-cybersecurity-in-the-new-year/</loc>
		<lastmod>2020-03-04T05:28:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Cybersecurity-Struggles.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity]]></image:title>
			<image:caption><![CDATA[cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/predictions-2020-data-security-next-year-and-beyond/</loc>
		<lastmod>2020-03-04T05:28:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Security-Measures-Company.jpg</image:loc>
			<image:caption><![CDATA[remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/5-current-threats-worth-remembering/</loc>
		<lastmod>2020-03-04T05:28:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Malware-Marap-AdvisorsBot.jpg</image:loc>
			<image:caption><![CDATA[dark web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/apple-passive-aggressive-pr-sparks-privacy-fear-yet-again/</loc>
		<lastmod>2020-03-04T05:28:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/tim-cook-iphonedigital-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[tim-cook--iphonedigital--cc-by-sa]]></image:title>
			<image:caption><![CDATA[TLS certificate]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/lack-of-mobile-strategy-creates-security-holes/</loc>
		<lastmod>2020-03-04T05:28:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Passwords-Secret-Lives.jpg</image:loc>
			<image:caption><![CDATA[mobile strategy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-role-of-technology-in-the-modern-soc/</loc>
		<lastmod>2020-03-04T05:28:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/WordPress-Cybersecurity-Threats.jpg</image:loc>
			<image:title><![CDATA[security threat]]></image:title>
			<image:caption><![CDATA[Linux]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/are-passwords-now-passe/</loc>
		<lastmod>2020-03-04T05:28:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/strandhogg-pwns-80-of-android-phones-google-fiddles-while-platform-burns/</loc>
		<lastmod>2020-03-04T05:28:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/strandhogg-promon.jpg</image:loc>
			<image:title><![CDATA[Promon AS]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/learning-from-health-cares-iot-security-strategy/</loc>
		<lastmod>2020-03-04T05:28:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/canstockphoto12642178.jpg</image:loc>
			<image:title><![CDATA[canstockphoto12642178]]></image:title>
			<image:caption><![CDATA[healthcare COVID]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/quantum-computing-is-coming-are-you-cyber-ready/</loc>
		<lastmod>2020-03-04T05:28:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/canstockphoto4489816.jpg</image:loc>
			<image:title><![CDATA[canstockphoto4489816]]></image:title>
			<image:caption><![CDATA[quantum computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/devops-chats-cloud-native-apps-and-security-with-lacework/</loc>
		<lastmod>2020-03-04T05:28:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Hackathons-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[cloud-native security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/but-their-emails-many-2020-campaigns-still-risk-phishing-attacks/</loc>
		<lastmod>2020-03-04T05:28:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/white-house-the-white-house-pd.jpg</image:loc>
			<image:title><![CDATA[(Official White House Photo by Tia Dufour)]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/truedialog-leaks-600gb-of-personal-data-affecting-millions/</loc>
		<lastmod>2020-03-04T05:28:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/sms-christo-anestev-pixabay.jpg</image:loc>
			<image:title><![CDATA[sms--christo-anestev--pixabay]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/can-applications-withstand-the-zombieload-attack/</loc>
		<lastmod>2020-03-04T05:28:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/canstockphoto16180853.jpg</image:loc>
			<image:title><![CDATA[canstockphoto16180853]]></image:title>
			<image:caption><![CDATA[ZombieLoad]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/state-dmvs-are-selling-your-data-for-big-dollars/</loc>
		<lastmod>2020-03-04T05:28:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/dmv-for-sale-brian-cantoni-cc-by.jpg</image:loc>
			<image:title><![CDATA[dmv-for-sale--brian-cantoni--cc-by]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/buran-ransomware-looks-to-undercut-the-competition/</loc>
		<lastmod>2020-03-04T05:28:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/canstockphoto27773385.jpg</image:loc>
			<image:title><![CDATA[canstockphoto27773385]]></image:title>
			<image:caption><![CDATA[Buran]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/buran-encrypted-files.png</image:loc>
			<image:caption><![CDATA[Buran ransomware encrypted files]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/buran-note.png</image:loc>
			<image:caption><![CDATA[Buran ransom demanding message]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/safely-saving-and-securing-video-surveillance-files/</loc>
		<lastmod>2020-03-04T05:28:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Consumer-Privacy-Ring.jpg</image:loc>
			<image:caption><![CDATA[video surveillance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/google-waving-big-cash-1-5m-bounty-for-the-right-bug/</loc>
		<lastmod>2020-03-04T05:28:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/usd20-tim-sullivan-cc-0.jpg</image:loc>
			<image:title><![CDATA[usd20--tim-sullivan--cc-0]]></image:title>
			<image:caption><![CDATA[Google]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/understanding-the-zeros-beyond-zero-trust/</loc>
		<lastmod>2020-03-04T05:28:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Employees-Attack-Surface.jpg</image:loc>
			<image:caption><![CDATA[quantum computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/sodinokibi-and-the-successful-tactics-it-uses/</loc>
		<lastmod>2020-03-04T05:28:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Ransomware-Strains.jpg</image:loc>
			<image:title><![CDATA[Ransomware]]></image:title>
			<image:caption><![CDATA[ransom]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/sodinokibi-tor-website.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/sodinokibi-ransom-note.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/5-buffer-overflow-vulnerabilities-in-popular-apps/</loc>
		<lastmod>2020-03-04T05:28:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/SMB-Good-Security.jpg</image:loc>
			<image:caption><![CDATA[code-signing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/devops-chats-rsac-innovation-2020-with-cecilia-marinier/</loc>
		<lastmod>2020-03-04T05:28:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/canstockphoto11154849.jpg</image:loc>
			<image:title><![CDATA[canstockphoto11154849]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-position-the-enterprise-for-zero-trust-success/</loc>
		<lastmod>2020-03-04T05:28:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Attacks-Web-Mobile.jpg</image:loc>
			<image:caption><![CDATA[states cyber]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/8-tips-for-a-successful-hybrid-soc/</loc>
		<lastmod>2020-03-04T05:28:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Tariffs-Increase-Hacks.jpg</image:loc>
			<image:caption><![CDATA[hybrid SOC]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/security-and-the-open-office-environment/</loc>
		<lastmod>2020-03-04T05:28:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/canstockphoto33129846.jpg</image:loc>
			<image:title><![CDATA[canstockphoto33129846]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cybersecurity-career-path-a-beginners-guide/</loc>
		<lastmod>2020-03-04T05:28:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Safety-Act-Terrorism-Certified.jpg</image:loc>
			<image:title><![CDATA[Safety-Act-Terrorism-Certified]]></image:title>
			<image:caption><![CDATA[Bugcrowd]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/social-networking-privacy-concerns-impacting-businesses-and-consumers/</loc>
		<lastmod>2020-03-04T05:28:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/National-Privacy-Day.jpg</image:loc>
			<image:title><![CDATA[National-Privacy-Day]]></image:title>
			<image:caption><![CDATA[National Data Privacy Law]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/pew-survey-america-worries-about-privacy-but-wont-do-anything-about-it/</loc>
		<lastmod>2020-03-04T05:28:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/worry-bryan-rosengrant-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[worry--bryan-rosengrant--cc-by-nd]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/reasons-behind-the-cybersecurity-skills-gap/</loc>
		<lastmod>2020-03-04T05:28:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Skills-Gap-Security.jpg</image:loc>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/phishing-increasingly-targets-saas-webmail/</loc>
		<lastmod>2020-03-04T05:28:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Phishing-Exploits-Gullibility.jpg</image:loc>
			<image:caption><![CDATA[phishing attack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/1password-secures-200m-in-series-a-funding-heads-for-the-enterprise/</loc>
		<lastmod>2020-03-04T05:28:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/password-christoph-scholz-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[password--christoph-scholz--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Password]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/security-threats-are-swamping-it/</loc>
		<lastmod>2020-03-04T05:28:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/canstockphoto54457272-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto54457272 (1)]]></image:title>
			<image:caption><![CDATA[data secure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/tpm-fail-intel-and-stmicro-fix-26-year-old-vulnerability/</loc>
		<lastmod>2020-03-04T05:28:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/fail-dunk-cc-by.jpg</image:loc>
			<image:title><![CDATA[fail--dunk--cc-by]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/network-infrastructure-security-an-underserved-market/</loc>
		<lastmod>2020-03-04T05:28:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/VPN-Leaks.jpg</image:loc>
			<image:caption><![CDATA[security testing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/zeronorth-brings-risk-intelligence-to-devops/</loc>
		<lastmod>2020-03-04T05:28:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Third-Party-Risk-Assessment.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity legislation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/business-espionage-security-threats-for-small-business-owners/</loc>
		<lastmod>2020-03-04T05:33:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Critical-Security-Controls.jpg</image:loc>
			<image:title><![CDATA[protection]]></image:title>
			<image:caption><![CDATA[Ivanti]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/SBsecuritypic1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/google-slurps-150-hospitals-patient-data-with-no-consent/</loc>
		<lastmod>2020-03-04T05:33:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/florence-nightingale-university-of-texas-pd.jpg</image:loc>
			<image:title><![CDATA[florence-nightingale--university-of-texas--pd]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/aventura-charged-with-selling-chinese-made-security-equipment/</loc>
		<lastmod>2020-03-04T05:33:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Ethics-Disclosure-Chinese.jpg</image:loc>
			<image:caption><![CDATA[China Anthem hack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/maze-ransomware-exploiting-exploit-kits/</loc>
		<lastmod>2020-03-04T05:33:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Ransomware-Recovery.jpg</image:loc>
			<image:caption><![CDATA[Maze]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/maze-ransomware-encrypted-files.png</image:loc>
			<image:caption><![CDATA[maze ransomware encrypted files]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/maze-ransomware-ransom-demanding-message.png</image:loc>
			<image:caption><![CDATA[maze ransomware - ransom demanding message]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-avoid-an-iot-doomsday/</loc>
		<lastmod>2020-03-04T05:33:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/IoT-Security-Approach.jpg</image:loc>
			<image:title><![CDATA[IoT]]></image:title>
			<image:caption><![CDATA[digital transformation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/saudi-arabia-pays-twitter-insiders-300k-for-account-info/</loc>
		<lastmod>2020-03-04T05:33:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/canstockphoto26236772.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26236772]]></image:title>
			<image:caption><![CDATA[Twitter Saudi]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-gamification-can-improve-enterprise-cybersecurity-posture/</loc>
		<lastmod>2020-03-04T05:33:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/AI-Federal-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[Qualys]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/report-underscores-growing-awareness-of-application-security/</loc>
		<lastmod>2020-03-04T05:33:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17608370.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17608370]]></image:title>
			<image:caption><![CDATA[Qualys endpoint]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/defense-in-depth-key-for-healthcare-data/</loc>
		<lastmod>2020-03-04T05:33:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Preventing-Security-Breaches.jpg</image:loc>
			<image:caption><![CDATA[healthcare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/saudi-arabia-paid-twitter-staff-to-spy-on-dissidents-alleges-doj/</loc>
		<lastmod>2020-03-04T05:33:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/mbs-donkeyhotey-cc-by.jpg</image:loc>
			<image:title><![CDATA[mbs--donkeyhotey--cc-by]]></image:title>
			<image:caption><![CDATA[Twitter]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/can-zero-trust-solutions-protect-hybrid-multi-cloud-networks/</loc>
		<lastmod>2020-03-04T05:33:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Zero-Trust.jpg</image:loc>
			<image:title><![CDATA[Zero-Trust]]></image:title>
			<image:caption><![CDATA[Implementing Zero Trust Model]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/time-is-money-and-poor-pam-can-cost-you-both/</loc>
		<lastmod>2020-03-04T05:33:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/IAM-Solution-Organization.jpg</image:loc>
			<image:caption><![CDATA[passwords]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cyber-hygiene-boosting-your-security-posture/</loc>
		<lastmod>2020-03-04T05:33:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Workplace-Privacy-Accidents.jpg</image:loc>
			<image:caption><![CDATA[VPAM]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ransomware-attacks-keep-growing/</loc>
		<lastmod>2020-03-04T05:33:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Breach-Incidents-2019.jpg</image:loc>
			<image:title><![CDATA[ransomware]]></image:title>
			<image:caption><![CDATA[Egregor]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-fortnite-teaches-us-about-security-awareness/</loc>
		<lastmod>2020-03-04T05:33:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/Fortnite.jpg</image:loc>
			<image:title><![CDATA[Fortnite]]></image:title>
			<image:caption><![CDATA[Fortnite]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bluekeep-panic-as-rce-rdp-exploit-floods-the-net/</loc>
		<lastmod>2020-03-04T05:33:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/bluekeep-hbo-fair-use.jpg</image:loc>
			<image:title><![CDATA[bluekeep--hbo--fair-use]]></image:title>
			<image:caption><![CDATA[BlueKeep]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/securing-the-smb-with-a-small-budget/</loc>
		<lastmod>2020-03-04T05:33:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Fortifying-Security-Landscape.jpg</image:loc>
			<image:caption><![CDATA[securing the SMB]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/managing-risk-during-an-ma/</loc>
		<lastmod>2020-03-04T05:33:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Automate-Software-Security.jpg</image:loc>
			<image:caption><![CDATA[M&amp;A]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/paving-the-way-to-security-compliance/</loc>
		<lastmod>2020-03-04T05:33:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Cybersecurity-Teams.jpg</image:loc>
			<image:caption><![CDATA[compliance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/data-ethics-the-next-wave-of-employee-security-awareness/</loc>
		<lastmod>2020-03-04T05:33:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Skills-Gap-Security.jpg</image:loc>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/porn-user-face-scans-australia-thinks-of-the-children/</loc>
		<lastmod>2020-03-04T05:33:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/ScottMorrisonMP.jpg</image:loc>
			<image:title><![CDATA[ScottMorrisonMP]]></image:title>
			<image:caption><![CDATA[face scans]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/best-westerns-massive-data-leak-179gb-amazon-database-open-to-all/</loc>
		<lastmod>2020-03-04T05:34:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/best-western-raysonho-cc0.jpg</image:loc>
			<image:title><![CDATA[best-western--raysonho--cc0]]></image:title>
			<image:caption><![CDATA[Autoclerk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/devops-chat-charting-a-new-devsecops-course-with-zeronorth/</loc>
		<lastmod>2020-03-04T05:34:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/canstockphoto8171113.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8171113]]></image:title>
			<image:caption><![CDATA[ZeroNorth]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/making-a-case-for-tokenization-in-the-enterprise/</loc>
		<lastmod>2020-03-04T05:34:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/12-Factor-App.jpg</image:loc>
			<image:caption><![CDATA[tokenization]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/when-should-a-startup-hire-a-ciso/</loc>
		<lastmod>2020-03-04T05:34:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17405520.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17405520]]></image:title>
			<image:caption><![CDATA[fraud COVID]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/will-regulations-secure-the-iot-wild-west/</loc>
		<lastmod>2020-03-04T05:34:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Securing-IoT-Time.jpg</image:loc>
			<image:title><![CDATA[IoT]]></image:title>
			<image:caption><![CDATA[IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/assessing-content-management-system-security/</loc>
		<lastmod>2020-03-04T05:34:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/IAM-Solution-Organization.jpg</image:loc>
			<image:caption><![CDATA[passwords]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/workarounds-for-two-factor-authentication-in-a-workplace-that-isnt-byod-friendly/</loc>
		<lastmod>2020-03-04T05:34:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/China-Social-Credit.jpg</image:loc>
			<image:caption><![CDATA[survey security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/muhstik-ransomware-a-hack-back-story/</loc>
		<lastmod>2020-03-04T05:34:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Data-Breach-Disclosures.jpg</image:loc>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/muhstik-ransomware-ransom-note.png</image:loc>
			<image:caption><![CDATA[Muhstik ransomware ransom demanding message]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/countdown-to-zero-why-zero-trust-is-in-the-spotlight/</loc>
		<lastmod>2020-03-04T05:34:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/canstockphoto58185240.jpg</image:loc>
			<image:title><![CDATA[canstockphoto58185240]]></image:title>
			<image:caption><![CDATA[zero trust]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/protecting-critical-infrastructure-from-cybersecurity-threats/</loc>
		<lastmod>2020-03-04T05:34:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/canstockphoto3170249.jpg</image:loc>
			<image:title><![CDATA[canstockphoto3170249]]></image:title>
