<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/01/prudent-security-admin-has-a-new-data-breach-precedent-been-created/</loc>
		<lastmod>2020-03-04T05:36:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Prudent-Security-Admin.jpg</image:loc>
			<image:title><![CDATA[Prudent-Security-Admin]]></image:title>
			<image:caption><![CDATA[broadband]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Prudentsecuritypic1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/volunteer-project-takes-down-100000-malware-distribution-sites/</loc>
		<lastmod>2020-03-04T05:36:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Website-Supply-Chain-Attacks.jpg</image:loc>
			<image:title><![CDATA[Website-Supply-Chain-Attacks]]></image:title>
			<image:caption><![CDATA[digital data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/wi-fi-chip-firmware-flaws-enable-over-the-air-hacking/</loc>
		<lastmod>2020-03-04T05:36:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto48825962.jpg</image:loc>
			<image:title><![CDATA[canstockphoto48825962]]></image:title>
			<image:caption><![CDATA[hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2-cybersecurity-challenges-we-can-stop-talking-about-and-2-we-cant/</loc>
		<lastmod>2020-03-04T05:36:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cybersecurity-Challenges.jpg</image:loc>
			<image:caption><![CDATA[Styra]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ransomware-in-health-care-5-tips-to-avoid-being-a-victim/</loc>
		<lastmod>2020-03-04T05:36:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Ransomware-Health-Care.jpg</image:loc>
			<image:title><![CDATA[healthcare]]></image:title>
			<image:caption><![CDATA[healthcare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/whats-a-pop-up-soc-and-who-needs-one/</loc>
		<lastmod>2020-03-04T05:36:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Pop-Up-SOC.jpg</image:loc>
			<image:title><![CDATA[Pop-Up-SOC]]></image:title>
			<image:caption><![CDATA[zScaler]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/want-to-weed-out-anomalies-use-an-adversary-mindset/</loc>
		<lastmod>2020-03-04T05:36:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Weed-Out-Anomalies.jpg</image:loc>
			<image:title><![CDATA[Weed-Out-Anomalies]]></image:title>
			<image:caption><![CDATA[Use an Adversary Mindset]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/incident-response-5-tips-to-ensure-your-plan-is-ready/</loc>
		<lastmod>2020-03-04T05:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Incident-Response.jpg</image:loc>
			<image:title><![CDATA[Incident-Response]]></image:title>
			<image:caption><![CDATA[Incident Response Plan]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/do-we-really-have-a-cybersecurity-skills-gap-time-to-refocus-the-hiring-process/</loc>
		<lastmod>2020-03-04T05:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cybersecurity-Skills-Gap.jpg</image:loc>
			<image:caption><![CDATA[remote workforce]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/government-e-commerce-sites-hacked-through-database-tool/</loc>
		<lastmod>2020-03-04T05:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto46664719.jpg</image:loc>
			<image:title><![CDATA[canstockphoto46664719]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-security-teams-can-learn-from-googles-infrastructure-first-approach/</loc>
		<lastmod>2020-03-04T05:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Infrastructure-First.jpg</image:loc>
			<image:title><![CDATA[Infrastructure-First]]></image:title>
			<image:caption><![CDATA[Google’s 'Infrastructure First' Approach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ai-your-no-1-weapon-in-the-fight-for-data-protection/</loc>
		<lastmod>2020-03-04T05:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/AI-Data-Protection.jpg</image:loc>
			<image:title><![CDATA[AI-Data-Protection]]></image:title>
			<image:caption><![CDATA[Auth0]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/client-applications-a-hackers-easiest-target/</loc>
		<lastmod>2020-03-04T05:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Client-Applications.jpg</image:loc>
			<image:title><![CDATA[Client-Applications]]></image:title>
			<image:caption><![CDATA[Client Applications A Hacker’s Easiest Target]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/windows-vcf-zero-day-exploit-allows-remote-code-execution/</loc>
		<lastmod>2020-03-04T05:36:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto512540.jpg</image:loc>
			<image:title><![CDATA[canstockphoto512540]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/pki-deployment-the-top-10-definitive-answers/</loc>
		<lastmod>2020-03-04T05:36:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/PKI-Development.jpg</image:loc>
			<image:title><![CDATA[PKI-Development]]></image:title>
			<image:caption><![CDATA[PKI Development]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fortnite-attack-allowed-taking-over-player-accounts/</loc>
		<lastmod>2020-03-04T05:36:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Fortnite.jpg</image:loc>
			<image:title><![CDATA[Fortnite]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/shopping-for-secure-iot-devices/</loc>
		<lastmod>2020-03-04T05:36:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Shopping-Secure-IoT.jpg</image:loc>
			<image:title><![CDATA[Shopping-Secure-IoT]]></image:title>
			<image:caption><![CDATA[Shopping for Secure IoT Devices]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/can-smart-home-leaks-lead-to-major-cyberattacks/</loc>
		<lastmod>2020-03-04T05:36:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Smart-Home-Leaks.jpg</image:loc>
			<image:title><![CDATA[Smart-Home-Leaks]]></image:title>
			<image:caption><![CDATA[Smart Home Leaks Lead to Cyberattacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/next-gen-firewall-sizing-5-things-to-look-for/</loc>
		<lastmod>2020-03-04T05:36:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Next-Gen-Firewall.jpg</image:loc>
			<image:title><![CDATA[Next-Gen-Firewall]]></image:title>
			<image:caption><![CDATA[Next-Gen Firewall Sizing]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/CPS-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Screen-Shot-2019-01-13-at-2.03.53-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Screen-Shot-2019-01-13-at-2.05.45-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Screen-Shot-2019-01-13-at-2.07.15-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Screen-Shot-2019-01-13-at-2.11.49-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/software-defined-perimeter-moving-beyond-traditional-vpns/</loc>
		<lastmod>2020-03-04T05:36:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Software-Defined-Perimeter.jpg</image:loc>
			<image:caption><![CDATA[vendor access management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ryuk-ransomware-that-hit-u-s-newspapers-not-state-sponsored/</loc>
		<lastmod>2020-03-04T05:36:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Ransomware-Strains.jpg</image:loc>
			<image:title><![CDATA[Ransomware]]></image:title>
			<image:caption><![CDATA[ransom]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/is-nta-just-another-kind-of-ids/</loc>
		<lastmod>2020-03-04T05:36:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/NTA-IDS.jpg</image:loc>
			<image:caption><![CDATA[location data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/security-boulevard-chat-the-evolution-of-network-security-with-firemons-tim-woods/</loc>
		<lastmod>2020-03-04T05:36:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Evolution-Network-Security.jpg</image:loc>
			<image:title><![CDATA[Sophos]]></image:title>
			<image:caption><![CDATA[SASE]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/new-phishing-kit-allows-bypassing-two-factor-authentication-with-ease/</loc>
		<lastmod>2020-03-04T05:36:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Phishing-Evolving-Threat.jpg</image:loc>
			<image:title><![CDATA[Phishing-Evolving-Threat]]></image:title>
			<image:caption><![CDATA[phishing email]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/huawei-sanction-busting-and-espionage-threat/</loc>
		<lastmod>2020-03-04T05:36:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Huawei-Espionage.jpg</image:loc>
			<image:title><![CDATA[Huawei-Espionage]]></image:title>
			<image:caption><![CDATA[Huawei Sanction-Busting and Espionage Threat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-does-firewall-mean-today/</loc>
		<lastmod>2020-03-04T05:36:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Firewall-Means.jpg</image:loc>
			<image:title><![CDATA[Firewall-Means]]></image:title>
			<image:caption><![CDATA[What Does Firewall Mean Today]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/government-shutdowns-negative-impact-on-federal-cybersecurity/</loc>
		<lastmod>2020-03-04T05:36:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Governmentshutdown.jpg</image:loc>
			<image:title><![CDATA[Governmentshutdown]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/85-android-adware-apps-downloaded-9-million-times/</loc>
		<lastmod>2020-03-04T05:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Win.jpg</image:loc>
			<image:title><![CDATA[Win]]></image:title>
			<image:caption><![CDATA[Reduce Cybersecurity Risk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-state-of-web-and-mobile-devsecops/</loc>
		<lastmod>2020-03-04T05:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Web-Mobile-DevSecOps.jpg</image:loc>
			<image:caption><![CDATA[data security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ma-cybersecurity-lessons-from-the-marriott-breach/</loc>
		<lastmod>2020-03-04T05:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/MA-Cybersecurity-Marriott.jpg</image:loc>
			<image:title><![CDATA[MA-Cybersecurity-Marriott]]></image:title>
			<image:caption><![CDATA[census]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/rogue-ios-apps-sent-data-to-malicious-server/</loc>
		<lastmod>2020-03-04T05:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SupplyChain-1.jpg</image:loc>
			<image:caption><![CDATA[Hamas]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-humans-alone-cant-stop-todays-bots/</loc>
		<lastmod>2020-03-04T05:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Humans-Cant-Stop-Bots.jpg</image:loc>
			<image:caption><![CDATA[AI in security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/moving-to-a-cloud-service-dont-ditch-your-security-pros/</loc>
		<lastmod>2020-03-04T05:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cloud-Service-Security.jpg</image:loc>
			<image:title><![CDATA[Cloud-Service-Security]]></image:title>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hackers-hijack-chromecast-devices-and-smart-tvs-via-exposed-upnp/</loc>
		<lastmod>2020-03-04T05:36:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Routers-Target.jpg</image:loc>
			<image:title><![CDATA[Routers-Target]]></image:title>
			<image:caption><![CDATA[Easy Target for Russian Hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/e-discovery-in-cloud-security-issue-and-compliance-gaps/</loc>
		<lastmod>2020-03-04T05:36:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/E-Discovery-Cloud-Security.jpg</image:loc>
			<image:caption><![CDATA[Microsoft Azure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/adobe-reader-and-acrobat-get-patches-for-two-critical-flaws/</loc>
		<lastmod>2020-03-04T05:36:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Public-Private-Partnerships.jpg</image:loc>
			<image:caption><![CDATA[Macs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/adapting-security-response-for-cloud-workloads/</loc>
		<lastmod>2020-03-04T05:36:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Security-Response-Cloud.jpg</image:loc>
			<image:caption><![CDATA[Qualys cloud]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cloudsecuritypic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/cloudsecuritypic2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/new-windows-zero-day-bug-allows-deleting-arbitrary-files/</loc>
		<lastmod>2020-03-04T05:36:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Data-Breach-Disclosures.jpg</image:loc>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-we-should-focus-on-how-not-who-of-cyberattacks/</loc>
		<lastmod>2020-03-04T05:36:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/How-Who-Cyberattacks.jpg</image:loc>
			<image:caption><![CDATA[Ryuk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/best-practice-response-can-mitigate-data-breaches-quickly/</loc>
		<lastmod>2020-03-04T05:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Mitigate-Data-Breaches.jpg</image:loc>
			<image:title><![CDATA[Mitigate-Data-Breaches]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-changing-landscape-of-automated-attacks-on-web-and-mobile-apps/</loc>
		<lastmod>2020-03-04T05:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Attacks-Web-Mobile.jpg</image:loc>
			<image:caption><![CDATA[states cyber]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Botpic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Botpic2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Botpic3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Botpic4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Botpic5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Botpic6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Botpic7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dark-side-quantum-computing/</loc>
		<lastmod>2020-03-04T05:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/DarkSide.jpg</image:loc>
			<image:title><![CDATA[DarkSide]]></image:title>
			<image:caption><![CDATA[Dark Side Quantum Computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/project-lakhta-russian-meddling-gets-russians-indicted/</loc>
		<lastmod>2020-03-04T05:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/canstockphoto48627411.jpg</image:loc>
			<image:title><![CDATA[canstockphoto48627411]]></image:title>
			<image:caption><![CDATA[Project Lakhta Russian Meddling]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/6-gdpr-obstacles-security-teams-face/</loc>
		<lastmod>2020-03-04T05:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/GDPR-Compliance.jpg</image:loc>
			<image:title><![CDATA[GDPR-Compliance]]></image:title>
			<image:caption><![CDATA[Security GDPR Compliance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/report-attacks-on-financial-services-targeting-apis/</loc>
		<lastmod>2020-03-04T05:38:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Malware-Marap-AdvisorsBot.jpg</image:loc>
			<image:caption><![CDATA[dark web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/democratic-presidential-campaigns-learn-cybersecurity-lesson/</loc>
		<lastmod>2020-03-04T05:38:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/canstockphoto14367981.jpg</image:loc>
			<image:title><![CDATA[canstockphoto14367981]]></image:title>
			<image:caption><![CDATA[campaigns cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/apple-joins-fido-alliance-to-eliminate-passwords/</loc>
		<lastmod>2020-03-04T05:38:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/IAM-Solution-Organization.jpg</image:loc>
			<image:caption><![CDATA[passwords]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cisco-looks-to-unify-cybersecurity-management/</loc>
		<lastmod>2020-03-04T05:38:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto19812164.jpg</image:loc>
			<image:title><![CDATA[canstockphoto19812164]]></image:title>
			<image:caption><![CDATA[application layer security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/Cisco-SecureX-screenshot-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/veritas-extends-reach-of-ai-compliance-tool/</loc>
		<lastmod>2020-03-04T05:38:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/China-Social-Credit.jpg</image:loc>
			<image:caption><![CDATA[survey security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/Veritas-advanced_supervision-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/zerofox-raises-74m-to-combat-deepfakes-with-ai/</loc>
		<lastmod>2020-03-04T05:38:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto8613464.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8613464]]></image:title>
			<image:caption><![CDATA[identity verification]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/ZeroFOX-platform-views-1.png</image:loc>
			<image:caption><![CDATA[deepfake ZeroFOX]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tufin-unifies-management-of-cloud-cybersecurity-policies/</loc>
		<lastmod>2020-03-04T05:38:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Point-Solution-Mindset.jpg</image:loc>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/Tufin-SecureCloud-Dashboard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/whitesource-adds-python-support-to-vulnerability-discovery-tool/</loc>
		<lastmod>2020-03-04T05:38:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/canstockphoto28244853.jpg</image:loc>
			<image:title><![CDATA[canstockphoto28244853]]></image:title>
			<image:caption><![CDATA[WhiteSource Python]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/WhiteSource-Prioritize-3-1.jpg</image:loc>
			<image:caption><![CDATA[WhiteSource Python]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/siemens-mobility-claroty-partner-to-secure-ot-networks/</loc>
		<lastmod>2020-03-04T05:38:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Manufacturing-Cybercriminals-1.jpg</image:loc>
			<image:caption><![CDATA[manufacturing remote]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/Claroty-and-Siemens-DCU-Integration-1.png</image:loc>
			<image:caption><![CDATA[OT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cybereason-uncovers-malware-distributed-via-bitbucket-repositories/</loc>
		<lastmod>2020-03-04T05:38:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Exfiltrate-Intellectual-Property.jpg</image:loc>
			<image:caption><![CDATA[Bitbucket]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/imperva-report-third-of-vulnerabilities-lack-fix/</loc>
		<lastmod>2020-03-04T05:38:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Securing-New-Network.jpg</image:loc>
			<image:caption><![CDATA[security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/check-point-aims-to-expand-reach-of-cloud-service/</loc>
		<lastmod>2020-03-04T05:38:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Security-Response-Cloud.jpg</image:loc>
			<image:caption><![CDATA[Qualys cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/check-point-reveals-azure-cloud-security-flaw/</loc>
		<lastmod>2020-03-04T05:38:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Data-Breach-Disclosures.jpg</image:loc>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/eclypsium-researchers-demonstrate-direct-memory-attacks/</loc>
		<lastmod>2020-03-04T05:38:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Security-Exposed.jpg</image:loc>
			<image:caption><![CDATA[direct memory attack]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/dma_hp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/check-point-reveals-zoom-video-hack/</loc>
		<lastmod>2020-03-04T05:38:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Security-Team-Value.jpg</image:loc>
			<image:caption><![CDATA[data privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/report-finds-gaming-sites-battling-sophisticated-fraud-schemes/</loc>
		<lastmod>2020-03-04T05:38:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/canstockphoto548936.jpg</image:loc>
			<image:title><![CDATA[canstockphoto548936]]></image:title>
			<image:caption><![CDATA[gaming sites]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/qualys-reveals-critical-openbsd-mail-server-security-flaw/</loc>
		<lastmod>2020-03-04T05:38:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Prudent-Security-Admin.jpg</image:loc>
			<image:title><![CDATA[Prudent-Security-Admin]]></image:title>
			<image:caption><![CDATA[broadband]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/concentric-applies-deep-learning-algorithms-to-data-security/</loc>
		<lastmod>2020-03-04T05:38:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/AI-Adoption-Lags.jpg</image:loc>
			<image:caption><![CDATA[Open Raven]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/Concentric-product-image-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nist-publishes-privacy-framework/</loc>
		<lastmod>2020-03-04T05:38:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Data-Privacy-Plan.jpg</image:loc>
			<image:title><![CDATA[Data-Privacy-Plan]]></image:title>
			<image:caption><![CDATA[privacy framework]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-compass-ceo-sets-devsecops-strategy/</loc>
		<lastmod>2020-03-04T05:38:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto9837967-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto9837967]]></image:title>
			<image:caption><![CDATA[cybersecurity DevOps]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/sde-dashboard-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cisco-launches-iot-security-platform/</loc>
		<lastmod>2020-03-04T05:38:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto8652089.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8652089]]></image:title>
			<image:caption><![CDATA[Cisco IoT security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/Cisco-Cybervision.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/data-privacy-day-surfaces-latent-cybersecurity-tensions/</loc>
		<lastmod>2020-03-04T05:38:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/canstockphoto54457272-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto54457272 (1)]]></image:title>
			<image:caption><![CDATA[data secure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cybersecurity-process-issues-will-dominate-2020/</loc>
		<lastmod>2020-03-04T05:38:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto37220030.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37220030]]></image:title>
			<image:caption><![CDATA[CISO]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/whitehat-provides-free-vulnerability-discovery-services-to-govt-agencies/</loc>
		<lastmod>2020-03-04T05:38:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/SMB-Good-Security.jpg</image:loc>
			<image:caption><![CDATA[code-signing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/insight-acquires-armis-to-expand-secure-endpoint-service/</loc>
		<lastmod>2020-03-04T05:38:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/DevSecOps-Security-Priority.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-Security-Priority]]></image:title>
			<image:caption><![CDATA[data privacy]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/Armis.png</image:loc>
			<image:caption><![CDATA[Armis]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/f5-networks-buys-shape-security-to-prevent-fraud/</loc>
		<lastmod>2020-03-04T05:38:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17405520.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17405520]]></image:title>
			<image:caption><![CDATA[fraud COVID]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybersecurity-at-banks-a-different-kind-of-holiday-stress/</loc>
		<lastmod>2020-03-04T05:38:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/canstockphoto17237408.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17237408]]></image:title>
			<image:caption><![CDATA[cybersecurity banks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/wind-river-acquires-star-lab-for-iot-security/</loc>
		<lastmod>2020-03-04T05:38:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Vulnerable-IoT.jpg</image:loc>
			<image:title><![CDATA[Vulnerable-IoT]]></image:title>