			<image:caption><![CDATA[critical infrastructure]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/Headshot-for-ICS-OT-article-Tamar-Shlimak.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nordvpn-breached-for-a-year-firm-waits-7-more-months-to-disclose/</loc>
		<lastmod>2020-03-04T05:34:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/k2-maria-ly-cc-by.jpg</image:loc>
			<image:title><![CDATA[k2--maria-ly--cc-by]]></image:title>
			<image:caption><![CDATA[NordVPN]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-dangers-of-dns-hijacking-ending-cyber-insecurity/</loc>
		<lastmod>2020-03-04T05:34:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Economic-Espionage-GE.jpg</image:loc>
			<image:caption><![CDATA[DNS hijacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/situational-intelligence-providing-answers-in-moments-of-crisis/</loc>
		<lastmod>2020-03-04T05:34:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Doing-Automation-Right.jpg</image:loc>
			<image:title><![CDATA[data]]></image:title>
			<image:caption><![CDATA[business risk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/smbs-want-better-security-msps-struggle-to-provide-it/</loc>
		<lastmod>2020-03-04T05:34:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/AI-Machine-Learning.jpg</image:loc>
			<image:title><![CDATA[MSPs]]></image:title>
			<image:caption><![CDATA[MSPs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/to-mitigate-insider-threats-time-is-of-the-essence/</loc>
		<lastmod>2020-03-04T05:34:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Cryptojacking-New-Ransomware.jpg</image:loc>
			<image:caption><![CDATA[insider threats]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/samsung-fingerprint-bug-worse-than-we-thought/</loc>
		<lastmod>2020-03-04T05:34:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/fingerprint-stux-pixabay.jpg</image:loc>
			<image:title><![CDATA[fingerprint--stux--pixabay]]></image:title>
			<image:caption><![CDATA[fingerprint]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/gdpr-one-year-on-lessons-learned/</loc>
		<lastmod>2020-03-04T05:34:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Third-Party-Risk-Assessment.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity legislation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hybrid-clouds-impact-on-financial-services-security/</loc>
		<lastmod>2020-03-04T05:34:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto18974507.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18974507]]></image:title>
			<image:caption><![CDATA[cloud data]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/Richard_Harmon-096-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/devops-chat-data-protection-in-the-cloud-with-druva/</loc>
		<lastmod>2020-03-04T05:34:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Network-Security-Multi-Cloud.jpg</image:loc>
			<image:caption><![CDATA[data protection]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/devops-chat-decrypting-next-gen-tls-with-nubeva/</loc>
		<lastmod>2020-03-04T05:34:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17608370.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17608370]]></image:title>
			<image:caption><![CDATA[Qualys endpoint]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/health-care-and-hipaa-compliant-data-storage/</loc>
		<lastmod>2020-03-04T05:34:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Ransomware-Health-Care.jpg</image:loc>
			<image:title><![CDATA[healthcare]]></image:title>
			<image:caption><![CDATA[healthcare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sudo-read-this-warning-about-lpe-bug-in-sudo/</loc>
		<lastmod>2020-03-04T05:34:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/sudo-jwwier-cc-by-nc.jpg</image:loc>
			<image:title><![CDATA[sudo--jwwier--cc-by-nc]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-guide-to-finding-a-trusted-mssp/</loc>
		<lastmod>2020-03-04T05:34:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17786197.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17786197]]></image:title>
			<image:caption><![CDATA[automation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/itunes-for-windows-zero-day-exploited-for-ransomware/</loc>
		<lastmod>2020-03-04T05:34:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/itunes-ian-dick-cc-by.jpg</image:loc>
			<image:title><![CDATA[itunes--ian-dick--cc-by]]></image:title>
			<image:caption><![CDATA[iTunes]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/getting-on-top-of-enterprise-cyber-risk-management/</loc>
		<lastmod>2020-03-04T05:34:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Asymmetric-Cyberwarfare.jpg</image:loc>
			<image:caption><![CDATA[risk management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/keeping-digital-assets-safe-security-for-dam/</loc>
		<lastmod>2020-03-04T05:34:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/08/canstockphoto18318562.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18318562]]></image:title>
			<image:caption><![CDATA[DAM]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hackers-impersonating-other-hacker-types/</loc>
		<lastmod>2020-03-04T05:34:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto48825962.jpg</image:loc>
			<image:title><![CDATA[canstockphoto48825962]]></image:title>
			<image:caption><![CDATA[hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/to-determine-insider-threat-risk-chart-it-out/</loc>
		<lastmod>2020-03-04T05:34:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto34390927-800x450.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34390927-800x450]]></image:title>
			<image:caption><![CDATA[insider threat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-closer-look-at-the-emotet-banking-trojan/</loc>
		<lastmod>2020-03-04T05:34:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Ransomware-Strains.jpg</image:loc>
			<image:title><![CDATA[Ransomware]]></image:title>
			<image:caption><![CDATA[ransom]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/snowden-emotet-email.jpg</image:loc>
			<image:caption><![CDATA[Email distributing emotet]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/emotet-email-attachemnt.png</image:loc>
			<image:caption><![CDATA[Emotet email attachment (Macros)]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ransomware-phishing-and-endpoint-attacks-the-top-3-cyberthreats/</loc>
		<lastmod>2020-03-04T05:34:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/WordPress.jpg</image:loc>
			<image:caption><![CDATA[ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/devops-chat-interactive-app-testing-with-synopsys/</loc>
		<lastmod>2020-03-04T05:34:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto9837967-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto9837967]]></image:title>
			<image:caption><![CDATA[cybersecurity DevOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/establishing-and-growing-your-security-framework/</loc>
		<lastmod>2020-03-04T05:34:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Employees-Attack-Surface.jpg</image:loc>
			<image:caption><![CDATA[quantum computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/automation-moving-from-detection-to-enforcement/</loc>
		<lastmod>2020-03-04T05:34:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cyber-Insurance.jpg</image:loc>
			<image:title><![CDATA[Cyber-Insurance]]></image:title>
			<image:caption><![CDATA[contractor]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/orchestrating-network-security-to-handle-cyberthreats/</loc>
		<lastmod>2020-03-04T05:34:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Infamous-Hacks-Phishes.jpg</image:loc>
			<image:title><![CDATA[Infamous-Hacks-Phishes]]></image:title>
			<image:caption><![CDATA[COVID-19]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/gartner-sase-poised-to-transform-cybersecurity/</loc>
		<lastmod>2020-03-04T05:34:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/Cloud-Security-Serverless-Data.jpg</image:loc>
			<image:caption><![CDATA[multicloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/public-cloud-transformation-keys-to-data-security/</loc>
		<lastmod>2020-03-04T05:34:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Securing-Cloud-Infrastructure.jpg</image:loc>
			<image:title><![CDATA[Securing-Cloud-Infrastructure]]></image:title>
			<image:caption><![CDATA[public cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/android-zero-day-panic-as-ancient-linux-flaw-forgotten/</loc>
		<lastmod>2020-03-04T05:34:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/android-fallen-gfkDSGN-pixabay.jpg</image:loc>
			<image:title><![CDATA[android-fallen--gfkDSGN--pixabay]]></image:title>
			<image:caption><![CDATA[Android]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/security-awareness-adding-a-business-context/</loc>
		<lastmod>2020-03-04T05:34:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Workplace-Privacy.jpg</image:loc>
			<image:title><![CDATA[Workplace-Privacy]]></image:title>
			<image:caption><![CDATA[business security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hackers-selling-business-customer-data-at-bargain-prices/</loc>
		<lastmod>2020-03-04T05:34:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Spotting-Insider-Threats.jpg</image:loc>
			<image:title><![CDATA[Spotting-Insider-Threats]]></image:title>
			<image:caption><![CDATA[business Data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/encryption-ban-u-s-uk-australia-try-to-change-how-math-works-again/</loc>
		<lastmod>2020-03-04T05:34:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/bill-barr-macro-donkeyhotey-cc-by.jpg</image:loc>
			<image:title><![CDATA[bill-barr-macro--donkeyhotey--cc-by]]></image:title>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/devops-chat-shifting-security-left-and-right-with-contrast-security/</loc>
		<lastmod>2020-03-04T05:34:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto16655657-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto16655657]]></image:title>
			<image:caption><![CDATA[security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-trouble-with-iot-technology/</loc>
		<lastmod>2020-03-04T05:34:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Home-Assistants.jpg</image:loc>
			<image:title><![CDATA[Home-Assistants]]></image:title>
			<image:caption><![CDATA[IoT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fileless-malware-on-the-rise/</loc>
		<lastmod>2020-03-04T05:34:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto39874704.jpg</image:loc>
			<image:title><![CDATA[canstockphoto39874704]]></image:title>
			<image:caption><![CDATA[fileless malware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/iso-27001-security-as-part-of-your-business-strategy/</loc>
		<lastmod>2020-03-04T05:34:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Risk-Vulnerability-Management.jpg</image:loc>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nac-usability-and-security-for-users/</loc>
		<lastmod>2020-03-04T05:34:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/National-Cyber-Strategy.jpg</image:loc>
			<image:caption><![CDATA[NAC]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/machine-authentication-solutions-plug-an-emerging-security-hole/</loc>
		<lastmod>2020-03-04T05:34:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto26580677.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26580677]]></image:title>
			<image:caption><![CDATA[machine authentication]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-seismic-shift-for-decrypted-visibility-in-the-cloud/</loc>
		<lastmod>2020-03-04T05:34:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto35169622.jpg</image:loc>
			<image:title><![CDATA[canstockphoto35169622]]></image:title>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/visibilitycloudpic1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/voting-machines-still-stupidly-insecure-say-defcon-hackers/</loc>
		<lastmod>2020-03-04T05:34:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/voting-defcon.jpg</image:loc>
			<image:title><![CDATA[voting--defcon]]></image:title>
			<image:caption><![CDATA[voting machines]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/spiceworks-state-of-it-study-security-spending-up/</loc>
		<lastmod>2020-03-04T05:34:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/canstockphoto54457272-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto54457272 (1)]]></image:title>
			<image:caption><![CDATA[data secure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/data-driven-health-care-reaping-benefits-without-risking-a-breach/</loc>
		<lastmod>2020-03-04T05:34:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Ransomware-Health-Care.jpg</image:loc>
			<image:title><![CDATA[healthcare]]></image:title>
			<image:caption><![CDATA[healthcare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/5m-users-doordash-data-duped-by-dastardly-deeds/</loc>
		<lastmod>2020-03-04T05:34:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/takeout-Ginny-Beck-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[takeout--Ginny-Beck--cc-by-sa]]></image:title>
			<image:caption><![CDATA[DoorDash]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ftc-holds-companies-accountable-for-online-lead-generators/</loc>
		<lastmod>2020-03-04T05:34:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Tech-Support-Void.jpg</image:loc>
			<image:caption><![CDATA[FTC]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/tips-to-strengthen-smbs-cybersecurity-approach/</loc>
		<lastmod>2020-03-04T05:34:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cyber-Risk-Paradox.jpg</image:loc>
			<image:caption><![CDATA[SMB cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/no-rsa-hasnt-been-cracked-but-crown-sterling-is-very-confused/</loc>
		<lastmod>2020-03-04T05:34:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/Robert-Grant-Strathspey-Crown.jpg</image:loc>
			<image:title><![CDATA[Robert-Grant--Strathspey-Crown]]></image:title>
			<image:caption><![CDATA[Crown Sterling]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/interpreting-moodys-research-on-the-implications-of-cyber-risk/</loc>
		<lastmod>2020-03-04T05:34:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto6511232.jpg</image:loc>
			<image:title><![CDATA[canstockphoto6511232]]></image:title>
			<image:caption><![CDATA[coronavirus]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/does-your-organization-get-chaos-engineering/</loc>
		<lastmod>2020-03-04T05:34:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Intent-Based-Security.jpg</image:loc>
			<image:title><![CDATA[networking]]></image:title>
			<image:caption><![CDATA[HashiCorp]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ma-and-networks-creating-an-expandable-secure-it-architecture/</loc>
		<lastmod>2020-03-04T05:34:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Kavanaugh-Internet.jpg</image:loc>
			<image:caption><![CDATA[Network]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/media-under-cyberattack-the-real-fake-news-threat/</loc>
		<lastmod>2020-03-04T05:34:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/canstockphoto47749321.jpg</image:loc>
			<image:title><![CDATA[canstockphoto47749321]]></image:title>
			<image:caption><![CDATA[fake news]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/networking-the-cyber-skills-gap/</loc>
		<lastmod>2020-03-04T05:34:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Job-Seekers.jpg</image:loc>
			<image:caption><![CDATA[CISOs report to]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/russian-sorm-%d1%81%d0%be%d1%80%d0%bc-isp-spyware-revealed-by-nokia-grunt/</loc>
		<lastmod>2020-03-04T05:34:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/russian-telecom-infrastructure-map-upguard.jpg</image:loc>
			<image:title><![CDATA[russian-telecom-infrastructure-map--upguard]]></image:title>
			<image:caption><![CDATA[Russian spyware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/dharma-ransomware-continues-to-evolve/</loc>
		<lastmod>2020-03-04T05:34:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Legacy-Government-Systems.jpg</image:loc>
			<image:caption><![CDATA[FTCode]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/dharma-pop-up.png</image:loc>
			<image:caption><![CDATA[Dharma ransomware, ransom demanding pop-up message]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/dharma-encrypted-files.png</image:loc>
			<image:caption><![CDATA[Dharma ransomware encrypted files]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/debunking-the-5-biggest-cloud-security-myths/</loc>
		<lastmod>2020-03-04T05:34:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Cloud-Breach.jpg</image:loc>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/building-an-architecture-for-a-strong-cybersecurity-posture/</loc>
		<lastmod>2020-03-04T05:34:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto21609321.jpg</image:loc>
			<image:title><![CDATA[canstockphoto21609321]]></image:title>
			<image:caption><![CDATA[architecture]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cloud-act-gdpr-changing-data-protection-game/</loc>
		<lastmod>2020-03-04T05:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Consumer-Data-Protection-Act.jpg</image:loc>
			<image:caption><![CDATA[data privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/avoid-bad-security-buying-decisions/</loc>
		<lastmod>2020-03-04T05:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto34318568.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34318568]]></image:title>
			<image:caption><![CDATA[threat intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-owasp-list-highlights-api-security-holes/</loc>
		<lastmod>2020-03-04T05:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/New-Executive-Order.jpg</image:loc>
			<image:caption><![CDATA[WhiteHat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/whos-financially-responsible-for-cybersecurity-breaches/</loc>
		<lastmod>2020-03-04T05:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/canstockphoto22471406.jpg</image:loc>
			<image:title><![CDATA[canstockphoto22471406]]></image:title>
			<image:caption><![CDATA[breaches]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/skill-sets-for-transitioning-into-a-cybersecurity-career/</loc>
		<lastmod>2020-03-04T05:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Enterprise-Security-Technology.jpg</image:loc>
			<image:title><![CDATA[skills]]></image:title>
			<image:caption><![CDATA[skills]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/russia-breached-fbi-comms-obama-waited-4-years-to-expel-spies/</loc>
		<lastmod>2020-03-04T05:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/putin-donkeyhotey-cc-by.jpg</image:loc>
			<image:title><![CDATA[putin--donkeyhotey--cc-by]]></image:title>
			<image:caption><![CDATA[Russia spies]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/open-source-democratizing-cyberattacks/</loc>
		<lastmod>2020-03-04T05:34:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/think-outside-the-box-to-close-the-skills-gap/</loc>
		<lastmod>2020-03-04T05:34:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Rules-of-Engagement.jpg</image:loc>
			<image:caption><![CDATA[contractors]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/5-signs-of-a-privileged-access-abuser/</loc>
		<lastmod>2020-03-04T05:34:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Awareness.jpg</image:loc>
			<image:caption><![CDATA[remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-you-need-a-cyber-hygiene-program-qa-with-alert-logics-jack-danahy/</loc>
		<lastmod>2020-03-04T05:34:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto45375600-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto45375600]]></image:title>
			<image:caption><![CDATA[cyber hygiene]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/simjacker-silly-name-scary-game/</loc>
		<lastmod>2020-03-04T05:34:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/sim-stephan-kambor-wiesenberg-cc-by.jpg</image:loc>
			<image:title><![CDATA[sim--stephan-kambor-wiesenberg--cc-by]]></image:title>
			<image:caption><![CDATA[Simjacker]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/make-digital-id-verification-part-of-your-ccpa-strategy/</loc>