			<image:caption><![CDATA[IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/akamai-cyber-attacks-now-being-weaponized/</loc>
		<lastmod>2020-03-04T05:38:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/survey-finds-cybersecurity-salaries-constrained/</loc>
		<lastmod>2020-03-04T05:38:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Consumer-Records.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cyberhaven-applies-behavioral-analytics-to-better-secure-data/</loc>
		<lastmod>2020-03-04T05:38:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto26421253.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26421253]]></image:title>
			<image:caption><![CDATA[Netsurion]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/Cyberhaven-screen-shot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/trend-micro-looks-to-the-cloud-for-security/</loc>
		<lastmod>2020-03-04T05:38:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto37426827.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37426827]]></image:title>
			<image:caption><![CDATA[Trend Micro Cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/survey-multicloud-security-next-big-challenge/</loc>
		<lastmod>2020-03-04T05:38:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/Cloud-Security-Serverless-Data.jpg</image:loc>
			<image:caption><![CDATA[multicloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/report-malware-for-macs-on-the-rise/</loc>
		<lastmod>2020-03-04T05:38:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Public-Private-Partnerships.jpg</image:loc>
			<image:caption><![CDATA[Macs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/aws-previews-cloud-security-advances/</loc>
		<lastmod>2020-03-04T05:38:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Security-Response-Cloud.jpg</image:loc>
			<image:caption><![CDATA[Qualys cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cloudvector-unveils-platform-for-securing-apis/</loc>
		<lastmod>2020-03-04T05:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Risk-Cloud-Security.jpg</image:loc>
			<image:caption><![CDATA[Exabeam]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/CloudVector_Dashboard-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cybersecurity-and-ai-not-partners-just-yet/</loc>
		<lastmod>2020-03-04T05:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/AI-Machine-Learning-Biometric.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/report-retail-sector-under-cybersecurity-siege/</loc>
		<lastmod>2020-03-04T05:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Walmart-Minority-Report.jpg</image:loc>
			<image:caption><![CDATA[retail cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/sonicwall-allies-with-perimeter-81-to-gain-sdp-platform/</loc>
		<lastmod>2020-03-04T05:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Demand.jpg</image:loc>
			<image:title><![CDATA[Demand]]></image:title>
			<image:caption><![CDATA[SDP]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ibm-looks-to-unify-cybersecurity/</loc>
		<lastmod>2020-03-04T05:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Source-Innovation-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Source-Innovation-Cybersecurity]]></image:title>
			<image:caption><![CDATA[IBM security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/IBM-Cloud-Pak-for-Security-scaled.png</image:loc>
			<image:caption><![CDATA[IBM security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/aqua-security-acquires-cloudsploit-to-monitor-configs/</loc>
		<lastmod>2020-03-04T05:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Idaptive-Unify-Access.jpg</image:loc>
			<image:caption><![CDATA[DNS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/CloudSploit-scaled.png</image:loc>
			<image:caption><![CDATA[CloudSploit]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/report-emotet-botnet-is-back-with-a-vengeance/</loc>
		<lastmod>2020-03-04T05:38:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Malware-Marap-AdvisorsBot.jpg</image:loc>
			<image:caption><![CDATA[dark web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/immersive-labs-raises-40m-for-cybersecurity-training/</loc>
		<lastmod>2020-03-04T05:38:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/canstockphoto3732428.jpg</image:loc>
			<image:title><![CDATA[canstockphoto3732428]]></image:title>
			<image:caption><![CDATA[Immersive Labs]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/Immersive-Labs-Screenshot-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/simulation-surfaces-elections-soft-cybersecurity-underbelly/</loc>
		<lastmod>2020-03-04T05:38:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Looming.jpg</image:loc>
			<image:caption><![CDATA[attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/survey-says-quantum-computing-a-cybersecurity-threat/</loc>
		<lastmod>2020-03-04T05:38:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Hackers-Sandbox.jpg</image:loc>
			<image:caption><![CDATA[IBM data security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/microsoft-lays-bare-cybersecurity-ambitions/</loc>
		<lastmod>2020-03-04T05:38:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/E-Discovery-Cloud-Security.jpg</image:loc>
			<image:caption><![CDATA[Microsoft Azure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/domaintools-allies-with-splunk-to-combat-cybersecurity-threats/</loc>
		<lastmod>2020-03-04T05:38:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/PCI-Compliance.jpg</image:loc>
			<image:caption><![CDATA[data lifecycle]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/DomainTools-App-for-Splunk-Threat-Hunting-Dashboard.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sophos-ceo-pending-acquisition-part-of-larger-services-shift/</loc>
		<lastmod>2020-03-04T05:38:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Evolution-Network-Security.jpg</image:loc>
			<image:title><![CDATA[Sophos]]></image:title>
			<image:caption><![CDATA[SASE]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/KrisHagermanNEW.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/oasis-to-lead-cybersecurity-interoperability-initiative/</loc>
		<lastmod>2020-03-04T05:38:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Enterprise-Security-Firewall.jpg</image:loc>
			<image:caption><![CDATA[SD-WAN]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ibm-adds-encryption-everywhere-capabilities-to-the-mainframe/</loc>
		<lastmod>2020-03-04T05:38:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Managed-Security-Services.jpg</image:loc>
			<image:caption><![CDATA[automation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/survey-third-party-code-proves-vulnerable/</loc>
		<lastmod>2020-03-04T05:38:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Rethinking-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[data leakage]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/okta-enables-entire-organization-to-participate-in-cybersecurity-defense/</loc>
		<lastmod>2020-03-04T05:38:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto23159600.jpg</image:loc>
			<image:title><![CDATA[canstockphoto23159600]]></image:title>
			<image:caption><![CDATA[digital strategy]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/HealthInsight-Incomplete-tasks-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ibm-advances-cryptography-using-quantum-computers/</loc>
		<lastmod>2020-03-04T05:38:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Rethinking-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[data leakage]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/IBMQuantum.jpg</image:loc>
			<image:caption><![CDATA[IBM cryptography]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/whitehat-report-devsecops-adoption-on-the-rise/</loc>
		<lastmod>2020-03-04T05:38:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Intent-Based-Security.jpg</image:loc>
			<image:title><![CDATA[networking]]></image:title>
			<image:caption><![CDATA[HashiCorp]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/report-identifies-6-devsecops-pillars/</loc>
		<lastmod>2020-03-04T05:38:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/canstockphoto9837967.jpg</image:loc>
			<image:title><![CDATA[canstockphoto9837967]]></image:title>
			<image:caption><![CDATA[DevOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/sitelock-extends-database-security-reach-to-mysql/</loc>
		<lastmod>2020-03-04T05:38:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto41515095.jpg</image:loc>
			<image:title><![CDATA[canstockphoto41515095]]></image:title>
			<image:caption><![CDATA[SiteLock]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/SMART_DB-Remove-Malware-Screenshot-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/vmware-to-create-security-business-unit-post-carbon-black-buy/</loc>
		<lastmod>2020-03-04T05:38:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/canstockphoto4489816.jpg</image:loc>
			<image:title><![CDATA[canstockphoto4489816]]></image:title>
			<image:caption><![CDATA[quantum computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/report-printers-remain-soft-security-underbelly/</loc>
		<lastmod>2020-03-04T05:38:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/canstockphoto3284318.jpg</image:loc>
			<image:title><![CDATA[canstockphoto3284318]]></image:title>
			<image:caption><![CDATA[printer security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/box-shield-embeds-security-controls-in-document-service/</loc>
		<lastmod>2020-03-04T05:38:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto18974507.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18974507]]></image:title>
			<image:caption><![CDATA[cloud data]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/Box-Shield-Threat-Detection-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/juniper-networks-extends-cybersecurity-strategy/</loc>
		<lastmod>2020-03-04T05:38:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Managed-Security-Services.jpg</image:loc>
			<image:caption><![CDATA[automation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/palo-alto-networks-discovers-34m-vulnerabilities-on-public-cloud/</loc>
		<lastmod>2020-03-04T05:38:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto35008730.jpg</image:loc>
			<image:caption><![CDATA[cloud miconfigurations]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/report-details-nature-of-threats-to-mobile-computing/</loc>
		<lastmod>2020-03-04T05:38:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Web-Mobile-DevSecOps.jpg</image:loc>
			<image:caption><![CDATA[data security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/malwarebytes-launces-malware-remediaton-service/</loc>
		<lastmod>2020-03-04T05:38:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/CyberOfficers.jpg</image:loc>
			<image:title><![CDATA[CyberOfficers]]></image:title>
			<image:caption><![CDATA[IT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ddos-for-hire-sites-bounce-back/</loc>
		<lastmod>2020-03-04T05:38:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/DDoS.jpg</image:loc>
			<image:title><![CDATA[DDoS]]></image:title>
			<image:caption><![CDATA[DDoS-for-hire]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/fortinet-launches-secure-branch-initiative/</loc>
		<lastmod>2020-03-04T05:38:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Screen-Shot-2019-06-17-at-12.17.43-PM.png</image:loc>
			<image:caption><![CDATA[Fortinet SD-WAN]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/report-shines-light-on-extent-of-smb-insecurity/</loc>
		<lastmod>2020-03-04T05:38:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Failure-to-Plan.jpg</image:loc>
			<image:caption><![CDATA[SMB security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/symantec-expands-capabilities-of-cloud-gateways/</loc>
		<lastmod>2020-03-04T05:38:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Cloud-Breach.jpg</image:loc>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/SYMC_Cloud_Access_Security-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/barracuda-networks-extends-cloud-security-reach-to-azure/</loc>
		<lastmod>2020-03-04T05:38:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Software-Defined-Perimeter.jpg</image:loc>
			<image:caption><![CDATA[vendor access management]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/Barracuda-Azure-Infrastructure-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/vmware-moves-to-close-cybersecurity-loop/</loc>
		<lastmod>2020-03-04T05:38:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Ops-DevSecOps.jpg</image:loc>
			<image:title><![CDATA[Ops-DevSecOps]]></image:title>
			<image:caption><![CDATA[network security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/VMware-Dashboard_Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/threat-stack-embeds-application-security-monitoring-tool/</loc>
		<lastmod>2020-03-04T05:38:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Enterprise-Sized-Security.jpg</image:loc>
			<image:title><![CDATA[Enterprise-Sized-Security]]></image:title>
			<image:caption><![CDATA[Midsized Businesses Need Enterprise-Sized Security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Threat-Stack-Application-Security-Monitoring-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/orca-security-picks-up-6-5m-to-improve-cloud-security/</loc>
		<lastmod>2020-03-04T05:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Data-Cloud-Monitoring.jpg</image:loc>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/edgewise-networks-simplifies-microsegmentation/</loc>
		<lastmod>2020-03-04T05:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/microsegmentation.jpg</image:loc>
			<image:title><![CDATA[microsegmentation]]></image:title>
			<image:caption><![CDATA[microsegmentation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/vectra-raises-100m-more-for-cybersecurity-ai/</loc>
		<lastmod>2020-03-04T05:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/AI-Machine-Learning-Biometric.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/report-shines-light-on-dark-net/</loc>
		<lastmod>2020-03-04T05:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Fileless-Malware-RSAC.jpg</image:loc>
			<image:caption><![CDATA[Zerologon]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/check-point-adds-big-data-analytics-platform-for-cybersecurity/</loc>
		<lastmod>2020-03-04T05:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Sandbox-Proof-Concept.jpg</image:loc>
			<image:title><![CDATA[software asset management]]></image:title>
			<image:caption><![CDATA[threat intelligence]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Check-Point.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/akamai-extends-security-services-to-the-enterprise/</loc>
		<lastmod>2020-03-04T05:38:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Cybersecurity-Trade-Wars.jpg</image:loc>
			<image:title><![CDATA[Akamai Extends Security Services to the Enterprise]]></image:title>
			<image:caption><![CDATA[Akamai Extends Security Services to the Enterprise]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/trustwave-report-threat-containment-getting-better/</loc>
		<lastmod>2020-03-04T05:38:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto6511232.jpg</image:loc>
			<image:title><![CDATA[canstockphoto6511232]]></image:title>
			<image:caption><![CDATA[coronavirus]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/survey-finds-insider-threats-becoming-bigger-concern/</loc>
		<lastmod>2020-03-04T05:38:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/China-Social-Credit.jpg</image:loc>
			<image:caption><![CDATA[survey security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/palo-alto-networks-details-strategy-post-acquisition-spree/</loc>
		<lastmod>2020-03-04T05:38:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Risk-Cloud-Security.jpg</image:loc>
			<image:caption><![CDATA[Exabeam]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/sophos-acquires-rook-security-to-extend-services-strategy/</loc>
		<lastmod>2020-03-04T05:38:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/DevSecOps-Cloud.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-Cloud]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/whitehat-security-enlists-rural-sourcing-to-close-devsecops-gap/</loc>
		<lastmod>2020-03-04T05:38:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto23232337.jpg</image:loc>
			<image:title><![CDATA[canstockphoto23232337]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/verizon-cybersecurity-report-sweat-the-small-stuff/</loc>
		<lastmod>2020-03-04T05:38:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto24629730.jpg</image:loc>
			<image:title><![CDATA[canstockphoto24629730]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/survey-security-patches-put-it-leaders-between-rock-and-hard-place/</loc>
		<lastmod>2020-03-04T05:38:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Shadow-IT-Catch-22.jpg</image:loc>
			<image:caption><![CDATA[Security Automation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/qualys-partners-with-cis-to-identify-lapsed-site-certificates/</loc>
		<lastmod>2020-03-04T05:38:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Risk-Cloud-Security.jpg</image:loc>
			<image:caption><![CDATA[Exabeam]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Qualys-certview-dashboard-3-816-2x-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/u-s-army-towson-university-aim-to-advance-intrusion-detection/</loc>
		<lastmod>2020-03-04T05:38:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto46546060.jpg</image:loc>
			<image:title><![CDATA[canstockphoto46546060]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/mcafee-survey-finds-it-at-cybersecurity-fault-most/</loc>
		<lastmod>2020-03-04T05:38:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/IT-Security-Fault.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/fortinet-weaves-stronger-cybersecurity-fabric/</loc>
		<lastmod>2020-03-04T05:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Cybersecurity-Struggles.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity]]></image:title>
			<image:caption><![CDATA[cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/aruba-advances-iot-cybersecurity/</loc>
		<lastmod>2020-03-04T05:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Aruba-IoT-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Aruba-IoT-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Aruba Advances IoT Cybersecurity]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/ClearPass-Device-Insight-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/intel-advances-hardware-centric-approach-to-cybersecurity/</loc>
		<lastmod>2020-03-04T05:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Manufacturers.jpg</image:loc>
			<image:title><![CDATA[Manufacturers]]></image:title>
			<image:caption><![CDATA[cryptojacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/survey-cybersecurity-crowdsourcing-achieves-acceptance/</loc>
		<lastmod>2020-03-04T05:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Survey-Cybersecurity-Crowdsourcing.jpg</image:loc>
			<image:caption><![CDATA[remote workforce]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/algosec-aims-to-unify-cloud-security/</loc>
		<lastmod>2020-03-04T05:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Secure-Cloud-Migration.jpg</image:loc>
			<image:title><![CDATA[Secure-Cloud-Migration]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/sophos-shines-a-light-on-cloud-security/</loc>
		<lastmod>2020-03-04T05:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Secure-Cloud-Migration.jpg</image:loc>
			<image:title><![CDATA[Secure-Cloud-Migration]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Cloud-Optix-Alerts_300-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/vmware-makes-case-for-service-defined-firewall/</loc>
		<lastmod>2020-03-04T05:38:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Shadow-IT-Catch-22.jpg</image:loc>
			<image:caption><![CDATA[Security Automation]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/VMware-Service-defined-Firewall-Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fortinet-high-tech-bridge-partner-to-advance-devsecops/</loc>
		<lastmod>2020-03-04T05:38:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto138708.jpg</image:loc>
			<image:title><![CDATA[canstockphoto138708]]></image:title>
			<image:caption><![CDATA[ML firewalls]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cyberx-raises-18m-to-address-industrial-cybersecurity/</loc>
		<lastmod>2020-03-04T05:38:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Malwarebytes-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Malwarebytes-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Changing Nature of Malware, Cybersecurity Threats]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ibm-report-details-shifting-cybersecurity-threat-landscape/</loc>
		<lastmod>2020-03-04T05:38:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/IBM-Cybersecurity-Threat.jpg</image:loc>
			<image:title><![CDATA[IBM-Cybersecurity-Threat]]></image:title>
			<image:caption><![CDATA[managing privileged accounts]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/report-gaming-apps-have-become-a-gateway-for-cybercrime/</loc>
		<lastmod>2020-03-04T05:38:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto22293053.jpg</image:loc>
			<image:title><![CDATA[canstockphoto22293053]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/sonicwall-extends-smb-cybersecurity-ambitions/</loc>
		<lastmod>2020-03-04T05:38:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Warfare.jpg</image:loc>
			<image:title><![CDATA[Warfare]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/SonicWall.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/symantec-counts-on-apis-to-extend-cybersecurity-reach/</loc>
		<lastmod>2020-03-04T05:38:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto47950254-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto47950254]]></image:title>
			<image:caption><![CDATA[security testing]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/icd-puzzle@2x-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/survey-finds-security-teams-betting-on-machine-learning/</loc>
		<lastmod>2020-03-04T05:38:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto34318568.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34318568]]></image:title>
			<image:caption><![CDATA[threat intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ibm-warns-retailers-of-trojan-threat/</loc>
		<lastmod>2020-03-04T05:38:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/ecommerce.jpg</image:loc>
			<image:title><![CDATA[ecommerce]]></image:title>
			<image:caption><![CDATA[web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/armorblox-applies-ai-to-prevent-data-loss/</loc>
		<lastmod>2020-03-04T05:38:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/AI.jpg</image:loc>
			<image:title><![CDATA[AI]]></image:title>
			<image:caption><![CDATA[AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/arm-bolsters-iot-security-testing/</loc>
		<lastmod>2020-03-04T05:38:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/IoT-Security-Testing.jpg</image:loc>
			<image:caption><![CDATA[IoT Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/survey-finds-greater-appreciation-of-devsecops-value/</loc>
		<lastmod>2020-03-04T05:38:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto19812164.jpg</image:loc>
			<image:title><![CDATA[canstockphoto19812164]]></image:title>
			<image:caption><![CDATA[application layer security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/investment-dollars-pour-into-cybersecurity-as-vendor-fatigue-rises/</loc>
		<lastmod>2020-03-04T05:38:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/VCfunding.jpg</image:loc>