		<lastmod>2020-03-04T05:34:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Staff-Turnover.jpg</image:loc>
			<image:caption><![CDATA[behavioral biometrics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/devops-chat-a-cisos-quest-for-better-security-with-altitude-networks/</loc>
		<lastmod>2020-03-04T05:34:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SAP.jpg</image:loc>
			<image:title><![CDATA[protecting]]></image:title>
			<image:caption><![CDATA[c-suite]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-security-can-lead-in-cloud-dependent-business-innovation/</loc>
		<lastmod>2020-03-04T05:34:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cybersecurity-Skills-Gap.jpg</image:loc>
			<image:caption><![CDATA[remote workforce]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/devops-chat-device-identity-at-the-speed-of-devops-with-venafi/</loc>
		<lastmod>2020-03-04T05:34:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Behavioral-Biometrics-Signature.jpg</image:loc>
			<image:caption><![CDATA[SOAR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-implications-of-data-privacy-regulations-on-ai/</loc>
		<lastmod>2020-03-04T05:34:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/AI-Data-Management.jpg</image:loc>
			<image:caption><![CDATA[AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/will-vpns-continue-losing-the-battle-to-keep-data-secure/</loc>
		<lastmod>2020-03-04T05:34:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/VPNs-Arent-Dead.jpg</image:loc>
			<image:title><![CDATA[VPNs-Arent-Dead]]></image:title>
			<image:caption><![CDATA[VPNs Aren’t Dead]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/smbs-embracing-cloud-but-security-remains-a-concern/</loc>
		<lastmod>2020-03-04T05:34:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Securing-Multi-Cloud.jpg</image:loc>
			<image:caption><![CDATA[SMBs cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/sysadmins-scramble-to-secure-5m-exim-email-servers/</loc>
		<lastmod>2020-03-04T05:34:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/14562099538_af553aa908_k.jpg</image:loc>
			<image:title><![CDATA[14562099538_af553aa908_k]]></image:title>
			<image:caption><![CDATA[Exim]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-perform-pentests-and-vulnerability-assessments/</loc>
		<lastmod>2020-03-04T05:34:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Manufacturers.jpg</image:loc>
			<image:title><![CDATA[Manufacturers]]></image:title>
			<image:caption><![CDATA[cryptojacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/lock-him-up-why-wyden-says-zuckerberg-needs-prison-term/</loc>
		<lastmod>2020-03-04T05:34:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/zuckerberg-donkeyhotey-cc-by.jpg</image:loc>
			<image:title><![CDATA[zuckerberg--donkeyhotey--cc-by]]></image:title>
			<image:caption><![CDATA[Zuckerberg]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/challenges-and-pitfalls-of-privileged-access-management/</loc>
		<lastmod>2020-03-04T05:34:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/CDPA-Forcing-Accountability.jpg</image:loc>
			<image:caption><![CDATA[protecting data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-is-everyone-in-security-talking-about-automation/</loc>
		<lastmod>2020-03-04T05:34:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Shadow-IT-Catch-22.jpg</image:loc>
			<image:caption><![CDATA[Security Automation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/retadup-botnet-killed-by-cops-1-million-pcs-saved/</loc>
		<lastmod>2020-03-04T05:34:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/france-kenatius-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[france--kenatius--cc-by-nd]]></image:title>
			<image:caption><![CDATA[Retadup]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/taking-health-care-out-of-the-ransomware-hot-seat/</loc>
		<lastmod>2020-03-04T05:34:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/canstockphoto12990602.jpg</image:loc>
			<image:title><![CDATA[canstockphoto12990602]]></image:title>
			<image:caption><![CDATA[healthcare ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/tech-support-scams-and-what-they-mean/</loc>
		<lastmod>2020-03-04T05:34:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/canstockphoto30176684.jpg</image:loc>
			<image:title><![CDATA[canstockphoto30176684]]></image:title>
			<image:caption><![CDATA[Tech support scams]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/pornographic-spyware.png</image:loc>
			<image:caption><![CDATA[Pornographic spyware tech support scam]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/microsoft-warning-alert.png</image:loc>
			<image:caption><![CDATA[Microsoft Warning Alert tech support scam]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/mac-system-infected-with-3-viruses.png</image:loc>
			<image:caption><![CDATA[Your system is infected with 3 viruses tech suport scam (MacOS)]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-eradicating-ev-certificates-will-change-the-internet-landscape/</loc>
		<lastmod>2020-03-04T05:34:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/canstockphoto31556108.jpg</image:loc>
			<image:title><![CDATA[Internet-Security]]></image:title>
			<image:caption><![CDATA[EV certificates]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/apple-is-bad-at-software-says-google/</loc>
		<lastmod>2020-03-04T05:34:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/watering-hole-blair-stirrett-cc-by.jpg</image:loc>
			<image:title><![CDATA[watering-hole--blair-stirrett--cc-by]]></image:title>
			<image:caption><![CDATA[Apple]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/is-security-the-biggest-threat-to-alternative-lenders/</loc>
		<lastmod>2020-03-04T05:34:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Cisco-ACI-Fabric.jpg</image:loc>
			<image:caption><![CDATA[lending security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/service-members-targeted-in-identity-fraud-scheme/</loc>
		<lastmod>2020-03-04T05:34:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/canstockphoto11564859.jpg</image:loc>
			<image:title><![CDATA[canstockphoto11564859]]></image:title>
			<image:caption><![CDATA[identity fraud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/russias-political-legal-climate-raises-red-flags/</loc>
		<lastmod>2020-03-04T05:34:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Russia.jpg</image:loc>
			<image:title><![CDATA[Russia]]></image:title>
			<image:caption><![CDATA[election Russians]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/3-steps-to-controlling-access-inside-the-network/</loc>
		<lastmod>2020-03-04T05:34:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Corporate-Boot-Camps.jpg</image:loc>
			<image:title><![CDATA[cybersecurity]]></image:title>
			<image:caption><![CDATA[cybersecurity startups]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/former-google-waymo-engineer-levandowski-charged-with-ip-theft/</loc>
		<lastmod>2020-03-04T05:34:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/Anthony_Levandowski_Headshot.jpg</image:loc>
			<image:title><![CDATA[Anthony_Levandowski_Headshot]]></image:title>
			<image:caption><![CDATA[Levandowski]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/threats-are-increasing-but-security-budgets-and-staff-arent/</loc>
		<lastmod>2020-03-04T05:34:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17405520.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17405520]]></image:title>
			<image:caption><![CDATA[fraud COVID]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/hybrid-vs-cloud-based-web-security-anatomy-of-a-breach/</loc>
		<lastmod>2020-03-04T05:34:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/DevSecOps-Cloud.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-Cloud]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/software-asset-management-as-a-security-practice/</loc>
		<lastmod>2020-03-04T05:34:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Sandbox-Proof-Concept.jpg</image:loc>
			<image:title><![CDATA[software asset management]]></image:title>
			<image:caption><![CDATA[threat intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/apple-scrambles-to-nuke-jailbreak-fails-source-control-101/</loc>
		<lastmod>2020-03-04T05:34:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/jailbreak-miki-yoshihito-cc-by.jpg</image:loc>
			<image:title><![CDATA[jailbreak--miki-yoshihito--cc-by]]></image:title>
			<image:caption><![CDATA[Apple jailbreak]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/job-security-certain-industries-more-susceptible-to-phishing/</loc>
		<lastmod>2020-03-04T05:34:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Phishing-Scams.jpg</image:loc>
			<image:caption><![CDATA[phishing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/considering-a-world-without-passwords/</loc>
		<lastmod>2020-03-04T05:34:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/IAM-Solution-Organization.jpg</image:loc>
			<image:caption><![CDATA[passwords]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/using-biometrics-intelligent-security-to-keep-finances-safe/</loc>
		<lastmod>2020-03-04T05:34:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Revolution.jpg</image:loc>
			<image:title><![CDATA[Revolution]]></image:title>
			<image:caption><![CDATA[intelligent security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/webinars-automotive-fuzz-testing-and-financial-services-appsec/</loc>
		<lastmod>2020-03-04T05:34:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/protect-against-bluekeep-and-the-next-wormable-vulnerability/</loc>
		<lastmod>2020-03-04T05:34:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Fileless-Malware-RSAC.jpg</image:loc>
			<image:caption><![CDATA[Zerologon]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/moviepass-spills-card-info-and-passwords-from-unsecured-database/</loc>
		<lastmod>2020-03-04T05:34:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/popcorn-annca-pixabay.jpg</image:loc>
			<image:title><![CDATA[popcorn--annca--pixabay]]></image:title>
			<image:caption><![CDATA[MoviePass]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/side-channel-attacks-cyber-warfares-new-battleground/</loc>
		<lastmod>2020-03-04T05:34:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Cyberwar-Security-Pros.jpg</image:loc>
			<image:caption><![CDATA[hacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/browser-push-notifications-useful-feature-exploited-by-deceptive-marketers/</loc>
		<lastmod>2020-03-04T05:34:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Impact-Cybersecurity-Threats-2.jpg</image:loc>
			<image:title><![CDATA[fraud]]></image:title>
			<image:caption><![CDATA[fraud]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/pop-up-notifications-scam1.jpg</image:loc>
			<image:caption><![CDATA[Deceptive pop-up asking to allow notifications]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/pop-up-notifications-scam2.jpg</image:loc>
			<image:caption><![CDATA[deceptive pop-up ad (push notifications)]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/push-notifications-ads-windows.png</image:loc>
			<image:caption><![CDATA[deceptive pop-up ad (Windows)]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/push-notifications-ads-mac.png</image:loc>
			<image:caption><![CDATA[deceptive pop-up ad (MacOS)]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/chinese-accounts-punted-off-twitter-facebook-for-dissing-hong-kong/</loc>
		<lastmod>2020-03-04T05:34:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Facebooks-Privacy-Breach.jpg</image:loc>
			<image:caption><![CDATA[privacy social media]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/rating-how-current-cybersecurity-issues-can-affect-future-profitability/</loc>
		<lastmod>2020-03-04T05:34:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SAP.jpg</image:loc>
			<image:title><![CDATA[protecting]]></image:title>
			<image:caption><![CDATA[c-suite]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/commerce-bureau-pegs-more-national-security-risks/</loc>
		<lastmod>2020-03-04T05:34:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/canstockphoto58185240.jpg</image:loc>
			<image:title><![CDATA[canstockphoto58185240]]></image:title>
			<image:caption><![CDATA[national security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-journey-of-securing-a-long-tail-supply-chain/</loc>
		<lastmod>2020-03-04T05:34:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Plague-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[supply chain]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/texas-does-ransomware-bigger-23-local-govts-attacked/</loc>
		<lastmod>2020-03-04T05:34:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/texas-ray-shrewsberry-pixabay.jpg</image:loc>
			<image:title><![CDATA[texas--ray-shrewsberry--pixabay]]></image:title>
			<image:caption><![CDATA[Texas Ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/iot-security-its-time-enterprises-take-responsibility/</loc>
		<lastmod>2020-03-04T05:34:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/personality-traits-key-to-more-effective-security-training/</loc>
		<lastmod>2020-03-04T05:34:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/People-Element-DevSecOps.jpg</image:loc>
			<image:caption><![CDATA[personality traits]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fbi-orders-up-social-media-monitoring-tool/</loc>
		<lastmod>2020-03-04T05:34:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Extremist.jpg</image:loc>
			<image:caption><![CDATA[brute-force]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/busted-kaspersky-av-tracked-your-every-click/</loc>
		<lastmod>2020-03-04T05:34:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/kaspersky-busted-kaspersky-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[kaspersky-busted--kaspersky--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Kaspersky]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-cloud-outages-and-you-whos-responsible-for-what/</loc>
		<lastmod>2020-03-04T05:34:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto25409210.jpg</image:loc>
			<image:title><![CDATA[cloud security]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-unique-cloud-document-indicators-can-reveal-about-data-loss-risk/</loc>
		<lastmod>2020-03-04T05:34:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Branch-Office-Security.jpg</image:loc>
			<image:caption><![CDATA[Zix]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/protecting-against-spear-phishing-attacks-a-guide/</loc>
		<lastmod>2020-03-04T05:34:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42371749.jpg</image:loc>
			<image:caption><![CDATA[spear phishing attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/businesses-now-the-hot-ransomware-target/</loc>
		<lastmod>2020-03-04T05:34:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Ransomware-Strains.jpg</image:loc>
			<image:title><![CDATA[Ransomware]]></image:title>
			<image:caption><![CDATA[ransom]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/countrybreakdown.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/screwed-drivers-windows-third-party-device-code-is-huge-mess/</loc>
		<lastmod>2020-03-04T05:34:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/screwdriver-saul-hm-pixabay.jpg</image:loc>
			<image:title><![CDATA[screwdriver--saul-hm--pixabay]]></image:title>
			<image:caption><![CDATA[drivers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/solving-cloud-security-complexity-with-visibility-automation/</loc>
		<lastmod>2020-03-04T05:34:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Software-Defined-Perimeter.jpg</image:loc>
			<image:caption><![CDATA[vendor access management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ransomware-attacks-shift-tactics/</loc>
		<lastmod>2020-03-04T05:34:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Ransomware-Recovery.jpg</image:loc>
			<image:caption><![CDATA[Maze]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/internet-security-how-widespread-are-bad-development-habits/</loc>
		<lastmod>2020-03-04T05:34:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto37487079.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37487079]]></image:title>
			<image:caption><![CDATA[Internet security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/Screen-Shot-2019-08-14-at-1.16.01-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/walmart-best-buy-and-phishing-scams/</loc>
		<lastmod>2020-03-04T05:34:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Phishing-Scams.jpg</image:loc>
			<image:caption><![CDATA[phishing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/crossrider-adware-still-causing-unwanted-mac-browser-redirects/</loc>
		<lastmod>2020-03-04T05:34:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Fileless-Malware-RSAC.jpg</image:loc>
			<image:caption><![CDATA[Zerologon]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/profiles.png</image:loc>
			<image:caption><![CDATA[Rogue system configuration profile installed by crossrider adware]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/installer.png</image:loc>
			<image:caption><![CDATA[crossrider adware installer (Mac)]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/unwanted-application.png</image:loc>
			<image:caption><![CDATA[Mac Cleanup Pro unwanted application]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/homepage.png</image:loc>
			<image:caption><![CDATA[searchmine.net browser hijacker]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/is-your-smartphone-app-at-risk-of-infecting-users/</loc>
		<lastmod>2020-03-04T05:34:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/SimBad-Adware-Android.jpg</image:loc>
			<image:title><![CDATA[mobile apps]]></image:title>
			<image:caption><![CDATA[apps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/us-voting-machines-internet-connected-despite-denials/</loc>
		<lastmod>2020-03-04T05:34:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/ess-douglas-w-jones-cc0.jpg</image:loc>
			<image:title><![CDATA[es&amp;s--douglas-w-jones--cc0]]></image:title>
			<image:caption><![CDATA[voting machines]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/wi-fi-wpa3-standard-fails-again-as-new-dragonblood-bugs-found/</loc>
		<lastmod>2020-03-04T05:34:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/dragons-grant-scharoff-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[dragons--grant-scharoff--cc-by-sa]]></image:title>
			<image:caption><![CDATA[WPA3 Dragonblood]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-ai-is-improving-threat-protection/</loc>
		<lastmod>2020-03-04T05:34:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/AI.jpg</image:loc>
			<image:title><![CDATA[AI]]></image:title>
			<image:caption><![CDATA[AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/spear-phishing-101-what-it-is-and-how-to-stop-it/</loc>
		<lastmod>2020-03-04T05:34:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Phishing-Scams.jpg</image:loc>
			<image:caption><![CDATA[phishing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-cost-of-ubiquitous-consumer-data/</loc>
		<lastmod>2020-03-04T05:34:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/AI.jpg</image:loc>
			<image:title><![CDATA[AI]]></image:title>
			<image:caption><![CDATA[AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ethical-hackers-the-good-guys-your-company-needs/</loc>
		<lastmod>2020-03-04T05:34:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto23556029.jpg</image:loc>
			<image:caption><![CDATA[ethical hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/beware-the-hardware-that-implements-cryptography/</loc>
		<lastmod>2020-03-04T05:34:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Dark-Patterns-Personal-Data.jpg</image:loc>
			<image:caption><![CDATA[database security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/hong-kong-violence-instigated-by-jason-bourne/</loc>
		<lastmod>2020-03-04T05:34:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/HongKongflag.png</image:loc>
			<image:title><![CDATA[HongKongflag]]></image:title>