			<image:title><![CDATA[VCfunding]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/netography-leverages-network-flow-software-to-identify-anomalies/</loc>
		<lastmod>2020-03-04T05:38:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Netography-Leverages-Software.jpg</image:loc>
			<image:title><![CDATA[Netography-Leverages-Software]]></image:title>
			<image:caption><![CDATA[f5]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/carbonite-to-unify-security-and-data-protection-by-acquiring-webroot/</loc>
		<lastmod>2020-03-04T05:38:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/AI-Machine-Learning-Biometric.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/survey-surfaces-cybersecurity-disconnects/</loc>
		<lastmod>2020-03-04T05:38:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Corporate-Boot-Camps.jpg</image:loc>
			<image:title><![CDATA[cybersecurity]]></image:title>
			<image:caption><![CDATA[cybersecurity startups]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/extreme-networks-extends-cybersecurity-reach-to-iot-endpoints/</loc>
		<lastmod>2020-03-04T05:38:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Malwarebytes-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Malwarebytes-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Changing Nature of Malware, Cybersecurity Threats]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Defender-Adapter-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/malwarebytes-report-details-changing-nature-malware-cybersecurity-threats/</loc>
		<lastmod>2020-03-04T05:38:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Malwarebytes-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Malwarebytes-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Changing Nature of Malware, Cybersecurity Threats]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/idaptive-looks-to-unify-access-control/</loc>
		<lastmod>2020-03-04T05:38:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Idaptive-Unify-Access.jpg</image:loc>
			<image:caption><![CDATA[DNS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Idaptive-product-devices-ui.png</image:loc>
			<image:caption><![CDATA[Idaptive-product-devices-ui]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/crowdstrike-moves-to-create-cybersecurity-ecosystem/</loc>
		<lastmod>2020-03-04T05:38:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Ops-DevSecOps.jpg</image:loc>
			<image:title><![CDATA[Ops-DevSecOps]]></image:title>
			<image:caption><![CDATA[network security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/CrowdStrike1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/sonrai-security-unfurls-service-to-track-data-in-the-cloud/</loc>
		<lastmod>2020-03-04T05:38:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto49532875.jpg</image:loc>
			<image:title><![CDATA[canstockphoto49532875]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Sonrai.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tufin-adds-public-clouds-support-to-policy-management-service/</loc>
		<lastmod>2020-03-04T05:38:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Data-Breach-Disclosures.jpg</image:loc>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/orkus-applies-ai-to-enforce-cloud-security-governance/</loc>
		<lastmod>2020-03-04T05:38:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto35008730.jpg</image:loc>
			<image:caption><![CDATA[cloud miconfigurations]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Orkus-dashboard-screenshot-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/nyc-invests-to-become-hub-for-cybersecurity-professionals/</loc>
		<lastmod>2020-03-04T05:38:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/CyberNYC.jpg</image:loc>
			<image:title><![CDATA[CyberNYC]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/SOSA-Building.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/barracuda-networks-embeds-incident-management-in-email-security-suite/</loc>
		<lastmod>2020-03-04T05:38:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/BEC-Fraud.jpg</image:loc>
			<image:title><![CDATA[BEC-Fraud]]></image:title>
			<image:caption><![CDATA[phaxttachments]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Barracudaforensics-2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/convergence-of-security-networking-services-accelerates/</loc>
		<lastmod>2020-03-04T05:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto17608547.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17608547]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/alert-logic-adds-managed-threat-intelligence-service/</loc>
		<lastmod>2020-03-04T05:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto35078002.jpg</image:loc>
			<image:title><![CDATA[canstockphoto35078002]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Alert-Logic-dashboard-tri-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/forescout-acquires-securitymatters-for-iot-security/</loc>
		<lastmod>2020-03-04T05:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto12165489.jpg</image:loc>
			<image:title><![CDATA[canstockphoto12165489]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/juniper-networks-cryptomining-exploit-targeting-docker-containers/</loc>
		<lastmod>2020-03-04T05:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Stealing-Infrastructure.jpg</image:loc>
			<image:title><![CDATA[Stealing-Infrastructure]]></image:title>
			<image:caption><![CDATA[coinbit]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/infection_overview_0X.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cybersecurity-becoming-bigger-sd-wan-concern/</loc>
		<lastmod>2020-03-04T05:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Cybersecurity-SD-WAN-Concern.jpg</image:loc>
			<image:caption><![CDATA[ZeroNorth]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/blackberry-acquires-cylance-to-apply-ai-to-iot-cybersecurity/</loc>
		<lastmod>2020-03-04T05:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Vulnerable-IoT.jpg</image:loc>
			<image:title><![CDATA[Vulnerable-IoT]]></image:title>
			<image:caption><![CDATA[IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/red-hat-extends-cybersecurity-automation-ambitions/</loc>
		<lastmod>2020-03-04T05:38:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Cybersecurity-Automation-Ambitions.jpg</image:loc>
			<image:caption><![CDATA[zero trust]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/mcafee-report-points-to-cyber-collusion-between-china-north-korea/</loc>
		<lastmod>2020-03-04T05:38:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Data-Breaches.jpg</image:loc>
			<image:title><![CDATA[Data-Breaches]]></image:title>
			<image:caption><![CDATA[Data Regulation Data Breaches]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/check-point-acquires-dome9-to-advance-cloud-security/</loc>
		<lastmod>2020-03-04T05:38:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto35169622.jpg</image:loc>
			<image:title><![CDATA[canstockphoto35169622]]></image:title>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/symantec-acquisitions-further-ai-strategy/</loc>
		<lastmod>2020-03-04T05:38:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto138708.jpg</image:loc>
			<image:title><![CDATA[canstockphoto138708]]></image:title>
			<image:caption><![CDATA[ML firewalls]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/fireeye-focuses-on-email-security-analysis-with-free-offering/</loc>
		<lastmod>2020-03-04T05:38:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto3516555.jpg</image:loc>
			<image:title><![CDATA[identity]]></image:title>
			<image:caption><![CDATA[credential theft]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/microsoft-makes-latest-cybersecurity-case/</loc>
		<lastmod>2020-03-04T05:38:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Microsoftsecurity.jpg</image:loc>
			<image:title><![CDATA[Microsoftsecurity]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/barracuda-networks-sees-more-ato-attacks-ahead/</loc>
		<lastmod>2020-03-04T05:38:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/ATO-Attacks.jpg</image:loc>
			<image:title><![CDATA[ATO-Attacks]]></image:title>
			<image:caption><![CDATA[Barracuda Networks ATO Attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/it-security-bomgar-to-become-beyondtrust/</loc>
		<lastmod>2020-03-04T05:38:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Lack-Of-User-Privacy.jpg</image:loc>
			<image:title><![CDATA[Lack-Of-User-Privacy]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/white-hat-security-partners-with-bugcrowd-to-advance-devsecops/</loc>
		<lastmod>2020-03-04T05:38:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Bugcrowd-Advance-DevSecOps.jpg</image:loc>
			<image:title><![CDATA[Bugcrowd-Advance-DevSecOps]]></image:title>
			<image:caption><![CDATA[Bugcrowd to Advance DevSecOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/splunk-brings-soar-to-siem-platform/</loc>
		<lastmod>2020-03-04T05:38:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17731168.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17731168]]></image:title>
			<image:caption><![CDATA[IT leaders]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybersecurity-struggles-continue-cisco-report-finds/</loc>
		<lastmod>2020-03-04T05:38:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Cybersecurity-Struggles.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity]]></image:title>
			<image:caption><![CDATA[cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/gigamon-acquires-icebrg-to-meld-security-network-monitoring/</loc>
		<lastmod>2020-03-04T05:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Gigamon-ICEBRG.jpg</image:loc>
			<image:title><![CDATA[Gigamon-ICEBRG]]></image:title>
			<image:caption><![CDATA[data cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/vmware-pledges-to-reduce-cybersecurity-costs/</loc>
		<lastmod>2020-03-04T05:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto5755420.jpg</image:loc>
			<image:title><![CDATA[canstockphoto5755420]]></image:title>
			<image:caption><![CDATA[threat intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cisco-outlines-strategy-post-2-35b-duo-security-deal/</loc>
		<lastmod>2020-03-04T05:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Employee-Security-Training.jpg</image:loc>
			<image:title><![CDATA[Employee-Security-Training]]></image:title>
			<image:caption><![CDATA[Employee Security Training]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/signal-sciences-extends-waf-scope/</loc>
		<lastmod>2020-03-04T05:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto45782708.jpg</image:loc>
			<image:title><![CDATA[canstockphoto45782708]]></image:title>
			<image:caption><![CDATA[Microsoft Fixes 50 Flaws]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/juniper-networks-rises-to-5g-networks-security-challenge/</loc>
		<lastmod>2020-03-04T05:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Juniper-Networks-Rise.jpg</image:loc>
			<image:title><![CDATA[Juniper-Networks-Rise]]></image:title>
			<image:caption><![CDATA[5G Networks Security Challenge]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fireeye-infuses-machine-learning-into-endpoint-security/</loc>
		<lastmod>2020-03-04T05:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/FireEye-Machine-Learning.jpg</image:loc>
			<image:title><![CDATA[FireEye-Machine-Learning]]></image:title>
			<image:caption><![CDATA[FireEye Infuses Machine Learning]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/imperva-acquires-rasp-provider-to-advance-devsecops/</loc>
		<lastmod>2020-03-04T05:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/RASP-Provider.jpg</image:loc>
			<image:title><![CDATA[RASP-Provider]]></image:title>
			<image:caption><![CDATA[WFH risk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/solarwinds-acquires-trusted-metrics/</loc>
		<lastmod>2020-03-04T05:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto45375631.jpg</image:loc>
			<image:title><![CDATA[canstockphoto45375631]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/certificate-authorities-to-collaborate-on-london-protocol/</loc>
		<lastmod>2020-03-04T05:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/canstockphoto17846566.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17846566]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/survey-finds-breach-discovery-takes-an-average-197-days/</loc>
		<lastmod>2020-03-04T05:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Breach-Discovery.jpg</image:loc>
			<image:title><![CDATA[Breach-Discovery]]></image:title>
			<image:caption><![CDATA[Breach Discovery Takes 197 Days]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/trend-micro-embraces-ai-to-advance-cybersecurity/</loc>
		<lastmod>2020-03-04T05:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Advanced-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Advanced-Cybersecurity]]></image:title>
			<image:caption><![CDATA[homomorphic encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mcafee-to-advance-cybersecurity-ai-via-the-cloud/</loc>
		<lastmod>2020-03-04T05:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto26580677.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26580677]]></image:title>
			<image:caption><![CDATA[machine authentication]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/rubrik-adds-cybersecurity-app-to-combat-ransomware/</loc>
		<lastmod>2020-03-04T05:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto45375694.jpg</image:loc>
			<image:title><![CDATA[canstockphoto45375694]]></image:title>
			<image:caption><![CDATA[AI]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Rubrick-Radar-Analyze.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cost-of-email-security-breaches-rises/</loc>
		<lastmod>2020-03-04T05:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Email-Security-Breaches.jpg</image:loc>
			<image:title><![CDATA[Email-Security-Breaches]]></image:title>
			<image:caption><![CDATA[Email Security Breaches Rises]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/barracuda-networks-extends-waf-reach-to-google-cloud-platform/</loc>
		<lastmod>2020-03-04T05:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto35169622.jpg</image:loc>
			<image:title><![CDATA[canstockphoto35169622]]></image:title>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/connecting-the-dots-between-cybersecurity-and-trade-wars/</loc>
		<lastmod>2020-03-04T05:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Cybersecurity-Trade-Wars.jpg</image:loc>
			<image:title><![CDATA[Akamai Extends Security Services to the Enterprise]]></image:title>
			<image:caption><![CDATA[Akamai Extends Security Services to the Enterprise]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/fortinet-adds-machine-learning-algorithms-to-waf/</loc>
		<lastmod>2020-03-04T05:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto22603372.jpg</image:loc>
			<image:title><![CDATA[canstockphoto22603372]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/continuum-acquires-carvir-to-strengthen-managed-security-service/</loc>
		<lastmod>2020-03-04T05:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto18192539-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18192539]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/vmware-partners-with-okta-on-identity-management/</loc>
		<lastmod>2020-03-04T05:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Identity-Management.jpg</image:loc>
			<image:caption><![CDATA[Man-in-the-middle attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/spp-coalition-challenges-payment-card-giants-on-cybersecurity/</loc>
		<lastmod>2020-03-04T05:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/canstockphoto2665994.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2665994]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/check-point-time-for-a-fifth-generation-of-cybersecurity/</loc>
		<lastmod>2020-03-04T05:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Check-Point.jpg</image:loc>
			<image:title><![CDATA[Check-Point]]></image:title>
			<image:caption><![CDATA[Fifth Generation of Cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/network-security-firemon-acquires-lumeta-to-visualize-connections/</loc>
		<lastmod>2020-03-04T05:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/verizon-report-finds-more-cybersecurity-gains-than-losses/</loc>
		<lastmod>2020-03-04T05:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto13604483.jpg</image:loc>
			<image:title><![CDATA[canstockphoto13604483]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/vmware-sets-sights-on-desktop-security/</loc>
		<lastmod>2020-03-04T05:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ibm-makes-case-lattice-cryptography-encryption/</loc>
		<lastmod>2020-03-04T05:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto21720384.jpg</image:loc>
			<image:title><![CDATA[canstockphoto21720384]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/rise-of-sd-wans-alters-nature-of-branch-office-security-challenge/</loc>
		<lastmod>2020-03-04T05:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Branch-Office-Security.jpg</image:loc>
			<image:caption><![CDATA[Zix]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/barracuda-networks-rethinks-cybersecurity-training-for-end-users/</loc>
		<lastmod>2020-03-04T05:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Emerging-Threats.jpg</image:loc>
			<image:title><![CDATA[Emerging-Threats]]></image:title>
			<image:caption><![CDATA[Sophistication in Hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/barrracuda-networks-unfurls-waf-cloud-service/</loc>
		<lastmod>2020-03-04T05:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Branch-Office-Security.jpg</image:loc>
			<image:caption><![CDATA[Zix]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ibm-survey-finds-more-believe-prepared-cyberattack/</loc>
		<lastmod>2020-03-04T05:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Media.jpg</image:loc>
			<image:title><![CDATA[Media]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cisco-strengthens-cloud-security-service/</loc>
		<lastmod>2020-03-04T05:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto25409210.jpg</image:loc>
			<image:title><![CDATA[cloud security]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/cisco-report-confirms-cyber-attacks-more-sophisticated/</loc>
		<lastmod>2020-03-04T05:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto48825957.jpg</image:loc>
			<image:title><![CDATA[canstockphoto48825957]]></image:title>
			<image:caption><![CDATA[Cisco Report Cyber Attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/splunk-to-dive-deeper-into-cybersecurity-phantom-buy/</loc>
		<lastmod>2020-03-04T05:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/AI.jpg</image:loc>
			<image:title><![CDATA[AI]]></image:title>
			<image:caption><![CDATA[AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/phishme-rebrands-to-apply-ai-to-combat-social-engineering/</loc>
		<lastmod>2020-03-04T05:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Help.jpg</image:loc>
			<image:title><![CDATA[Help]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/oracle-bets-machine-learning-algorithms-secure-future/</loc>
		<lastmod>2020-03-04T05:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto26580677.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26580677]]></image:title>
			<image:caption><![CDATA[machine authentication]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cyberark-acquires-vaultive-cloud-access-security-tech/</loc>
		<lastmod>2020-03-04T05:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto15917736-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto15917736 (1)]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/devsecops-cisco-extends-scope-of-security-analytics-platform/</loc>
		<lastmod>2020-03-04T05:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto21609321.jpg</image:loc>
			<image:title><![CDATA[canstockphoto21609321]]></image:title>
			<image:caption><![CDATA[architecture]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/sap-ciso-application-security-difficult/</loc>
		<lastmod>2020-03-04T05:38:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SAP.jpg</image:loc>
			<image:title><![CDATA[protecting]]></image:title>
			<image:caption><![CDATA[c-suite]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/bitcoin-tumbling-leads-to-multicount-indictment/</loc>
		<lastmod>2020-03-04T05:41:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cryptojacking-Over.jpg</image:loc>
			<image:caption><![CDATA[cryptocurrency]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/uk-warns-insurers-about-cyber-risks/</loc>
		<lastmod>2020-03-04T05:41:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Employee-Convenience.jpg</image:loc>
			<image:caption><![CDATA[cyber insurance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/personal-data-collection-outsourcing-surveillance/</loc>
		<lastmod>2020-03-04T05:41:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/DejaVu.jpg</image:loc>
			<image:caption><![CDATA[personal data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/companies-hit-by-iranian-cyberattacks-may-not-have-insurance-coverage/</loc>
		<lastmod>2020-03-04T05:41:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/canstockphoto61063223.jpg</image:loc>
			<image:title><![CDATA[canstockphoto61063223]]></image:title>
			<image:caption><![CDATA[cyber insurance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/dhs-cyber-agency-seeks-subpoena-authority-to-obtain-cyber-victim-info/</loc>
		<lastmod>2020-03-04T05:41:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Dumb-Privacy-Rules.jpg</image:loc>
			<image:caption><![CDATA[GRU]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/bill-to-prevent-child-porn-could-kill-encryption/</loc>
		<lastmod>2020-03-04T05:41:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Corporate-Boot-Camps.jpg</image:loc>
			<image:title><![CDATA[cybersecurity]]></image:title>
			<image:caption><![CDATA[cybersecurity startups]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-symbiotic-parasitic-relationship-between-privacy-security/</loc>
		<lastmod>2020-03-04T05:41:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Malicious-Insider-Threat.jpg</image:loc>
			<image:title><![CDATA[privacy]]></image:title>
			<image:caption><![CDATA[APTs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/when-scams-collide-e-mail-fraud-and-insurance/</loc>
		<lastmod>2020-03-04T05:41:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Risk-Assessment.jpg</image:loc>
			<image:caption><![CDATA[compliance spending]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ccpa-class-action-likely-not-too-classy/</loc>
		<lastmod>2020-03-04T05:41:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Dumb-Privacy-Rules.jpg</image:loc>
			<image:caption><![CDATA[GRU]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/can-antivirus-companies-use-good-samaritan-defense-to-block-rival-software/</loc>
		<lastmod>2020-03-04T05:41:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/canstockphoto13122846.jpg</image:loc>
			<image:title><![CDATA[canstockphoto13122846]]></image:title>
			<image:caption><![CDATA[Good Samaritan clause]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/encryption-wars-part-iv-barr-vs-big-tech/</loc>
		<lastmod>2020-03-04T05:41:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/encryption.jpg</image:loc>
			<image:title><![CDATA[encryption]]></image:title>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/twitter-and-the-saudi-computer-crime-or-was-it/</loc>
		<lastmod>2020-03-04T05:41:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/canstockphoto10712846.jpg</image:loc>