			<image:caption><![CDATA[Hong Kong violence]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/Jason-Bourne.png</image:loc>
			<image:caption><![CDATA[Hong Kong violence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cisco-in-whistleblower-payoff-and-pr-doublespeak-row/</loc>
		<lastmod>2020-03-04T05:34:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/whistle-joachim-baer-freeimages.jpg</image:loc>
			<image:title><![CDATA[whistle--joachim-baer--freeimages]]></image:title>
			<image:caption><![CDATA[Cisco whistleblower]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/devops-chat-soti-report-with-akamais-martin-mckeay/</loc>
		<lastmod>2020-03-04T05:34:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Corporate-Boot-Camps.jpg</image:loc>
			<image:title><![CDATA[cybersecurity]]></image:title>
			<image:caption><![CDATA[cybersecurity startups]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/account-access-resisting-the-path-of-least-resistance/</loc>
		<lastmod>2020-03-04T05:34:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Art-Digital-Identity.jpg</image:loc>
			<image:caption><![CDATA[JumpCloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/business-email-compromise-continues-to-plague/</loc>
		<lastmod>2020-03-04T05:34:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42371749.jpg</image:loc>
			<image:caption><![CDATA[spear phishing attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/threat-hunting-and-its-importance/</loc>
		<lastmod>2020-03-04T05:34:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Technology-Espionage.jpg</image:loc>
			<image:caption><![CDATA[threat hunting]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-skills-a-top-training-goal/</loc>
		<lastmod>2020-03-04T05:34:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Career-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Career-Cybersecurity]]></image:title>
			<image:caption><![CDATA[training]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hyperfocused-security-for-the-cloud/</loc>
		<lastmod>2020-03-04T05:34:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Secure-Cloud-Access.jpg</image:loc>
			<image:caption><![CDATA[public cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/3-tips-for-integrating-security-into-the-devops-life-cycle/</loc>
		<lastmod>2020-03-04T05:34:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto47950254-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto47950254]]></image:title>
			<image:caption><![CDATA[security testing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/3-candles-on-no-more-ransoms-cake/</loc>
		<lastmod>2020-03-04T05:34:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/no-more-ransom-europol.jpg</image:loc>
			<image:title><![CDATA[no-more-ransom--europol]]></image:title>
			<image:caption><![CDATA[No More Ransom]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/assessing-the-risk-of-the-former-employee/</loc>
		<lastmod>2020-03-04T05:34:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Skills-Gap-Security.jpg</image:loc>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/after-mueller-senate-intel-reports-on-russian-election-hacks/</loc>
		<lastmod>2020-03-04T05:34:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/robert-mueller-donkeyhotey-cc-by.jpg</image:loc>
			<image:title><![CDATA[robert-mueller--donkeyhotey--cc-by]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/stopping-man-in-the-middle-attacks-with-cryptography/</loc>
		<lastmod>2020-03-04T05:34:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Identity-Management.jpg</image:loc>
			<image:caption><![CDATA[Man-in-the-middle attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/staying-secure-on-the-journey-to-the-cloud/</loc>
		<lastmod>2020-03-04T05:34:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto49531661.jpg</image:loc>
			<image:title><![CDATA[canstockphoto49531661]]></image:title>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/it-joins-ot-in-the-control-center/</loc>
		<lastmod>2020-03-04T05:34:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto25324624.jpg</image:loc>
			<image:title><![CDATA[canstockphoto25324624]]></image:title>
			<image:caption><![CDATA[IoT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/tls-fingerprinting-rethinking-encrypted-traffic-analysis-strategies/</loc>
		<lastmod>2020-03-04T05:34:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Next-Gen-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[TLS fingerprinting]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/are-cyber-ontologies-the-future-of-cybersecurity/</loc>
		<lastmod>2020-03-04T05:34:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Infamous-Hacks-Phishes.jpg</image:loc>
			<image:title><![CDATA[Infamous-Hacks-Phishes]]></image:title>
			<image:caption><![CDATA[COVID-19]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/russia-cracks-tor-hackers-dump-7-5tb-of-fsb-secrets/</loc>
		<lastmod>2020-03-04T05:34:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/sytech.jpg</image:loc>
			<image:caption><![CDATA[Tor]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/security-a-challenge-in-digital-transformation/</loc>
		<lastmod>2020-03-04T05:34:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Risk-Committees-Board-Security.jpg</image:loc>
			<image:caption><![CDATA[Security Digital Transformation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-problem-with-bots-and-what-to-do-about-them/</loc>
		<lastmod>2020-03-04T05:34:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Human-Error-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[pandemic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/reputational-risk-and-crisis-panel-shared-assessments-summit/</loc>
		<lastmod>2020-03-04T05:34:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/DejaVu.jpg</image:loc>
			<image:caption><![CDATA[personal data]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/ReputationalRisk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-truth-about-serverless-security/</loc>
		<lastmod>2020-03-04T05:34:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto9837967-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto9837967]]></image:title>
			<image:caption><![CDATA[cybersecurity DevOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/defense-in-depth-securing-the-new-network-edge/</loc>
		<lastmod>2020-03-04T05:34:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Insider-Treasury-Secrets.jpg</image:loc>
			<image:caption><![CDATA[SMB]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/dataspii-catastrophic-browser-data-leak-train-wreck/</loc>
		<lastmod>2020-03-04T05:34:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/nachos-larry-white-pixabay.jpg</image:loc>
			<image:title><![CDATA[nachos--larry-white--pixabay]]></image:title>
			<image:caption><![CDATA[browser data leak]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cannabis-retailers-dont-get-caught-in-the-cyber-weeds/</loc>
		<lastmod>2020-03-04T05:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/canstockphoto3810321.jpg</image:loc>
			<image:title><![CDATA[canstockphoto3810321]]></image:title>
			<image:caption><![CDATA[cannabis]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-role-of-endpoint-security-in-financial-services/</loc>
		<lastmod>2020-03-04T05:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Vulnerable-Banks.jpg</image:loc>
			<image:caption><![CDATA[Endpoint security financial services]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/zoom-spying-vulnerability-the-plot-thickens/</loc>
		<lastmod>2020-03-04T05:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/webcam-dee-teal-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[webcam--dee-teal--cc-by-nd]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-will-the-eus-article-13-directive-affect-streaming-platforms/</loc>
		<lastmod>2020-03-04T05:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/canstockphoto20443992.jpg</image:loc>
			<image:title><![CDATA[canstockphoto20443992]]></image:title>
			<image:caption><![CDATA[Article 13]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/is-bluekeep-a-perfect-storm-for-health-care/</loc>
		<lastmod>2020-03-04T05:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Ransomware-Health-Care.jpg</image:loc>
			<image:title><![CDATA[healthcare]]></image:title>
			<image:caption><![CDATA[healthcare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/security-boulevard-at-rsac-singapore-2019/</loc>
		<lastmod>2020-03-04T05:35:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/RSASingapore.jpg</image:loc>
			<image:title><![CDATA[RSASingapore]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-issues-in-2019-a-midyear-check/</loc>
		<lastmod>2020-03-04T05:35:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Hackers-Sandbox.jpg</image:loc>
			<image:caption><![CDATA[IBM data security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/network-security-sd-wan-for-the-network-edge/</loc>
		<lastmod>2020-03-04T05:35:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Patch-Management-Automation.jpg</image:loc>
			<image:caption><![CDATA[SD-WAN network edge]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/serialization-protecting-enterprise-critical-applications/</loc>
		<lastmod>2020-03-04T05:35:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/canstockphoto45008087-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto45008087]]></image:title>
			<image:caption><![CDATA[serialization]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ok-google-stop-eavesdropping-on-me/</loc>
		<lastmod>2020-03-04T05:35:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/furious-petras-gagilas-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[furious--petras-gagilas--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Google recordings]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/summer-security-hackers-dont-take-time-off/</loc>
		<lastmod>2020-03-04T05:35:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/canstockphoto78913.jpg</image:loc>
			<image:title><![CDATA[canstockphoto78913]]></image:title>
			<image:caption><![CDATA[summer security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/devops-chat-cloud-native-appsec-with-manicode-security/</loc>
		<lastmod>2020-03-04T05:35:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto39752295.jpg</image:loc>
			<image:title><![CDATA[canstockphoto39752295]]></image:title>
			<image:caption><![CDATA[Contrast Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/detecting-the-impossible-serverless-c2-in-the-cloud/</loc>
		<lastmod>2020-03-04T05:35:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/How-Who-Cyberattacks.jpg</image:loc>
			<image:caption><![CDATA[Ryuk]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/image001.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/image002.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/image003.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/image004.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-closer-look-at-iot-security-solutions/</loc>
		<lastmod>2020-03-04T05:35:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Securing-IoT-Time.jpg</image:loc>
			<image:title><![CDATA[IoT]]></image:title>
			<image:caption><![CDATA[IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/astaroth-dropper-trojan-hides-in-plain-sight/</loc>
		<lastmod>2020-03-04T05:35:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/dropper-mathieu-glachant-cc-by.jpg</image:loc>
			<image:title><![CDATA[dropper--mathieu-glachant--cc-by]]></image:title>
			<image:caption><![CDATA[Astaroth]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/tackling-the-issue-of-online-gaming-credential-stuffing/</loc>
		<lastmod>2020-03-04T05:35:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/canstockphoto64682781.jpg</image:loc>
			<image:title><![CDATA[tackling-the-issue-of-online-gaming-credential-stuffing]]></image:title>
			<image:caption><![CDATA[artificial intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/3-themes-for-safely-migrating-to-the-cloud/</loc>
		<lastmod>2020-03-04T05:35:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto35169622.jpg</image:loc>
			<image:title><![CDATA[canstockphoto35169622]]></image:title>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/federal-facial-recognition-by-stealth-with-zero-oversight/</loc>
		<lastmod>2020-03-04T05:35:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/dmv-mya-m-crosby-pd.jpg</image:loc>
			<image:title><![CDATA[dmv--mya-m-crosby--pd]]></image:title>
			<image:caption><![CDATA[facial recognition]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/benefits-of-implementing-isoiec-27001-in-your-management-system/</loc>
		<lastmod>2020-03-04T05:35:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Departing-Employees.jpg</image:loc>
			<image:title><![CDATA[Departing-Employees]]></image:title>
			<image:caption><![CDATA[ISO/IEC 27001]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/china-targeting-usg-employees-via-anthem-hack/</loc>
		<lastmod>2020-03-04T05:35:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Ethics-Disclosure-Chinese.jpg</image:loc>
			<image:caption><![CDATA[China Anthem hack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/devops-chat-devsecops-and-linux-protection-with-capsule8/</loc>
		<lastmod>2020-03-04T05:35:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/canstockphoto45008087.jpg</image:loc>
			<image:title><![CDATA[canstockphoto45008087]]></image:title>
			<image:caption><![CDATA[Capsule8 Linux Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/assessing-the-clouds-impact-on-business-security/</loc>
		<lastmod>2020-03-04T05:35:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Risk-Cloud-Security.jpg</image:loc>
			<image:caption><![CDATA[Exabeam]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/BusTranspic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/is-security-getting-the-c-suite-attention-it-deserves/</loc>
		<lastmod>2020-03-04T05:35:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Critical-Security-Controls.jpg</image:loc>
			<image:title><![CDATA[protection]]></image:title>
			<image:caption><![CDATA[Ivanti]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-ai-can-help-secure-your-enterprise-and-close-the-skills-gap/</loc>
		<lastmod>2020-03-04T05:35:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Humans-Cant-Stop-Bots.jpg</image:loc>
			<image:caption><![CDATA[AI in security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/using-behavioral-analytics-to-fight-ransomware/</loc>
		<lastmod>2020-03-04T05:35:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Rise-Fileless-Malware.jpg</image:loc>
			<image:caption><![CDATA[ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/more-medtronic-hack-malarkey-this-time-its-insulin-pumps/</loc>
		<lastmod>2020-03-04T05:35:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/diabetes-marco-verch-cc-by.jpg</image:loc>
			<image:title><![CDATA[Sugar cubes and granules]]></image:title>
			<image:caption><![CDATA[insulin pump hacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/behavior-analysis-getting-an-inside-track-on-insider-threats/</loc>
		<lastmod>2020-03-04T05:35:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto34390927-800x450.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34390927-800x450]]></image:title>
			<image:caption><![CDATA[insider threat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/surveys-show-enterprises-slow-to-adopt-zero-trust/</loc>
		<lastmod>2020-03-04T05:35:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Zero-Trust.jpg</image:loc>
			<image:title><![CDATA[Zero-Trust]]></image:title>
			<image:caption><![CDATA[Implementing Zero Trust Model]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-tell-if-your-devices-are-part-of-a-botnet/</loc>
		<lastmod>2020-03-04T05:35:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Botnet.jpg</image:loc>
			<image:title><![CDATA[Botnet]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/whos-watching-your-infosec-team/</loc>
		<lastmod>2020-03-04T05:35:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto2540255.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2540255]]></image:title>
			<image:caption><![CDATA[infosec]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-if-hawaii-missile-message-was-a-hack/</loc>
		<lastmod>2020-03-04T05:35:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/emergency-alert-tulsi-gabbard-pd.jpg</image:loc>
			<image:title><![CDATA[emergency-alert--tulsi-gabbard--pd]]></image:title>
			<image:caption><![CDATA[message hack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-get-your-cyber-hygiene-house-in-order/</loc>
		<lastmod>2020-03-04T05:35:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/canstockphoto54457272-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto54457272 (1)]]></image:title>
			<image:caption><![CDATA[data secure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bringing-real-time-data-discovery-to-the-cybersecurity-puzzle/</loc>
		<lastmod>2020-03-04T05:35:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Asymmetric-Cyberwarfare.jpg</image:loc>
			<image:caption><![CDATA[risk management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-design-a-vendor-management-process/</loc>
		<lastmod>2020-03-04T05:35:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Companies-Protect-Employee-Data.jpg</image:loc>
			<image:title><![CDATA[how-to-design-a-vendor-management-process]]></image:title>
			<image:caption><![CDATA[Vendor Management process]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/persistent-telco-data-theft-is-china-to-blame/</loc>
		<lastmod>2020-03-04T05:35:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/soft-cell-martin-pearce-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[soft-cell--martin-pearce--cc-by-nd]]></image:title>
			<image:caption><![CDATA[telco data theft]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/will-developing-nations-turn-to-cybercrime-to-fuel-their-economy/</loc>
		<lastmod>2020-03-04T05:35:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/ACDC.jpg</image:loc>
			<image:title><![CDATA[will-developing-nations-turn-to-cybercrime-to-fuel-their-economy]]></image:title>
			<image:caption><![CDATA[Developing Nations Cybercrime]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/devsecops-beyond-manual-policy-implementation/</loc>
		<lastmod>2020-03-04T05:35:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/DevSecOps-Manual-Policy.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-Manual-Policy]]></image:title>
			<image:caption><![CDATA[DevSecOps: Beyond Manual Policy Implementation]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/SecurityPyramid.png</image:loc>
			<image:caption><![CDATA[DevSecOps security pyramid]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/policyimplementation.png</image:loc>
			<image:caption><![CDATA[DevSecOps manual policy implementation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/implementing-zero-trust-one-app-at-a-time/</loc>
		<lastmod>2020-03-04T05:35:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Zero-Trust-App.jpg</image:loc>
			<image:title><![CDATA[Zero-Trust-App]]></image:title>
			<image:caption><![CDATA[prepare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/vendor-risk-management-the-secret-ingredient/</loc>
		<lastmod>2020-03-04T05:35:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Vendor-Risk-Management.jpg</image:loc>
			<image:title><![CDATA[Vendor-Risk-Management]]></image:title>
			<image:caption><![CDATA[Vendor Risk Management: The Secret Ingredient]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/huge-ransomware-fubar-at-florida-beach-town/</loc>
		<lastmod>2020-03-04T05:35:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/riviera-beach-2-boston-public-library-cc-by.jpg</image:loc>
			<image:title><![CDATA[riviera-beach-2--boston-public-library--cc-by]]></image:title>
			<image:caption><![CDATA[Ransomware Riviera Beach Florida]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/us-cyber-has-hacked-iranian-missile-cc-say-super-secret-sources/</loc>
		<lastmod>2020-03-04T05:35:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/nakasone-hello-again-usarmy-pd.jpg</image:loc>
			<image:title><![CDATA[nakasone-hello-again--usarmy--pd]]></image:title>
			<image:caption><![CDATA[U.S. Cyber hacking Iran C&amp;C]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/whos-responsible-for-a-cloud-breach-it-depends/</loc>
		<lastmod>2020-03-04T05:35:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Cloud-Breach.jpg</image:loc>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/zero-trust-3-things-to-consider/</loc>
		<lastmod>2020-03-04T05:35:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Zero-Trust.jpg</image:loc>
			<image:caption><![CDATA[digital identities]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/is-the-insurance-loophole-the-newest-threat-vector/</loc>
		<lastmod>2020-03-04T05:35:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Insurance-Loophole-Threat.jpg</image:loc>
			<image:title><![CDATA[Insurance-Loophole-Threat]]></image:title>
			<image:caption><![CDATA[Sonrai]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-start-a-career-in-cybersecurity/</loc>
		<lastmod>2020-03-04T05:35:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Start-Career-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Start-Career-Cybersecurity]]></image:title>
			<image:caption><![CDATA[How to Start a Career in Cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/in-the-dark-about-supply-chain-vulnerabilities/</loc>
		<lastmod>2020-03-04T05:35:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Supply-Chain-Vulnerabilities.jpg</image:loc>
			<image:title><![CDATA[Supply-Chain-Vulnerabilities]]></image:title>
			<image:caption><![CDATA[Okta endpoint security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-does-fake-news-have-to-do-with-cybersecurity-a-lot/</loc>
		<lastmod>2020-03-04T05:35:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Fake-News-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Fake-News-Cybersecurity]]></image:title>
			<image:caption><![CDATA[What Does Fake News Have to Do With Cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/in-the-new-fight-against-malware-its-spy-vs-spy/</loc>
		<lastmod>2020-03-04T05:35:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto3516555.jpg</image:loc>
			<image:title><![CDATA[identity]]></image:title>
			<image:caption><![CDATA[credential theft]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/skills-gap-3-cisos-offer-advice-for-finding-talent/</loc>
		<lastmod>2020-03-04T05:35:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Skills-Gap-CISOs.jpg</image:loc>
			<image:caption><![CDATA[security budget]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/u-s-cyber-has-hacked-russian-power-grid-say-super-secret-sources/</loc>
		<lastmod>2020-03-04T05:35:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/gen-paul-m-nakasone-usarmy-pd.jpg</image:loc>
			<image:title><![CDATA[gen-paul-m-nakasone--usarmy--pd]]></image:title>
			<image:caption><![CDATA[U.S. Cyber Command]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/devops-chat-software-intelligence-with-dynatraces-alois-reitbauer/</loc>
		<lastmod>2020-03-04T05:35:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Software-Intelligence-Dynatrace.jpg</image:loc>
			<image:title><![CDATA[Software-Intelligence-Dynatrace]]></image:title>
			<image:caption><![CDATA[Software Intelligence, With Dynatrace's Alois Reitbauer]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/5-infamous-hacks-you-didnt-know-were-phishes/</loc>
		<lastmod>2020-03-04T05:35:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Infamous-Hacks-Phishes.jpg</image:loc>
			<image:title><![CDATA[Infamous-Hacks-Phishes]]></image:title>
			<image:caption><![CDATA[COVID-19]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/telegram-app-ddos-from-china-hinders-612strike-protest/</loc>
		<lastmod>2020-03-04T05:35:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/612strike-GYPfHzc9sxQYZMn.jpg</image:loc>
			<image:title><![CDATA[612strike--GYPfHzc9sxQYZMn]]></image:title>
			<image:caption><![CDATA[DDoS Attack China]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/understanding-the-power-of-soar-for-government/</loc>
		<lastmod>2020-03-04T05:35:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/SOAR-Government.jpg</image:loc>
			<image:title><![CDATA[SOAR-Government]]></image:title>
			<image:caption><![CDATA[Understanding the Power of SOAR for Government]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/election-security-back-to-basics-approach-best-bet/</loc>
		<lastmod>2020-03-04T05:35:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Election-Security-Approach.jpg</image:loc>
			<image:title><![CDATA[Election-Security-Approach]]></image:title>
			<image:caption><![CDATA[Election Security: Back-to-Basics Approach Best Bet]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/women-in-cybersecurity-no-longer-an-anomaly/</loc>
		<lastmod>2020-03-04T05:35:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Women-Cybersecurity-Anomaly.jpg</image:loc>
			<image:title><![CDATA[Women-Cybersecurity-Anomaly]]></image:title>
			<image:caption><![CDATA[Women in Cybersecurity No Longer an 'Anomaly']]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/protecting-data-flow-in-shifting-privacy-regulations/</loc>
		<lastmod>2020-03-04T05:35:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Protecting-Data-Flow.jpg</image:loc>
			<image:title><![CDATA[Protecting-Data-Flow]]></image:title>
			<image:caption><![CDATA[Protecting Data Flow in Shifting Privacy Regulations]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cbp-loses-photos-of-travelers-in-data-hack/</loc>
		<lastmod>2020-03-04T05:35:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/us-border-bobby-hidy-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[us-border--bobby-hidy--cc-by-nd]]></image:title>
			<image:caption><![CDATA[CBP Loses Photos]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/tips-for-achieving-secure-cloud-access/</loc>
		<lastmod>2020-03-04T05:35:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Secure-Cloud-Access.jpg</image:loc>
			<image:caption><![CDATA[public cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/6-imperatives-to-securing-your-cloud-infrastructure/</loc>
		<lastmod>2020-03-04T05:35:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Securing-Cloud-Infrastructure.jpg</image:loc>
			<image:title><![CDATA[Securing-Cloud-Infrastructure]]></image:title>
			<image:caption><![CDATA[public cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/chaos-is-inevitable-resilient-cloud-security-is-the-answer/</loc>
		<lastmod>2020-03-04T05:35:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Resilient-Cloud-Security.jpg</image:loc>
			<image:title><![CDATA[Resilient-Cloud-Security]]></image:title>
			<image:caption><![CDATA[entities cloud]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/EtaCarinaeStarSystem-ChandraXRayObservatory-20140826.jpg</image:loc>
			<image:caption><![CDATA[Chaos]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/2020-elections-will-be-a-security-disaster-zone/</loc>
		<lastmod>2020-03-04T05:35:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/trump-state-dept-pd.jpg</image:loc>
			<image:title><![CDATA[Official Portrait, President Donald J. Trump]]></image:title>
			<image:caption><![CDATA[Trump IT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/security-spam-and-the-future-of-email/</loc>
		<lastmod>2020-03-04T05:35:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Security-Spam-Email.jpg</image:loc>
			<image:title><![CDATA[Security-Spam-Email]]></image:title>
			<image:caption><![CDATA[Security, Spam and the Future of Email]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/apples-new-privacy-and-security-features-a-closer-look/</loc>
		<lastmod>2020-03-04T05:35:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Apple-Privacy-Security.jpg</image:loc>
			<image:title><![CDATA[Apple-Privacy-Security]]></image:title>
			<image:caption><![CDATA[Apple's New Privacy and Security Features: A Closer Look]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Apple-highlights-from-wwdc2019-Tim-Cook-welcomes-developers-060319_big.jpg.large_2x.jpg</image:loc>
			<image:caption><![CDATA[Apple WWDC19 Tim Cook]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/does-your-security-team-need-awareness-officer/</loc>
		<lastmod>2020-03-04T05:35:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Security-Awareness-Officer-Role.jpg</image:loc>
			<image:title><![CDATA[camera]]></image:title>
			<image:caption><![CDATA[AI surveillance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/quest-and-amca-leak-12m-blood-test-patients-data/</loc>
		<lastmod>2020-03-04T05:35:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/blood-uscdcp-pd.jpg</image:loc>
			<image:title><![CDATA[Clinician shown here is obtaining a blood sample]]></image:title>
			<image:caption><![CDATA[Quest AMCA data breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/red-forest-or-well-managed-active-directory/</loc>
		<lastmod>2020-03-04T05:35:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Well-Managed-Active-Directory.jpg</image:loc>
			<image:title><![CDATA[Well-Managed-Active-Directory]]></image:title>
			<image:caption><![CDATA[Red Forest, or Well-Managed Active Directory]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/RedForestpic.png</image:loc>
			<image:caption><![CDATA[Red Forest Diagram]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/RedForestpic2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/data-breach-notifications-too-complex-to-understand/</loc>
		<lastmod>2020-03-04T05:35:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Data-Breach-Notifications.jpg</image:loc>
			<image:title><![CDATA[Data-Breach-Notifications]]></image:title>
			<image:caption><![CDATA[Data Breach Notifications: Too Complex To Understand]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/executive-order-on-americas-cybersecurity-workforce-strategy-to-reality/</loc>
		<lastmod>2020-03-04T05:35:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/America-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[America-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Executive Order on America's Cybersecurity Workforce]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/using-machine-learning-to-address-evolving-threats/</loc>
		<lastmod>2020-03-04T05:35:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Machine-Learning-Threats.jpg</image:loc>
			<image:title><![CDATA[Machine-Learning-Threats]]></image:title>
			<image:caption><![CDATA[Machine Learning to Address Evolving Threats]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-iot-device-security-is-important/</loc>
		<lastmod>2020-03-04T05:35:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/IoT-Device-Security.jpg</image:loc>
			<image:title><![CDATA[IoT-Device-Security]]></image:title>
			<image:caption><![CDATA[Why IoT Device Security is Important]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-rise-of-the-data-protection-officer/</loc>
		<lastmod>2020-03-04T05:35:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Data-Protection-Officer.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/apple-privacy-policy-fails-to-protect-against-app-trackers/</loc>
		<lastmod>2020-03-04T05:35:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/iphone-paulo-henrique-cc-by.jpg</image:loc>
			<image:title><![CDATA[iphone--paulo-henrique--cc-by]]></image:title>
			<image:caption><![CDATA[Apple]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/first-american-leaks-big-885m-customer-files-exposed/</loc>
		<lastmod>2020-03-04T05:35:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/dennis-gilmore-regrets-firstam.jpg</image:loc>
			<image:title><![CDATA[dennis-gilmore-regrets--firstam]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/train-your-employees-to-be-cyber-aware-with-micro-learning/</loc>
		<lastmod>2020-03-04T05:35:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Cyber-Aware-Micro-Learning.jpg</image:loc>
			<image:title><![CDATA[Cyber-Aware-Micro-Learning]]></image:title>
			<image:caption><![CDATA[Cyber Aware With Micro-Learning]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/is-leadership-paying-attention-to-your-security/</loc>
		<lastmod>2020-03-04T05:35:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Leadership-Security.jpg</image:loc>
			<image:caption><![CDATA[CISO role]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/security-at-scale-grow-your-security-not-your-risk/</loc>
		<lastmod>2020-03-04T05:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Security-At-Scale.jpg</image:loc>
			<image:title><![CDATA[Security-At-Scale]]></image:title>
			<image:caption><![CDATA[Security at Scale Grow Your Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sandboxescaper-drops-four-windows-zero-days/</loc>
		<lastmod>2020-03-04T05:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/sandboxescaper-oksanna-briere-pexels.jpg</image:loc>
			<image:title><![CDATA[sandboxescaper--oksanna-briere--pexels]]></image:title>
			<image:caption><![CDATA[SandboxEscaper Drops 4 Windows Zero-Days on GitHub]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/security-measures-every-company-should-employ/</loc>
		<lastmod>2020-03-04T05:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Security-Measures-Company.jpg</image:loc>
			<image:caption><![CDATA[remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/survey-smbs-dont-recognize-good-security/</loc>
		<lastmod>2020-03-04T05:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/SMB-Good-Security.jpg</image:loc>
			<image:caption><![CDATA[code-signing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/is-third-party-risk-assessment-getting-better/</loc>
		<lastmod>2020-03-04T05:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Third-Party-Risk-Assessment.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity legislation]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/VendorRiskManagementpic.png</image:loc>
			<image:caption><![CDATA[Vendor Risk Management matrix]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/dlp-systems-and-the-solutions-they-offer/</loc>
		<lastmod>2020-03-04T05:35:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/DLP-Systems-Solutions.jpg</image:loc>
			<image:title><![CDATA[DLP-Systems-Solutions]]></image:title>
			<image:caption><![CDATA[DLP Systems and the Solutions They Offer]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/microsoft-again-most-spoofed-as-office-365-phishing-evolves/</loc>
		<lastmod>2020-03-04T05:35:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/MFA-Adoption.jpg</image:loc>
			<image:title><![CDATA[Microsoft phishing]]></image:title>
			<image:caption><![CDATA[Microsoft Again Most Spoofed as Office 365 Phishing Evolves]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/its-time-to-implement-a-strategic-data-privacy-plan/</loc>
		<lastmod>2020-03-04T05:35:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Data-Privacy-Plan.jpg</image:loc>
			<image:title><![CDATA[Data-Privacy-Plan]]></image:title>
			<image:caption><![CDATA[privacy framework]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cybersecurity-skills-gap-will-new-executive-order-help/</loc>
		<lastmod>2020-03-04T05:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/New-Executive-Order.jpg</image:loc>
			<image:caption><![CDATA[WhiteHat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/6-ways-poor-cybersecurity-hurts-businesses/</loc>
		<lastmod>2020-03-04T05:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Poor-Cybersecurity-Businesses.jpg</image:loc>
			<image:title><![CDATA[Poor-Cybersecurity-Businesses]]></image:title>
			<image:caption><![CDATA[6 Ways Poor Cybersecurity Hurts Businesses]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-evolving-impact-of-cybersecurity-threats/</loc>
		<lastmod>2020-03-04T05:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Impact-Cybersecurity-Threats-2.jpg</image:loc>
			<image:title><![CDATA[fraud]]></image:title>
			<image:caption><![CDATA[fraud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/49-million-instagram-users-private-data-leaked-via-aws/</loc>
		<lastmod>2020-03-04T05:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/instagram-pete-linforth-pixabay.jpg</image:loc>
			<image:title><![CDATA[instagram--pete-linforth--pixabay]]></image:title>
			<image:caption><![CDATA[Instagram]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-break-broken-soc-cycles/</loc>
		<lastmod>2020-03-04T05:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Broken-SOC-Cycles.jpg</image:loc>
			<image:title><![CDATA[Broken-SOC-Cycles]]></image:title>
			<image:caption><![CDATA[VPN]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/BrokenSOCpic1.png</image:loc>
			<image:caption><![CDATA[A Vicious Cycle]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/BrokenSOCpic2.png</image:loc>
			<image:caption><![CDATA[Cycleception]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/zero-trust-fortifying-the-security-landscape/</loc>
		<lastmod>2020-03-04T05:35:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Fortifying-Security-Landscape.jpg</image:loc>
			<image:caption><![CDATA[securing the SMB]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/100m-goznym-bank-trojan-gang-6-arrested-5-at-large/</loc>
		<lastmod>2020-03-04T05:35:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/goznym-wanted.jpg</image:loc>
			<image:title><![CDATA[goznym-wanted]]></image:title>
			<image:caption><![CDATA[$100M ‘GozNym’ Bank Trojan Gang: 6 Arrested, 5 at Large]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/in-business-security-employee-cyber-hygiene-matters/</loc>
		<lastmod>2020-03-04T05:35:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Business-Security-Cyber-Hygiene.jpg</image:loc>
			<image:title><![CDATA[Business-Security-Cyber-Hygiene]]></image:title>
			<image:caption><![CDATA[MDR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-can-small-businesses-safeguard-against-cyberattacks/</loc>
		<lastmod>2020-03-04T05:35:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Small-Business-Cyberattacks.jpg</image:loc>
			<image:title><![CDATA[Small-Business-Cyberattacks]]></image:title>
			<image:caption><![CDATA[access]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/whatsapp-zero-day-let-nso-spyware-pwn-phones/</loc>
		<lastmod>2020-03-04T05:35:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/whatsapp-michel-mueller-pixabay.jpg</image:loc>
			<image:title><![CDATA[whatsapp--michel-mueller--pixabay]]></image:title>
			<image:caption><![CDATA[WhatsApp]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/security-struggling-to-stay-ahead-of-more-sophisticated-threats/</loc>
		<lastmod>2020-03-04T05:35:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Security-Ahead-Threats.jpg</image:loc>
			<image:title><![CDATA[Security-Ahead-Threats]]></image:title>
			<image:caption><![CDATA[Security Struggling Threats]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/using-ai-and-ml-to-win-against-fraud/</loc>
		<lastmod>2020-03-04T05:35:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/AI-ML-Fraud.jpg</image:loc>
			<image:title><![CDATA[AI-ML-Fraud]]></image:title>
			<image:caption><![CDATA[Using AI and ML to Win Against Fraud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/huawei-fallout-uk-defence-minister-sacked-over-leak/</loc>
		<lastmod>2020-03-04T05:35:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Huawei-UK-Leak.jpg</image:loc>
			<image:title><![CDATA[Huawei-UK-Leak]]></image:title>
			<image:caption><![CDATA[Huawei Fallout: UK Defence Minister Sacked Over Leak]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/iot-complexity-creating-new-hacker-opportunities/</loc>
		<lastmod>2020-03-04T05:35:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Securing-IoT-Time.jpg</image:loc>
			<image:title><![CDATA[IoT]]></image:title>
			<image:caption><![CDATA[IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/ransomware-terrorism-should-we-be-worried/</loc>
		<lastmod>2020-03-04T05:35:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Ransomware-Recovery.jpg</image:loc>