			<image:title><![CDATA[canstockphoto10712846]]></image:title>
			<image:caption><![CDATA[Twitter Saudi]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/pa-supreme-court-rules-defendant-need-not-decrypt-drive/</loc>
		<lastmod>2020-03-04T05:41:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto37653771.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37653771]]></image:title>
			<image:caption><![CDATA[decrypt]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/dont-geofence-me-in-courts-order-google-to-give-up-location-data/</loc>
		<lastmod>2020-03-04T05:41:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/NTA-IDS.jpg</image:loc>
			<image:caption><![CDATA[location data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/court-says-minor-can-be-prosecuted-for-sexting/</loc>
		<lastmod>2020-03-04T05:41:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/canstockphoto5937950.jpg</image:loc>
			<image:caption><![CDATA[sexting]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/beyond-security-to-risk-management/</loc>
		<lastmod>2020-03-04T05:41:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17603744.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17603744]]></image:title>
			<image:caption><![CDATA[risk security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ftc-enforcement-action-may-open-way-for-punishment-of-hacker-tools/</loc>
		<lastmod>2020-03-04T05:41:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Demystifying-Insider-Threats.jpg</image:loc>
			<image:title><![CDATA[security tools]]></image:title>
			<image:caption><![CDATA[open source security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/biometrics-facial-recognition-privacy-security-and-the-law/</loc>
		<lastmod>2020-03-04T05:41:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Behavioral-Biometric-Data.jpg</image:loc>
			<image:caption><![CDATA[Biometrics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/trump-ukraine-crowdstrike-and-servers-what-gives/</loc>
		<lastmod>2020-03-04T05:41:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/canstockphoto49362068.jpg</image:loc>
			<image:title><![CDATA[canstockphoto49362068]]></image:title>
			<image:caption><![CDATA[Trump]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/u-s-ag-wants-legal-back-door-to-all-facebook-postings-and-everything-else/</loc>
		<lastmod>2020-03-04T05:41:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Facebooks-Privacy-Breach.jpg</image:loc>
			<image:caption><![CDATA[privacy social media]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/court-rules-airline-not-bound-by-privacy-policy/</loc>
		<lastmod>2020-03-04T05:41:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Airline-Privacy-Policy.jpg</image:loc>
			<image:title><![CDATA[Airline-Privacy-Policy]]></image:title>
			<image:caption><![CDATA[Court Rules Airline Not Bound By Privacy Policy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/should-github-be-liable-for-the-capital-one-hack/</loc>
		<lastmod>2020-03-04T05:41:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/DejaVu.jpg</image:loc>
			<image:caption><![CDATA[personal data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/whats-in-your-wallet-a-tepid-defense-of-capital-one/</loc>
		<lastmod>2020-03-04T05:41:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Data-Breach-Disclosures.jpg</image:loc>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/face-off-privacy-issues-not-confined-to-faceapp/</loc>
		<lastmod>2020-03-04T05:41:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto25149504.jpg</image:loc>
			<image:caption><![CDATA[FaceApp]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/criminalize-ransomware-payment-a-bad-solution-for-a-bad-problem/</loc>
		<lastmod>2020-03-04T05:41:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Modernized-Industrial.jpg</image:loc>
			<image:caption><![CDATA[zero trust]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/security-lessons-from-the-cpb-biometric-data-breach/</loc>
		<lastmod>2020-03-04T05:41:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Security-CPB-Biometric.jpg</image:loc>
			<image:caption><![CDATA[managed detection and response]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/supreme-court-cell-privacy-ruling-thwarted/</loc>
		<lastmod>2020-03-04T05:41:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Cell-Privacy-Ruling.jpg</image:loc>
			<image:title><![CDATA[Cell-Privacy-Ruling]]></image:title>
			<image:caption><![CDATA[Supreme Court Cell Privacy Ruling Thwarted]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-legality-of-waging-war-in-cyberspace/</loc>
		<lastmod>2020-03-04T05:41:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Legality-War-Cyberspace.jpg</image:loc>
			<image:title><![CDATA[Legality-War-Cyberspace]]></image:title>
			<image:caption><![CDATA[The Legality of Waging War in Cyberspace]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/germany-orders-facebook-to-stop-collecting-non-facebook-data-and-why-it-doesnt-matter/</loc>
		<lastmod>2020-03-04T05:41:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Facebook-Collecting-Data.jpg</image:loc>
			<image:title><![CDATA[Facebook-Collecting-Data]]></image:title>
			<image:caption><![CDATA[Collecting Non-Facebook Data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/court-allows-cybersecurity-fraud-case-under-federal-false-claims-act/</loc>
		<lastmod>2020-03-04T05:41:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Cybersecurity-Fraud-Federal.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity-Fraud-Federal]]></image:title>
			<image:caption><![CDATA[Cybersecurity Fraud Case Under Federal False Claims Act]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/biometrics-giving-the-government-the-finger/</loc>
		<lastmod>2020-03-04T05:41:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Biometrics-Government.jpg</image:loc>
			<image:title><![CDATA[Biometrics-Government]]></image:title>
			<image:caption><![CDATA[Biometrics: Giving the Government the Finger]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-companies-can-avoid-cyber-liability-by-hiring-terrorism-certified-technologies/</loc>
		<lastmod>2020-03-04T05:41:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Safety-Act-Terrorism-Certified.jpg</image:loc>
			<image:title><![CDATA[Safety-Act-Terrorism-Certified]]></image:title>
			<image:caption><![CDATA[Bugcrowd]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/face-off-when-biometrics-technology-and-the-law-collide/</loc>
		<lastmod>2020-03-04T05:41:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Biometrics-Technology-Law.jpg</image:loc>
			<image:title><![CDATA[Biometrics-Technology-Law]]></image:title>
			<image:caption><![CDATA[litigation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/lets-get-physical-online-vs-in-real-life-law/</loc>
		<lastmod>2020-03-04T05:41:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Online-Real-Law.jpg</image:loc>
			<image:title><![CDATA[judging data]]></image:title>
			<image:caption><![CDATA[data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/life-insurance-and-privacy/</loc>
		<lastmod>2020-03-04T05:41:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Life-Insurance-Privacy.jpg</image:loc>
			<image:caption><![CDATA[web host]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/are-companies-obligated-to-protect-employee-data-courts-say-yes/</loc>
		<lastmod>2020-03-04T05:41:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Companies-Protect-Employee-Data.jpg</image:loc>
			<image:title><![CDATA[how-to-design-a-vendor-management-process]]></image:title>
			<image:caption><![CDATA[Vendor Management process]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/is-it-unlawful-to-collect-or-store-tcp-ip-log-data-for-security-purposes/</loc>
		<lastmod>2020-03-04T05:41:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/TCP-IP-Log-Data.jpg</image:loc>
			<image:title><![CDATA[TCP-IP-Log-Data]]></image:title>
			<image:caption><![CDATA[value data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/memo-to-supreme-court-nominee-kavanaugh-the-internet-is-not-a-series-of-tubes/</loc>
		<lastmod>2020-03-04T05:41:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Kavanaugh-Internet.jpg</image:loc>
			<image:caption><![CDATA[Network]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/dumb-privacy-rules-how-lawyers-are-ruining-it-for-everyone/</loc>
		<lastmod>2020-03-04T05:41:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Dumb-Privacy-Rules.jpg</image:loc>
			<image:caption><![CDATA[GRU]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/supreme-court-ruling-changes-internet-ages/</loc>
		<lastmod>2020-03-04T05:41:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Supreme-Court-Internet.jpg</image:loc>
			<image:title><![CDATA[Supreme-Court-Internet]]></image:title>
			<image:caption><![CDATA[Supreme Court Ruling Changes]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/are-breach-disclosure-laws-unconstitutional-in-the-wake-of-supreme-court-abortion-case/</loc>
		<lastmod>2020-03-04T05:41:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Breach-Disclosure-Laws.jpg</image:loc>
			<image:title><![CDATA[Breach-Disclosure-Laws]]></image:title>
			<image:caption><![CDATA[Disney contract]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/privacy-uber-alles-literally/</loc>
		<lastmod>2020-03-04T05:41:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Privacy-Uber-Alles.jpg</image:loc>
			<image:title><![CDATA[Privacy-Uber-Alles]]></image:title>
			<image:caption><![CDATA[GDPR: Privacy Uber Alles]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-moonshot-information-security-project/</loc>
		<lastmod>2020-03-04T05:41:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Moonshot-Information.jpg</image:loc>
			<image:title><![CDATA[Moonshot-Information]]></image:title>
			<image:caption><![CDATA[Moonshot Information Security Project]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/dell-computers-doesnt-care-about-fraud-and-neither-do-most-companies/</loc>
		<lastmod>2020-03-04T05:41:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Dell-Fraud.jpg</image:loc>
			<image:title><![CDATA[Dell-Fraud]]></image:title>
			<image:caption><![CDATA[Dell Computers Doesn’t Care About Fraud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/surveillance-sans-frontiers-thanks-internet/</loc>
		<lastmod>2020-03-04T05:41:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Surveillance-Sans-Frontiers.jpg</image:loc>
			<image:title><![CDATA[Surveillance-Sans-Frontiers]]></image:title>
			<image:caption><![CDATA[Surveillance Sans Frontiers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/public-private-partnerships-sharing-data-compromising-privacy/</loc>
		<lastmod>2020-03-04T05:41:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Public-Private-Partnerships.jpg</image:loc>
			<image:caption><![CDATA[Macs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/privacy-in-public-places/</loc>
		<lastmod>2020-03-04T05:41:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Public-Privacy.jpg</image:loc>
			<image:title><![CDATA[Public-Privacy]]></image:title>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/flight-simulator-passwords-trojan-might-lead-legal-liability/</loc>
		<lastmod>2020-03-04T05:41:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Flight-Simulator-Trojan.jpg</image:loc>
			<image:title><![CDATA[Flight-Simulator-Trojan]]></image:title>
			<image:caption><![CDATA[Flight Simulator Passwords Trojan]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-the-stormy-daniels-lawsuit-means-for-clickwrap-contracts/</loc>
		<lastmod>2020-03-04T05:41:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Stormy-Daniels-Lawsuit.jpg</image:loc>
			<image:title><![CDATA[Stormy-Daniels-Lawsuit]]></image:title>
			<image:caption><![CDATA[Stormy Daniels Lawsuit Contracts]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/can-providing-security-be-a-crime/</loc>