			<image:caption><![CDATA[Maze]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hytrust-cloudcontrol-6-0-unifies-security-for-multi-cloud-environments/</loc>
		<lastmod>2020-03-04T05:35:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cybersecurity-Challenges.jpg</image:loc>
			<image:caption><![CDATA[Styra]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/4-essential-skills-for-modern-cisos-to-succeed/</loc>
		<lastmod>2020-03-04T05:35:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Skills-CISO-Succeed-2.jpg</image:loc>
			<image:title><![CDATA[Skills-CISO-Succeed-2]]></image:title>
			<image:caption><![CDATA[Essential Skills for Modern CISOs to Succeed]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/russias-fake-news-swirls-in-u-s-and-europe/</loc>
		<lastmod>2020-03-04T05:35:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/putin-victoria-borodinova-pixabay.jpg</image:loc>
			<image:title><![CDATA[putin--victoria-borodinova--pixabay]]></image:title>
			<image:caption><![CDATA[Russia's ‘Fake News’ Swirls in U.S. and Europe]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/photo-app-pivots-to-violating-its-users-privacy/</loc>
		<lastmod>2020-03-04T05:35:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/facial-recognition-gerd-altmann-pixabay.jpg</image:loc>
			<image:title><![CDATA[photo-app-pivots-to-violating-its-users-privacy]]></image:title>
			<image:caption><![CDATA[Photo App Pivots to Violating Its Users' Privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/mission-based-pam-are-you-ready/</loc>
		<lastmod>2020-03-04T05:35:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Mission-Based-PAM.jpg</image:loc>
			<image:title><![CDATA[Mission-Based-PAM]]></image:title>
			<image:caption><![CDATA[VPNs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/chinas-cia-penetration-jerry-lee-pleads-guilty/</loc>
		<lastmod>2020-03-04T05:35:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Huawei-Indicted-China.jpg</image:loc>
			<image:title><![CDATA[China Spy Pleads Guilty]]></image:title>
			<image:caption><![CDATA[Thousand Talents Program]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/futureproofing-security-in-post-quantum-cryptography-world/</loc>
		<lastmod>2020-03-04T05:35:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/How-Who-Cyberattacks.jpg</image:loc>
			<image:caption><![CDATA[Ryuk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/why-cisos-need-a-mentor-and-what-they-can-learn-from-one/</loc>
		<lastmod>2020-03-04T05:35:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/canstockphoto14195874.jpg</image:loc>
			<image:title><![CDATA[canstockphoto14195874]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/privacy-employees-often-the-weakest-link/</loc>
		<lastmod>2020-03-04T05:35:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Privacy-Employees-Weakest.jpg</image:loc>
			<image:title><![CDATA[Privacy-Employees-Weakest]]></image:title>
			<image:caption><![CDATA[security remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/advancing-open-source-innovation-in-cybersecurity/</loc>
		<lastmod>2020-03-04T05:35:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Source-Innovation-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Source-Innovation-Cybersecurity]]></image:title>
			<image:caption><![CDATA[IBM security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/breach-incidents-on-record-pace-for-2019/</loc>
		<lastmod>2020-03-04T05:35:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Breach-Incidents-2019.jpg</image:loc>
			<image:title><![CDATA[ransomware]]></image:title>
			<image:caption><![CDATA[Egregor]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/attack-of-the-killer-usbs-dont-be-the-next-victim/</loc>
		<lastmod>2020-03-04T05:35:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Attack-Killer-USBs.jpg</image:loc>
			<image:title><![CDATA[Attack-Killer-USBs]]></image:title>
			<image:caption><![CDATA[Attack of the Killer USBs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/devsecops-making-security-a-priority-from-the-start/</loc>
		<lastmod>2020-03-04T05:35:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/DevSecOps-Security-Priority.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-Security-Priority]]></image:title>
			<image:caption><![CDATA[data privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/dell-hell-gets-hotter-via-bad-bug-in-every-pc-laptop/</loc>
		<lastmod>2020-03-04T05:35:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/naraka-se-asia-digital-library-cc0.jpg</image:loc>
			<image:title><![CDATA[naraka--se-asia-digital-library--cc0]]></image:title>
			<image:caption><![CDATA[hell]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/git-code-repos-held-to-ransom-thousands-hacked/</loc>
		<lastmod>2020-03-04T05:35:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/ransom-rod-mckie-cc-by-sa.png</image:loc>
			<image:title><![CDATA[ransom--rod-mckie--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Ransomwear]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/taking-network-security-to-the-next-level-with-a-multi-cloud-approach/</loc>
		<lastmod>2020-03-04T05:35:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Network-Security-Multi-Cloud.jpg</image:loc>
			<image:caption><![CDATA[data protection]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hr-and-security-in-the-era-of-cyberattacks/</loc>
		<lastmod>2020-03-04T05:35:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/DejaVu.jpg</image:loc>
			<image:caption><![CDATA[personal data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nearly-half-of-smbs-feel-vulnerable-to-imminent-cyberattacks/</loc>
		<lastmod>2020-03-04T05:35:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/SMBs-Imminent-Cyberattacks.jpg</image:loc>
			<image:caption><![CDATA[third-party risk management]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/image001.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/radical-transparency-killing-managed-security-services-black-box-approach/</loc>
		<lastmod>2020-03-04T05:35:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Radical-Transparency.jpg</image:loc>
			<image:title><![CDATA[Radical-Transparency]]></image:title>
			<image:caption><![CDATA[Managed Security Services’ Black-Box Approach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/devops-chat-security-intelligence-with-flashpoints-josh-lefkowitz/</loc>
		<lastmod>2020-03-04T05:35:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Security-Intelligence.jpg</image:loc>
			<image:title><![CDATA[Security-Intelligence]]></image:title>
			<image:caption><![CDATA[Security Intelligence with Flashpoint's Josh Lefkowitz]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/passwords-a-game-of-pwns-a-hash-of-kings/</loc>
		<lastmod>2020-03-04T05:35:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/canstockphoto17814495.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17814495]]></image:title>
			<image:caption><![CDATA[Passwords: Game of P4wns]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/microsoft-office-the-new-hot-target-for-hackers/</loc>
		<lastmod>2020-03-04T05:35:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Microsoft-Office-Hackers.jpg</image:loc>
			<image:title><![CDATA[Microsoft-Office-Hackers]]></image:title>
			<image:caption><![CDATA[Microsoft Office Target for Hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/economic-espionage-zheng-and-zhang-fleece-general-electric/</loc>
		<lastmod>2020-03-04T05:35:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Economic-Espionage-GE.jpg</image:loc>
			<image:caption><![CDATA[DNS hijacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/signature-move-using-behavioral-biometrics-for-continuous-authentication/</loc>
		<lastmod>2020-03-04T05:35:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Behavioral-Biometrics-Signature.jpg</image:loc>
			<image:caption><![CDATA[SOAR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/did-huawei-hide-backdoors-in-telco-kit-or-is-this-more-bloomberg-bs/</loc>
		<lastmod>2020-03-04T05:35:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/backdoor-cliff-johnson-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[backdoor--cliff-johnson--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Backdoor]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/security-the-most-important-component-of-digital-citizen-services/</loc>
		<lastmod>2020-03-04T05:35:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Staff-Turnover.jpg</image:loc>
			<image:caption><![CDATA[behavioral biometrics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-dns-monitoring-can-be-a-huge-boon-to-security/</loc>
		<lastmod>2020-03-04T05:35:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/DNS-Monitoring-Security.jpg</image:loc>
			<image:title><![CDATA[DNS-Monitoring-Security]]></image:title>
			<image:caption><![CDATA[DNS Monitoring Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/human-error-not-ransomware-health-cares-biggest-security-threat/</loc>
		<lastmod>2020-03-04T05:35:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Human-Error-Health-Care.jpg</image:loc>
			<image:title><![CDATA[Human-Error-Health-Care]]></image:title>
			<image:caption><![CDATA[Health Care's Biggest Security Threat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/automate-software-security-checks-to-find-open-source-software-sdk-perils/</loc>
		<lastmod>2020-03-04T05:35:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Automate-Software-Security.jpg</image:loc>
			<image:caption><![CDATA[M&amp;A]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-protect-wordpress-websites-from-sql-injection/</loc>
		<lastmod>2020-03-04T05:35:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/WordPress-SQL-Injection.jpg</image:loc>
			<image:title><![CDATA[WordPress-SQL-Injection]]></image:title>
			<image:caption><![CDATA[Protect WordPress Websites from SQL Injection]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/is-huawei-a-national-security-proxy-for-china/</loc>
		<lastmod>2020-03-04T05:35:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/CounterIntelligence.jpg</image:loc>
			<image:title><![CDATA[CounterIntelligence]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/fax-or-email-for-secure-document-delivery/</loc>
		<lastmod>2020-03-04T05:35:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Fax-Email-Secure-Document.jpg</image:loc>
			<image:title><![CDATA[Fax-Email-Secure-Document]]></image:title>
			<image:caption><![CDATA[Fax or Email for Secure Document Delivery]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/alexa-why-are-you-stalking-me-did-amazon-lie/</loc>
		<lastmod>2020-03-04T05:35:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/bezos-privacy-james-duncan-davidson-cc-by.jpg</image:loc>
			<image:title><![CDATA[bezos-privacy--james-duncan-davidson--cc-by]]></image:title>
			<image:caption><![CDATA[Jeff Bezos]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/most-it-shops-have-latent-cyberthreats-in-their-backups/</loc>
		<lastmod>2020-03-04T05:35:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Critical-Security-Controls.jpg</image:loc>
			<image:title><![CDATA[protection]]></image:title>
			<image:caption><![CDATA[Ivanti]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/identity-theft-and-financial-fraud-in-the-digital-age-2/</loc>
		<lastmod>2020-03-04T05:35:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Theft-Fraud-Digital.jpg</image:loc>
			<image:title><![CDATA[Theft-Fraud-Digital]]></image:title>
			<image:caption><![CDATA[Identity Theft Financial Fraud in Digital Age]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/popular-wifi-finder-app-leaks-2-million-passwords/</loc>
		<lastmod>2020-03-04T05:35:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/wi-fi-tunnel-carl-nenzen-loven-cc-by.jpg</image:loc>
			<image:title><![CDATA[wi-fi-tunnel--carl-nenzen-loven--cc-by]]></image:title>
			<image:caption><![CDATA[wi-fi FAIL]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/threat-modeling-protecting-security-infrastructures-in-2019/</loc>
		<lastmod>2020-03-04T05:35:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/How-Who-Cyberattacks.jpg</image:loc>
			<image:caption><![CDATA[Ryuk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-value-of-risk-committees-and-board-security-engagement/</loc>
		<lastmod>2020-03-04T05:35:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Risk-Committees-Board-Security.jpg</image:loc>
			<image:caption><![CDATA[Security Digital Transformation]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/catherineallenformal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/devops-chat-the-rise-of-the-cloud-first-architect-with-zscalers-chris-hines/</loc>
		<lastmod>2020-03-04T05:35:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Cloud-First-Architect.jpg</image:loc>
			<image:title><![CDATA[Cloud-First-Architect]]></image:title>
			<image:caption><![CDATA[Rise of the Cloud-First Architect]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/with-no-permission-facebook-slurped-up-hundreds-of-millions-of-email-contacts/</loc>
		<lastmod>2020-03-04T05:35:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/move-fast-mike-deerkoski-cc-by.jpg</image:loc>
			<image:title><![CDATA[move-fast--mike-deerkoski--cc-by]]></image:title>
			<image:caption><![CDATA[Move Fast and Break Things]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/blockchain-reality-check-which-promises-can-it-keep/</loc>
		<lastmod>2020-03-04T05:35:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Blockchain-Reality-Check.jpg</image:loc>
			<image:title><![CDATA[Blockchain-Reality-Check]]></image:title>
			<image:caption><![CDATA[Blockchain Reality Check]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/information-security-is-a-fundamentals-game/</loc>
		<lastmod>2020-03-04T05:35:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Information-Security-Fundamentals.jpg</image:loc>
			<image:title><![CDATA[Information-Security-Fundamentals]]></image:title>
			<image:caption><![CDATA[Information Security is a Fundamentals Game]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/devops-chat-forrester-wave-leaders-discuss-sca/</loc>
		<lastmod>2020-03-04T05:35:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/SAST-Tools-DevSecOps.jpg</image:loc>
			<image:title><![CDATA[SAST-Tools-DevSecOps]]></image:title>
			<image:caption><![CDATA[Integrate SAST Tools with DevSecOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/keeping-workplace-privacy-accidents-to-minimum/</loc>
		<lastmod>2020-03-04T05:35:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Workplace-Privacy-Accidents.jpg</image:loc>
			<image:caption><![CDATA[VPAM]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/erm-understanding-the-state-of-cybersecurity-and-risk/</loc>
		<lastmod>2020-03-04T05:35:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/ERM-Cybersecurity-Risk.jpg</image:loc>
			<image:title><![CDATA[ERM-Cybersecurity-Risk]]></image:title>
			<image:caption><![CDATA[ERM State of Cybersecurity and Risk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/microsoft-cloud-breach-hackers-read-your-email-for-90-days/</loc>
		<lastmod>2020-03-04T05:35:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/facepalm-yerevanci-cc-by.jpg</image:loc>
			<image:title><![CDATA[Head in Hands]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/russia-imprisoning-sources-associated-with-u-s-election-meddling/</loc>
		<lastmod>2020-03-04T05:35:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Russia-US-Election.jpg</image:loc>
			<image:title><![CDATA[Russia-US-Election]]></image:title>
			<image:caption><![CDATA[Russia Imprisoning Sources Associated With U.S. Election Meddling]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/take-back-control-of-your-apps-and-data-with-cloud-monitoring/</loc>
		<lastmod>2020-03-04T05:35:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Data-Cloud-Monitoring.jpg</image:loc>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-cloud-collaboration-matters-for-smbs/</loc>
		<lastmod>2020-03-04T05:35:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Cloud-Collaboration-SMBs.jpg</image:loc>
			<image:title><![CDATA[Cloud-Collaboration-SMBs]]></image:title>
			<image:caption><![CDATA[Why Cloud Collaboration Matters for SMBs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/trump-secret-service-usb-opsec-fail-spy-story-gets-weirder/</loc>
		<lastmod>2020-03-04T05:35:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/usb-andars-k-iden-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[usb--andars-k-iden--cc-by-nd]]></image:title>
			<image:caption><![CDATA[USB]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cybersecurity-pros-dont-trust-security/</loc>
		<lastmod>2020-03-04T05:35:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Security-Paranoia.jpg</image:loc>
			<image:caption><![CDATA[privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/choose-the-best-iam-solution-for-your-organization/</loc>
		<lastmod>2020-03-04T05:35:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/IAM-Solution-Organization.jpg</image:loc>
			<image:caption><![CDATA[passwords]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/devops-and-secops-resolving-the-rift-between-development-and-security/</loc>
		<lastmod>2020-03-04T05:35:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Development-Security-Rift.jpg</image:loc>
			<image:title><![CDATA[Development-Security-Rift]]></image:title>
			<image:caption><![CDATA[Adaptive Shield]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/employees-part-of-the-attack-surface/</loc>
		<lastmod>2020-03-04T05:35:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Employees-Attack-Surface.jpg</image:loc>
			<image:caption><![CDATA[quantum computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/does-microsoft-violate-gdpr-european-regulator-asks-tough-questions/</loc>
		<lastmod>2020-03-04T05:35:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/gdpr-satya-nadella-le-web-cc-by.jpg</image:loc>
			<image:title><![CDATA[LE WEB PARIS 2013 - CONFERENCES - PLENARY 1 - SATYA NADELLA]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/meeting-the-challenges-of-securing-a-cloud-native-world/</loc>
		<lastmod>2020-03-04T05:36:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Securing-Cloud-World.jpg</image:loc>
			<image:title><![CDATA[Securing-Cloud-World]]></image:title>
			<image:caption><![CDATA[Challenges of Securing a Cloud-Native World]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-secret-is-out-connected-vehicles-are-eminently-hackable/</loc>
		<lastmod>2020-03-04T05:36:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Connected-Vehicles-Hackable.jpg</image:loc>
			<image:title><![CDATA[Connected-Vehicles-Hackable]]></image:title>
			<image:caption><![CDATA[connected cars]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/devops-chat-application-security-management-with-sqreens-pierre-betouin/</loc>
		<lastmod>2020-03-04T05:36:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Application-Security-Management.jpg</image:loc>
			<image:title><![CDATA[Application-Security-Management]]></image:title>
			<image:caption><![CDATA[Application Security Management with Sqreen's Pierre Betouin]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/security-awareness-4-tax-scams-making-the-rounds-now/</loc>
		<lastmod>2020-03-04T05:36:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Security-Tax-Scams.jpg</image:loc>
			<image:title><![CDATA[Security-Tax-Scams]]></image:title>
			<image:caption><![CDATA[Security Awareness 4 Tax Scams]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/transportation-and-security-planes-trains-automobiles-and-software-glitches/</loc>
		<lastmod>2020-03-04T05:36:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Planes-Trains-Automobiles-Security.jpg</image:loc>
			<image:title><![CDATA[Planes-Trains-Automobiles-Security]]></image:title>
			<image:caption><![CDATA[Transportation and Security Software Glitches]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/stalkerware-spouseware-creepware-just-call-it-horrific/</loc>
		<lastmod>2020-03-04T05:36:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/evacide-1.jpg</image:loc>
			<image:title><![CDATA[@evacide]]></image:title>
			<image:caption><![CDATA[“That time I got really mad and decided to kill an industry.”]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/tips-for-choosing-the-best-iam-solution/</loc>
		<lastmod>2020-03-04T05:36:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Best-IAM-Solution.jpg</image:loc>
			<image:title><![CDATA[Best-IAM-Solution]]></image:title>
			<image:caption><![CDATA[Choosing the Best IAM Solution]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/study-organizations-still-dont-get-mobile-security/</loc>
		<lastmod>2020-03-04T05:36:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Organizations-Mobile-Security.jpg</image:loc>
			<image:title><![CDATA[Organizations-Mobile-Security]]></image:title>
			<image:caption><![CDATA[Organizations Still Don’t Get Mobile Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/facebook-forces-users-to-give-email-password-wait-what/</loc>
		<lastmod>2020-03-04T05:36:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/obey-zuckerberg-alessio-jacona-cc-by.jpg</image:loc>
			<image:title><![CDATA[obey-zuckerberg--alessio-jacona--cc-by]]></image:title>
			<image:caption><![CDATA[Obey Zuckerberg (Alessio Jacona)]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/5-mobile-security-threats-to-recognize/</loc>
		<lastmod>2020-03-04T05:36:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Mobile-Security-Threats.jpg</image:loc>
			<image:title><![CDATA[Mobile-Security-Threats]]></image:title>
			<image:caption><![CDATA[pandemic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/office-depot-and-support-com-to-pay-35m-for-fake-malware-scan-scam/</loc>
		<lastmod>2020-03-04T05:36:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/office-depot-mike-mozart-cc-by.jpg</image:loc>
			<image:title><![CDATA[office-depot--mike-mozart--cc-by]]></image:title>
			<image:caption><![CDATA[Office Depot]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/devops-chat-container-security-with-whitesource-softwares-david-habusha/</loc>
		<lastmod>2020-03-04T05:36:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Container-Security-Whitesource.jpg</image:loc>
			<image:caption><![CDATA[wfh]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/150-million-people-affected-by-simbad-adware-on-android/</loc>
		<lastmod>2020-03-04T05:36:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/SimBad-Adware-Android.jpg</image:loc>
			<image:title><![CDATA[mobile apps]]></image:title>
			<image:caption><![CDATA[apps]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/mobilemalwarepic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/mobilemalwarepic2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/rush-to-digital-transformation-leaving-organizations-more-vulnerable/</loc>
		<lastmod>2020-03-04T05:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Digital-Transformation-Organizations.jpg</image:loc>
			<image:title><![CDATA[Digital-Transformation-Organizations]]></image:title>
			<image:caption><![CDATA[Digital Transformation Leaving Organizations More Vulnerable]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cities-and-governments-need-to-start-partnering-with-cyber-innovators/</loc>
		<lastmod>2020-03-04T05:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Cities-Governments-Cyber.jpg</image:loc>
			<image:title><![CDATA[workforce security]]></image:title>
			<image:caption><![CDATA[secure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/devops-chat-email-security-with-barracuda-networks-asaf-cidon/</loc>
		<lastmod>2020-03-04T05:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42371749.jpg</image:loc>
			<image:caption><![CDATA[spear phishing attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/will-streaming-platforms-advance-gaming-security-to-a-new-level/</loc>
		<lastmod>2020-03-04T05:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Gaming-Security.jpg</image:loc>
			<image:title><![CDATA[Gaming-Security]]></image:title>
			<image:caption><![CDATA[Streaming Platforms Advance Gaming Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/leveraging-the-cloud-for-soc-2-compliance/</loc>
		<lastmod>2020-03-04T05:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Leveraging-Cloud-SOC-2.jpg</image:loc>
			<image:title><![CDATA[Leveraging-Cloud-SOC-2]]></image:title>
			<image:caption><![CDATA[Leveraging the Cloud for SOC 2 Compliance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/can-victims-of-phishing-scams-be-fired-for-falling-prey/</loc>
		<lastmod>2020-03-04T05:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Phishing-Scams.jpg</image:loc>
			<image:caption><![CDATA[phishing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-workload-protection-is-transforming-cybersecurity-for-the-hybrid-cloud/</loc>
		<lastmod>2020-03-04T05:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Workload-Protection-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Workload-Protection-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Workload Protection Transforming Cybersecurity Hybrid Cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/devsecops-makes-a-difference-but-uptake-is-slow/</loc>
		<lastmod>2020-03-04T05:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/DevSecOps-Uptake-Slow.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-Uptake-Slow]]></image:title>
			<image:caption><![CDATA[DevSecOps Makes a Difference, but Uptake is Slow]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/china-whats-your-score/</loc>
		<lastmod>2020-03-04T05:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/China-Social-Credit.jpg</image:loc>
			<image:caption><![CDATA[survey security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/5-essentials-to-consider-when-backing-up-your-data/</loc>
		<lastmod>2020-03-04T05:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Backing-Up-Data.jpg</image:loc>
			<image:title><![CDATA[Backing-Up-Data]]></image:title>
			<image:caption><![CDATA[Essentials to Consider When Backing up Data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/microsoft-hurts-charming-kitten-aka-the-apt35-iran-hacking-group/</loc>
		<lastmod>2020-03-04T05:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/kitten-wilkernet-pixabay.jpg</image:loc>
			<image:title><![CDATA[kitten--wilkernet--pixabay]]></image:title>
			<image:caption><![CDATA[a charming kitten]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/should-america-follow-the-gdpr-lead/</loc>
		<lastmod>2020-03-04T05:36:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/America-Follow-GDPR-Lead.jpg</image:loc>
			<image:title><![CDATA[America-Follow-GDPR-Lead]]></image:title>
			<image:caption><![CDATA[Should America Follow the GDPR Lead]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-conference-2019-videos-day-1/</loc>
		<lastmod>2020-03-04T05:36:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/videocamera.pg_.jpg</image:loc>
			<image:title><![CDATA[videocamera.pg]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/are-we-in-a-cyberwar-yes-say-many-it-security-pros/</loc>
		<lastmod>2020-03-04T05:36:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Cyberwar-Security-Pros.jpg</image:loc>
			<image:caption><![CDATA[hacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/apple-credit-card-not-so-secure-nor-private/</loc>
		<lastmod>2020-03-04T05:36:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/apple-card-apple-pr-1.jpg</image:loc>
			<image:title><![CDATA[apple-card--apple-pr]]></image:title>
			<image:caption><![CDATA[Apple Card]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/vpn-leaks-knowing-understanding-and-preventing/</loc>
		<lastmod>2020-03-04T05:36:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/VPN-Leaks.jpg</image:loc>
			<image:caption><![CDATA[security testing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/heres-whats-causing-cisos-stress-and-what-to-do-about-it/</loc>
		<lastmod>2020-03-04T05:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/CISO-Stress.jpg</image:loc>
			<image:title><![CDATA[CISO-Stress]]></image:title>
			<image:caption><![CDATA[What’s Causing CISOs Stress]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/is-security-the-price-of-convenience-in-supply-chain-payments/</loc>
		<lastmod>2020-03-04T05:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Supply-Chain-Payments.jpg</image:loc>
			<image:title><![CDATA[Supply-Chain-Payments]]></image:title>
			<image:caption><![CDATA[Security the Price of Convenience in Supply Chain Payments]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cybersecurity-collegiate-hackathon-helping-further-students-and-industries/</loc>
		<lastmod>2020-03-04T05:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Cybersecurity-Hackathon-Students.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity-Hackathon-Students]]></image:title>
			<image:caption><![CDATA[Collegiate Hackathon Helping Advance Students, Industries]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/implanted-medical-devices-can-be-hacked-wirelessly-warns-u-s-govt/</loc>
		<lastmod>2020-03-04T05:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/heart-freestocks-cc0.jpg</image:loc>
			<image:title><![CDATA[heart--freestocks--cc0]]></image:title>
			<image:caption><![CDATA[Heart attack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/did-uber-spyware-on-rival-taxi-firm-yes-and-no/</loc>
		<lastmod>2020-03-04T05:36:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/uber-freestocks-photos-pixabay.jpg</image:loc>
			<image:title><![CDATA[uber--freestocks-photos--pixabay]]></image:title>
			<image:caption><![CDATA[Uber app]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/insider-threats-a-big-fear-for-small-businesses/</loc>
		<lastmod>2020-03-04T05:36:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Insider-Threats-Small-Business.jpg</image:loc>
			<image:title><![CDATA[Insider-Threats-Small-Business]]></image:title>
			<image:caption><![CDATA[Insider Threats: Fear for Small Businesses]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/3-common-myths-and-misconceptions-around-security-and-connectivity/</loc>
		<lastmod>2020-03-04T05:36:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Myths-Security-Connectivity.jpg</image:loc>
			<image:title><![CDATA[Myths-Security-Connectivity]]></image:title>
			<image:caption><![CDATA[ Myths and Misconceptions Around Security and Connectivity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/securing-the-iot-a-race-against-time/</loc>
		<lastmod>2020-03-04T05:36:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Securing-IoT-Time.jpg</image:loc>
			<image:title><![CDATA[IoT]]></image:title>
			<image:caption><![CDATA[IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/skills-gap-affects-cybersecurity-physical-security/</loc>
		<lastmod>2020-03-04T05:36:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Skills-Gap-Security.jpg</image:loc>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-role-of-hackathons-in-driving-cybersecurity-forward/</loc>
		<lastmod>2020-03-04T05:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Hackathons-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[cloud-native security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-asynchronous-nature-of-asymmetric-cyberwarfare-success-factors-of-cyberattacks/</loc>
		<lastmod>2020-03-04T05:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Asymmetric-Cyberwarfare.jpg</image:loc>
			<image:caption><![CDATA[risk management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ransomware-fighter-lives-in-fear-for-his-life/</loc>
		<lastmod>2020-03-04T05:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/polar-bear-jennifer-stern-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[polar-bear--jennifer-stern--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Polar bear]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/privileged-access-management-solutions-poised-for-growth/</loc>
		<lastmod>2020-03-04T05:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Low-Priority.jpg</image:loc>
			<image:title><![CDATA[Security-Low-Priority]]></image:title>
			<image:caption><![CDATA[tactical CISO]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/is-2fa-broken-or-just-evolving/</loc>
		<lastmod>2020-03-04T05:36:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/2FA-Broken-Evolving.jpg</image:loc>
			<image:caption><![CDATA[access]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/simplifying-security-in-the-cloud/</loc>
		<lastmod>2020-03-04T05:36:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Simplifying-Security-Cloud.jpg</image:loc>
			<image:title><![CDATA[Simplifying-Security-Cloud]]></image:title>
			<image:caption><![CDATA[data classification]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/android-security-is-a-hot-mess-yet-again/</loc>
		<lastmod>2020-03-04T05:36:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/android-rob-bulmahn-cc-by.jpg</image:loc>
			<image:title><![CDATA[android--rob-bulmahn--cc-by]]></image:title>
			<image:caption><![CDATA[app security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/3-tips-for-reducing-security-staff-turnover/</loc>
		<lastmod>2020-03-04T05:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Staff-Turnover.jpg</image:loc>
			<image:caption><![CDATA[behavioral biometrics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/as-cybersecurity-challenges-climb-can-training-lower-risk/</loc>
		<lastmod>2020-03-04T05:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Cybersecurity-Challenges-Climb.jpg</image:loc>
			<image:caption><![CDATA[security strategy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fast-pace-of-cloud-adoption-leaves-security-lost-in-the-wind/</loc>
		<lastmod>2020-03-04T05:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Cloud-Adoption-Security.jpg</image:loc>
			<image:title><![CDATA[Cloud-Adoption-Security]]></image:title>
			<image:caption><![CDATA[Cloud Adoption Leaves Security Lost]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/gandcrab-wishing-you-an-unhappy-birthday/</loc>
		<lastmod>2020-03-04T05:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/GandCrab-Unhappy-Birthday.jpg</image:loc>
			<image:title><![CDATA[GandCrab-Unhappy-Birthday]]></image:title>
			<image:caption><![CDATA[GandCrab: Wishing You an Unhappy Birthday]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/talks-rsac-2019-fileless-malware-and-how-to-detect-them/</loc>
		<lastmod>2020-03-04T05:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Fileless-Malware-RSAC.jpg</image:loc>
			<image:caption><![CDATA[Zerologon]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/filelessmalwarepic1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/overheard-at-rsac-2019/</loc>
		<lastmod>2020-03-04T05:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Overheard-RSAC-2019.jpg</image:loc>
			<image:title><![CDATA[Overheard-RSAC-2019]]></image:title>
			<image:caption><![CDATA[Overheard at RSAC 2019]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/despite-increased-attacks-security-remains-low-priority-for-business/</loc>
		<lastmod>2020-03-04T05:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Low-Priority.jpg</image:loc>
			<image:title><![CDATA[Security-Low-Priority]]></image:title>
			<image:caption><![CDATA[tactical CISO]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/citrix-systems-breached-for-10-years-by-iran-claims-unknown-infosec-firm/</loc>
		<lastmod>2020-03-04T05:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/citrix-citrix-cc-by.jpg</image:loc>
			<image:title><![CDATA[citrix--citrix--cc-by]]></image:title>
			<image:caption><![CDATA[Citrix Systems]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-blockchain-can-improve-infosec/</loc>
		<lastmod>2020-03-04T05:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/canstockphoto54457272-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto54457272 (1)]]></image:title>
			<image:caption><![CDATA[data secure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/7-top-security-risks-in-2019-according-to-security-professionals/</loc>
		<lastmod>2020-03-04T05:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Risks-2019.jpg</image:loc>
			<image:title><![CDATA[Security-Risks-2019]]></image:title>
			<image:caption><![CDATA[7 Top Security Risks in 2019]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/openvpn-vs-ikev2-vs-l2tp-which-vpn-protocol-is-the-best/</loc>
		<lastmod>2020-03-04T05:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/VPN-Protocol.jpg</image:loc>
			<image:title><![CDATA[VPN-Protocol]]></image:title>
			<image:caption><![CDATA[OpenVPN vs. IKEv2 vs. L2TP]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/chrome-zero-day-rce-exploit-in-the-wild-patch-now/</loc>
		<lastmod>2020-03-04T05:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/bear-brad-schafer-cc-by.jpg</image:loc>
			<image:title><![CDATA[bear--brad-schafer--cc-by]]></image:title>
			<image:caption><![CDATA[bear in the wild]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/technology-espionage-huawei-the-unscrupulous-customer/</loc>
		<lastmod>2020-03-04T05:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Technology-Espionage.jpg</image:loc>
			<image:caption><![CDATA[threat hunting]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/moxa-industrial-switch-vulnerabilities-expose-major-industries-to-compromises/</loc>
		<lastmod>2020-03-04T05:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Manufacturing-Cybercriminals-1.jpg</image:loc>
			<image:caption><![CDATA[manufacturing remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/will-nist-privacy-framework-change-how-we-approach-privacy/</loc>
		<lastmod>2020-03-04T05:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/NIST-Privacy.jpg</image:loc>
			<image:title><![CDATA[NIST-Privacy]]></image:title>
			<image:caption><![CDATA[NIST Privacy Framework]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/security-awareness-6-factors-that-get-in-the-way/</loc>
		<lastmod>2020-03-04T05:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Awareness.jpg</image:loc>
			<image:caption><![CDATA[remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/digicert-purchases-quovadis-becomes-a-qualified-tsp/</loc>
		<lastmod>2020-03-04T05:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/DigiCert-QuoVadis-TSP.jpg</image:loc>
			<image:title><![CDATA[DigiCert-QuoVadis-TSP]]></image:title>
			<image:caption><![CDATA[DigiCert Purchases QuoVadis, Becomes a Qualified TSP]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/why-management-of-good-bots-is-crucial-for-organizations/</loc>
		<lastmod>2020-03-04T05:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Good-Bots.jpg</image:loc>
			<image:title><![CDATA[Good-Bots]]></image:title>
			<image:caption><![CDATA[Management of Good Bots is Crucial]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/botpic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/botpic2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/botpic3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/botpic4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/endpoints-the-law-of-entropy-and-evading-chaos/</loc>
		<lastmod>2020-03-04T05:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Endpoints-Entropy-Chaos.jpg</image:loc>
			<image:caption><![CDATA[Sumo Logic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/take-a-fresh-look-at-your-annual-security-risk-assessment/</loc>
		<lastmod>2020-03-04T05:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Risk-Assessment.jpg</image:loc>
			<image:caption><![CDATA[compliance spending]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/attackers-host-phishing-pages-on-azure/</loc>
		<lastmod>2020-03-04T05:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Phishing-Exploits-Gullibility.jpg</image:loc>
			<image:caption><![CDATA[phishing attack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/uproar-over-facebook-2fa-privacy-violation/</loc>
		<lastmod>2020-03-04T05:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/phone-att-pd.jpg</image:loc>
			<image:title><![CDATA[phone--at&amp;t--pd]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/delivering-email-post-data-breach-4-tips-for-avoiding-the-impact/</loc>
		<lastmod>2020-03-04T05:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Email-Post-Data-Breach.jpg</image:loc>
			<image:title><![CDATA[Email-Post-Data-Breach]]></image:title>
			<image:caption><![CDATA[Delivering Email Post-Data Breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/adobe-patches-actively-exploited-coldfusion-zero-day-flaw/</loc>
		<lastmod>2020-03-04T05:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto39874704.jpg</image:loc>
			<image:title><![CDATA[canstockphoto39874704]]></image:title>
			<image:caption><![CDATA[fileless malware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-service-scans-chrome-extensions-for-vulnerabilities-and-privacy-risks/</loc>
		<lastmod>2020-03-04T05:36:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Service-Scans-Chrome.jpg</image:loc>
			<image:caption><![CDATA[threat report]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-london-protocol-an-initiative-to-improve-identity-assurance/</loc>
		<lastmod>2020-03-04T05:36:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/London-Protocol.jpg</image:loc>
			<image:title><![CDATA[London-Protocol]]></image:title>
			<image:caption><![CDATA[The London Protocol Improve Identity Assurance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cloud-requires-a-new-approach-to-security/</loc>
		<lastmod>2020-03-04T05:36:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cloud-Approach-Security.jpg</image:loc>
			<image:title><![CDATA[Cloud-Approach-Security]]></image:title>
			<image:caption><![CDATA[Cloud Requires a New Approach to Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/5-questions-for-open-data-centers/</loc>
		<lastmod>2020-03-04T05:36:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/gaps-in-resources-continue-to-plague-cybersecurity/</loc>
		<lastmod>2020-03-04T05:36:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Plague-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[supply chain]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/devops-chat-the-business-of-security-and-devsecops-with-sonatypes-tyler-shields/</loc>
		<lastmod>2020-03-04T05:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Business-Security-DevSecOps.jpg</image:loc>
			<image:title><![CDATA[Business-Security-DevSecOps]]></image:title>
			<image:caption><![CDATA[Business of Security and DevSecOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/a-v-cisos-take-on-the-5-issues-facing-cybersecurity/</loc>
		<lastmod>2020-03-04T05:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/CISO-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[CISO-Cybersecurity]]></image:title>
			<image:caption><![CDATA[5 Issues Facing Cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/test-the-4-cybersecurity-kpis-enterprises-need-to-stay-secure-this-year/</loc>
		<lastmod>2020-03-04T05:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cybersecurity-KPIs.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity-KPIs]]></image:title>
			<image:caption><![CDATA[Cybersecurity KPIs Enterprises Need to Stay Secure]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/morphisecTEST.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-convince-employees-to-care-about-security-training/</loc>
		<lastmod>2020-03-04T05:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Security-Training.jpg</image:loc>
			<image:title><![CDATA[Security-Training]]></image:title>
			<image:caption><![CDATA[Convince Employees to Care About Security Training]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/with-ccpa-approaching-is-true-data-deletion-possible/</loc>
		<lastmod>2020-03-04T05:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/CCPA-Data-Deletion.jpg</image:loc>
			<image:title><![CDATA[CCPA-Data-Deletion]]></image:title>
			<image:caption><![CDATA[compliance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/mfa-how-to-eliminate-profile-fraud-and-win-the-fight-for-consumer-trust/</loc>
		<lastmod>2020-03-04T05:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Profile-Fraud.jpg</image:loc>
			<image:title><![CDATA[Profile-Fraud]]></image:title>
			<image:caption><![CDATA[How to Eliminate Profile Fraud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ai-adoption-lags-as-hype-trumps-benefits/</loc>
		<lastmod>2020-03-04T05:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/AI-Adoption-Lags.jpg</image:loc>
			<image:caption><![CDATA[Open Raven]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-will-ai-and-machine-learning-change-your-network/</loc>
		<lastmod>2020-03-04T05:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/AI-Machine-Learning.jpg</image:loc>
			<image:title><![CDATA[MSPs]]></image:title>
			<image:caption><![CDATA[MSPs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/devops-chat-12-factor-app-and-security-with-whitehats-eric-sheridan/</loc>
		<lastmod>2020-03-04T05:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/12-Factor-App.jpg</image:loc>
			<image:caption><![CDATA[tokenization]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/drupal-patches-highly-critical-remote-code-execution-vulnerability/</loc>
		<lastmod>2020-03-04T05:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Website-Supply-Chain-Attacks.jpg</image:loc>
			<image:title><![CDATA[Website-Supply-Chain-Attacks]]></image:title>
			<image:caption><![CDATA[digital data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/north-korean-lazarus-group-starts-targeting-russian-organizations/</loc>
		<lastmod>2020-03-04T05:36:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/APT-Attacks.jpg</image:loc>
			<image:title><![CDATA[APT-Attacks]]></image:title>
			<image:caption><![CDATA[virtual appliances]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/security-startup-boldly-claims-no-false-positives/</loc>
		<lastmod>2020-03-04T05:36:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Ad-Networks.jpg</image:loc>
			<image:title><![CDATA[Ad-Networks]]></image:title>
			<image:caption><![CDATA[Defenses of Ad Networks]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Screen-Shot-2019-02-19-at-8.55.43-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/oklahoma-securities-commissions-data-availed-in-the-wild/</loc>
		<lastmod>2020-03-04T05:36:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Oklahoma-Securities-Commission.jpg</image:loc>
			<image:title><![CDATA[Oklahoma-Securities-Commission]]></image:title>
			<image:caption><![CDATA[Oklahoma Securities Commission’s Data Availed in Wild]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/failure-to-plan-3-unexpected-security-challenges-that-undermine-your-ciso/</loc>
		<lastmod>2020-03-04T05:36:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Failure-to-Plan.jpg</image:loc>
			<image:caption><![CDATA[SMB security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/trust-nothing-if-you-want-real-security/</loc>
		<lastmod>2020-03-04T05:36:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Real-Security.jpg</image:loc>
			<image:title><![CDATA[Real-Security]]></image:title>
			<image:caption><![CDATA[continuous intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-the-ffes-expansion-to-the-u-s-will-help-combat-financial-cyberattacks/</loc>
		<lastmod>2020-03-04T05:36:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/FFE-Expansion-US.jpg</image:loc>
			<image:title><![CDATA[FFE-Expansion-US]]></image:title>
			<image:caption><![CDATA[FFE's Expansion to the U.S.]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/password-security-fears-strong-among-it-pros/</loc>
		<lastmod>2020-03-04T05:36:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Password-Security-Fears.jpg</image:loc>
			<image:title><![CDATA[Password-Security-Fears]]></image:title>
			<image:caption><![CDATA[mobile application security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vote-now-2019-security-blogger-awards-finalists/</loc>
		<lastmod>2020-03-04T05:36:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/blogger-awards.png</image:loc>
			<image:title><![CDATA[blogger awards]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cybersecurity-issues-in-mobile-app-development/</loc>
		<lastmod>2020-03-04T05:36:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cybersecurity-Mobile-App.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity-Mobile-App]]></image:title>
			<image:caption><![CDATA[Cybersecurity Issues in Mobile App Development]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/wordpress-sites-hacked-through-vulnerable-payment-forms-plug-in/</loc>
		<lastmod>2020-03-04T05:36:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Security-Mistakes.jpg</image:loc>
			<image:title><![CDATA[danger]]></image:title>
			<image:caption><![CDATA[breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-is-data-in-vicinity/</loc>
		<lastmod>2020-03-04T05:36:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Data-Vicinity.jpg</image:loc>
			<image:title><![CDATA[Data-Vicinity]]></image:title>
			<image:caption><![CDATA[zero trust]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/dispelling-the-security-as-bad-guy-myth/</loc>
		<lastmod>2020-03-04T05:36:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Security-Bad-Guy.jpg</image:loc>
			<image:title><![CDATA[Security-Bad-Guy]]></image:title>
			<image:caption><![CDATA[Security as Bad Guy Myth]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-shlayer-malware-variant-targeting-macs/</loc>
		<lastmod>2020-03-04T05:36:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Zero-Day-Threats.jpg</image:loc>
			<image:title><![CDATA[Zero-Day-Threats]]></image:title>
			<image:caption><![CDATA[Zero-day Threats Detection]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/consumer-privacy-in-question-over-ring-video-files/</loc>
		<lastmod>2020-03-04T05:36:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Consumer-Privacy-Ring.jpg</image:loc>
			<image:caption><![CDATA[video surveillance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-cryptojacking-boom-may-be-over-but-the-threat-remains/</loc>
		<lastmod>2020-03-04T05:36:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cryptojacking-Over.jpg</image:loc>
			<image:caption><![CDATA[cryptocurrency]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/devops-chart-shifting-devsec-left-with-shiftleft-rsac-edition/</loc>
		<lastmod>2020-03-04T05:36:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Shifting-DevSec-Left.jpg</image:loc>
			<image:title><![CDATA[Shifting-DevSec-Left]]></image:title>
			<image:caption><![CDATA[Shifting DevSec Left with ShiftLeft]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/devops-chat-disruptops-securityops-disrupted-rsac-edition/</loc>
		<lastmod>2020-03-04T05:36:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Attack-Vectors.jpg</image:loc>
			<image:title><![CDATA[Attack-Vectors]]></image:title>
			<image:caption><![CDATA[New Attack Vectors Cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/5-steps-to-doing-automation-right/</loc>
		<lastmod>2020-03-04T05:36:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Doing-Automation-Right.jpg</image:loc>
			<image:title><![CDATA[data]]></image:title>
			<image:caption><![CDATA[business risk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-cyber-risk-paradox-benefits-of-new-technologies-bring-hidden-security-risks/</loc>
		<lastmod>2020-03-04T05:36:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cyber-Risk-Paradox.jpg</image:loc>
			<image:caption><![CDATA[SMB cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/devops-chat-devsecops-and-rsac-2019-with-james-wickett-and-shannon-lietz/</loc>
		<lastmod>2020-03-04T05:36:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/DevSecOps-RSAC-2019.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-RSAC-2019]]></image:title>
			<image:caption><![CDATA[DevSecOps and RSAC 2019]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/container-escape-vulnerability-puts-cloud-infrastructure-at-risk/</loc>
		<lastmod>2020-03-04T05:36:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto45782708.jpg</image:loc>
			<image:title><![CDATA[canstockphoto45782708]]></image:title>
			<image:caption><![CDATA[Microsoft Fixes 50 Flaws]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/5-steps-to-integrate-sast-tools-with-devsecops/</loc>
		<lastmod>2020-03-04T05:36:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/SAST-Tools-DevSecOps.jpg</image:loc>
			<image:title><![CDATA[SAST-Tools-DevSecOps]]></image:title>
			<image:caption><![CDATA[Integrate SAST Tools with DevSecOps]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/SAST-Tool-integration-in-DevSecOps-Pipeline.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/2019s-hottest-and-most-bankable-security-certs/</loc>
		<lastmod>2020-03-04T05:36:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Bankable-Security-Certs.jpg</image:loc>
			<image:title><![CDATA[Bankable-Security-Certs]]></image:title>
			<image:caption><![CDATA[Most Bankable Security Certs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/apple-fixes-two-zero-day-ios-vulnerabilities-exploited-in-the-wild/</loc>
		<lastmod>2020-03-04T05:36:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto512540.jpg</image:loc>
			<image:title><![CDATA[canstockphoto512540]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/serious-vulnerability-found-lifesize-business-videoconferencing-devices/</loc>
		<lastmod>2020-03-04T05:36:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto34390927-800x450.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34390927-800x450]]></image:title>
			<image:caption><![CDATA[insider threat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/intent-based-security-the-next-step-for-devops/</loc>
		<lastmod>2020-03-04T05:36:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Intent-Based-Security.jpg</image:loc>
			<image:title><![CDATA[networking]]></image:title>
			<image:caption><![CDATA[HashiCorp]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-evolving-approach-to-iot-security/</loc>
		<lastmod>2020-03-04T05:36:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/IoT-Security-Approach.jpg</image:loc>
			<image:title><![CDATA[IoT]]></image:title>
			<image:caption><![CDATA[digital transformation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/devops-chat-devsecops-and-rsac-2019-with-shannon-lietz/</loc>
		<lastmod>2020-03-04T05:36:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/DevSecOps-RSAC.jpg</image:loc>
			<image:caption><![CDATA[meeting]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-3-pillars-of-the-modern-day-soc/</loc>
		<lastmod>2020-03-04T05:36:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Modern-Day-SOC.jpg</image:loc>
			<image:title><![CDATA[Modern-Day-SOC]]></image:title>
			<image:caption><![CDATA[3 Pillars of the Modern-Day SOC]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/preventing-security-breaches-within-company-search-applications/</loc>
		<lastmod>2020-03-04T05:36:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Preventing-Security-Breaches.jpg</image:loc>
			<image:caption><![CDATA[healthcare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cyber-insurance-adoption-low-despite-rising-cyberattack-threats/</loc>
		<lastmod>2020-03-04T05:36:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cyber-Insurance.jpg</image:loc>
			<image:title><![CDATA[Cyber-Insurance]]></image:title>
			<image:caption><![CDATA[contractor]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/google-chrome-drops-support-for-tls-1-0-and-1-1/</loc>
		<lastmod>2020-03-04T05:36:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto19872681.jpg</image:loc>
			<image:title><![CDATA[canstockphoto19872681]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-art-of-digital-identity/</loc>
		<lastmod>2020-03-04T05:36:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Art-Digital-Identity.jpg</image:loc>
			<image:caption><![CDATA[JumpCloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/sensitive-data-is-safer-in-the-cloud/</loc>
		<lastmod>2020-03-04T05:36:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Data-Safer-Cloud.jpg</image:loc>
			<image:title><![CDATA[Data-Safer-Cloud]]></image:title>
			<image:caption><![CDATA[Sensitive Data is Safer in the Cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ethics-of-disclosure-chinese-hacking-of-eu-diplomatic-cable-traffic/</loc>
		<lastmod>2020-03-04T05:36:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Ethics-Disclosure-Chinese.jpg</image:loc>
			<image:caption><![CDATA[China Anthem hack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/lacking-medical-device-security-puts-everyone-at-risk/</loc>
		<lastmod>2020-03-04T05:36:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Medical-Device-Security.jpg</image:loc>
			<image:title><![CDATA[Medical-Device-Security]]></image:title>
			<image:caption><![CDATA[Lacking Medical Device Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-security-of-the-wordpress-platform/</loc>
		<lastmod>2020-03-04T05:36:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Security-WordPress-Platform.jpg</image:loc>
			<image:title><![CDATA[Security-WordPress-Platform]]></image:title>
			<image:caption><![CDATA[Security of the WordPress Platform]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/automation-the-lingua-franca-of-it-security/</loc>
		<lastmod>2020-03-04T05:36:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Automation-Lingua-Franca.jpg</image:loc>
			<image:caption><![CDATA[multifactor authentication]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/records-breach-singapores-hiv-positive-national-registry-exposed/</loc>
		<lastmod>2020-03-04T05:36:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/HIV-Registry-Exposed.jpg</image:loc>
			<image:title><![CDATA[HIV-Registry-Exposed]]></image:title>
			<image:caption><![CDATA[DDoS attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-dawn-of-the-code-war-or-the-blurred-world-war/</loc>
		<lastmod>2020-03-04T05:36:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Code-War.jpg</image:loc>
			<image:title><![CDATA[Code-War]]></image:title>
			<image:caption><![CDATA[firewall]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/facetime-group-chat-disabled-due-to-snooping-bug/</loc>
		<lastmod>2020-03-04T05:36:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Age-Of-Collaboration.jpg</image:loc>
			<image:title><![CDATA[Age-Of-Collaboration]]></image:title>
			<image:caption><![CDATA[HR data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/huawei-indicted-china-claims-foul/</loc>
		<lastmod>2020-03-04T05:36:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Huawei-Indicted-China.jpg</image:loc>
			<image:title><![CDATA[China Spy Pleads Guilty]]></image:title>
			<image:caption><![CDATA[Thousand Talents Program]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/national-privacy-day-time-to-consider-a-national-data-privacy-law/</loc>
		<lastmod>2020-03-04T05:36:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/National-Privacy-Day.jpg</image:loc>
			<image:title><![CDATA[National-Privacy-Day]]></image:title>
			<image:caption><![CDATA[National Data Privacy Law]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ota-good-for-drivers-better-for-hackers/</loc>
		<lastmod>2020-03-04T05:36:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/OTA-Hackers.jpg</image:loc>
			<image:title><![CDATA[OTA-Hackers]]></image:title>
			<image:caption><![CDATA[OTA: Good for Drivers, Better for Hackers?]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/trojan-infects-browser-extensions-after-disabling-integrity-checks/</loc>
		<lastmod>2020-03-04T05:36:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Phishing2.jpg</image:loc>
			<image:title><![CDATA[Phishing2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/winters-cold-wont-freeze-phishing/</loc>
		<lastmod>2020-03-04T05:36:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Winter-Freeze-Phishing.jpg</image:loc>
			<image:title><![CDATA[Winter-Freeze-Phishing]]></image:title>
			<image:caption><![CDATA[Freeze on Phishing]]></image:caption>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->