		<lastmod>2020-03-04T05:41:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Security-Crime.jpg</image:loc>
			<image:title><![CDATA[Security-Crime]]></image:title>
			<image:caption><![CDATA[Providing Security Be a Crime]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/kindness-strangers-supreme-court-privacy-third-parties/</loc>
		<lastmod>2020-03-04T05:41:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto14703933-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto14703933]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/meuller-russia-indictment-means-cybersecurity/</loc>
		<lastmod>2020-03-04T05:41:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/supreme-court-decide-breach-victims-rights/</loc>
		<lastmod>2020-03-04T05:41:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Rights.jpg</image:loc>
			<image:title><![CDATA[Rights]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/realize-course-means-war/</loc>
		<lastmod>2020-03-04T05:41:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/War.jpg</image:loc>
			<image:title><![CDATA[War]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/data-breach-uber-bigger-problems/</loc>
		<lastmod>2020-03-04T05:41:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Uber4.jpg</image:loc>
			<image:title><![CDATA[Uber4]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/acdc-act-good-in-theory-terrible-in-practice/</loc>
		<lastmod>2020-03-04T05:41:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/ACDC.jpg</image:loc>
			<image:title><![CDATA[will-developing-nations-turn-to-cybercrime-to-fuel-their-economy]]></image:title>
			<image:caption><![CDATA[Developing Nations Cybercrime]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/dojs-irresponsible-encryption/</loc>
		<lastmod>2020-03-04T05:41:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Irresponsible.jpg</image:loc>
			<image:title><![CDATA[Irresponsible]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/supreme-court-private-privacy-property/</loc>
		<lastmod>2020-03-04T05:41:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Court.jpg</image:loc>
			<image:title><![CDATA[Court]]></image:title>
			<image:caption><![CDATA[IP]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/supreme-court-decide-major-internet-privacy-jurisdiction-case/</loc>
		<lastmod>2020-03-04T05:41:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Supreme.jpg</image:loc>
			<image:title><![CDATA[Supreme]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-the-global-cybersecurity-skills-shortage-is-impacting-business/</loc>
		<lastmod>2020-03-04T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/attackers-taking-advantage-of-the-coronavirus-covid-19-media-frenzy/</loc>
		<lastmod>2020-03-04T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/my-take-why-iot-systems-wont-be-secure-until-each-and-every-microservice-is-reliably-authenticated/</loc>
		<lastmod>2020-03-04T11:34:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cathay-pacific-slammed-for-security-failures-following-hack-which-exposed-9-4-million-people-worldwide/</loc>
		<lastmod>2020-03-04T11:39:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/insecurity-podcast-jeff-davis-on-smart-mobility-beyond-autonomous-vehicles/</loc>
		<lastmod>2020-03-04T11:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/catchpole-redux-and-hashing-files-websites-with-ssdeepr/</loc>
		<lastmod>2020-03-04T12:36:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/lets-encrypt-vulnerability/</loc>
		<lastmod>2020-03-04T12:46:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/free-your-developers-from-mundane-tasks/</loc>
		<lastmod>2020-03-04T12:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/lets-encrypt-says-it-will-revoke-3m-certificates-due-to-software-bug/</loc>
		<lastmod>2020-03-04T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/want-to-retain-top-cybersecurity-talent-add-automation/</loc>
		<lastmod>2020-03-04T13:51:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-global-impact-of-covid-19-on-markets-the-digital-experience/</loc>
		<lastmod>2020-03-04T13:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/revocation-of-millions-of-certificates-leaves-websites-labeled-as-insecure/</loc>
		<lastmod>2020-03-04T14:05:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/announcing-hysolate-cyberark-integration-to-protect-privileged-users-from-cyber-threats/</loc>
		<lastmod>2020-03-04T14:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/maze-ransomware/</loc>
		<lastmod>2020-03-04T14:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-work-the-dangers-of-role-based-access-control-rbac/</loc>
		<lastmod>2020-03-04T14:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/lockheed-martin-ventures-and-nextgen-venture-partners-invest-in-runsafe-security/</loc>
		<lastmod>2020-03-05T14:48:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/beyond-npm-audit-to-traverse-an-increasingly-complex-dependency-tree/</loc>
		<lastmod>2020-03-04T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rethinking-digital-hygiene/</loc>
		<lastmod>2020-03-04T15:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/hypervisor-dc-snapshots-are-no-substitute-for-proper-active-directory-backups/</loc>
		<lastmod>2020-03-04T15:53:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/email-the-front-line-of-cybercrime-research-part-1/</loc>
		<lastmod>2020-03-04T16:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/20-of-people-caught-in-data-breaches-suffer-financial-info-leaks/</loc>
		<lastmod>2020-03-04T16:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/hypervisor-dc-snapshots-are-no-substitute-for-proper-active-directory-backups-2/</loc>
		<lastmod>2020-03-04T15:53:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-cloud-village-erick-galinkins-your-blacklist-is-dead-airgap-everything/</loc>
		<lastmod>2020-03-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ic3-2019-internet-crime-report-hot-topics-avast/</loc>
		<lastmod>2020-03-04T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/researcher-discovers-zero-day-vulnerability-using-homoglyph-characters/</loc>
		<lastmod>2020-03-04T17:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/daniel-storis-we-are-hiring-devops/</loc>
		<lastmod>2020-03-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/mitre-attck-techniques-for-ics-practical-applications-part-3/</loc>
		<lastmod>2020-03-04T17:56:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/instructor-spotlight-stephen-sims-sec599-co-author/</loc>
		<lastmod>2020-03-04T18:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/instructor-spotlight-david-hazar-mgt516-co-author/</loc>
		<lastmod>2020-03-04T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-cloud-village-ayman-elsawahs-using-paretos-principle-for-securing-aws-with-scps/</loc>
		<lastmod>2020-03-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-forgerock-secure-sharing-trust-and-enforce/</loc>
		<lastmod>2020-03-04T19:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rs-232-and-rs-485/</loc>
		<lastmod>2020-03-04T19:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5g-vast-potential-but-better-security-needed/</loc>
		<lastmod>2020-03-04T19:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/two-factor/</loc>
		<lastmod>2020-03-04T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/threat-modeling-application-released-by-owasp-threat-dragon-1-0/</loc>
		<lastmod>2020-03-04T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/a-requirements-spec-for-voting/</loc>
		<lastmod>2020-03-04T20:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/lets-encrypt-revokes-3-million-certificates-due-to-caa-bug/</loc>
		<lastmod>2020-03-04T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/8-key-capabilities-managed-security-service-providers-need-from-their-endpoint-detection-and-response-platform/</loc>
		<lastmod>2020-03-04T20:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/lets-encrypt-to-revoke-3-million-ssl-certificates-on-march-4/</loc>
		<lastmod>2020-03-04T21:32:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-engagement-zone/</loc>
		<lastmod>2020-03-04T22:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/these-are-the-big-takeaways-from-this-years-rsa-conference-2020/</loc>
		<lastmod>2020-03-04T22:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/deploy-a-cloud-waf-ddos-solution-while-complying-with-australian-data-sovereignty/</loc>
		<lastmod>2020-03-04T22:37:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-is-identity-and-access-management-so-important-in-preventing-data-breaches/</loc>
		<lastmod>2020-03-04T23:10:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/breach-prevention-is-so-2010-now-is-the-time-to-protect-data-itself/</loc>
		<lastmod>2020-03-04T23:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/3-unique-causes-of-burnout-for-security-operations-professionals/</loc>
		<lastmod>2020-03-04T23:48:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/controlling-the-narrative-2/</loc>
		<lastmod>2020-03-05T00:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-is-iso-27701/</loc>
		<lastmod>2020-03-05T06:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/international-womens-day-2020-a-qa-with-heather-johnston-vp-legal-affairs/</loc>
		<lastmod>2020-03-05T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ryuk-revisited-analysis-of-recent-ryuk-attack/</loc>
		<lastmod>2020-03-05T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-network-segmentation-matters/</loc>
		<lastmod>2020-03-05T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/google-maps-and-pii-repositories/</loc>
		<lastmod>2020-03-05T08:41:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-war-of-passwords-compliance-vs-nist/</loc>
		<lastmod>2020-03-05T10:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/securing-ai-the-next-gen-of-enterprise-cybersecurity/</loc>
		<lastmod>2020-03-05T10:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-safety-in-schools-why-its-time-to-think-beyond-your-content-filter/</loc>
		<lastmod>2020-03-05T11:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/office-365-is-good-clearswift-makes-it-safe-and-secure/</loc>
		<lastmod>2020-03-05T11:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-is-ransomware-and-what-you-need-to-know-to-stay-safe/</loc>
		<lastmod>2020-03-05T11:59:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/security-of-health-information/</loc>
		<lastmod>2020-03-05T12:10:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ppmwp-2-1-the-new-dormant-users-policy-support-for-post-login-redirects/</loc>
		<lastmod>2020-03-05T12:18:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-easy-way-to-hipaa-compliant-password-security/</loc>
		<lastmod>2020-03-05T12:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/office-365-is-good-clearswift-makes-it-safe-and-secure-2/</loc>
		<lastmod>2020-03-05T11:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/loyalty-program-fraud-targets-600000-tesco-shopper-accounts/</loc>
		<lastmod>2020-03-05T12:43:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/t-mobile-says-security-incident-might-have-exposed-customers-data/</loc>
		<lastmod>2020-03-05T12:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/t-mobile-suffers-a-data-breach-again/</loc>
		<lastmod>2020-03-05T13:06:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/striking-the-right-balance-how-adcs-make-sddcs-better/</loc>
		<lastmod>2020-03-05T13:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/two-las-vegas-casinos-may-have-been-crippled-by-ransomware-attacks/</loc>
		<lastmod>2020-03-05T14:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/boldly-go-farther-with-greater-efficiency-for-pam/</loc>
		<lastmod>2020-03-05T15:05:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-sites-is-trickbot-targeting/</loc>
		<lastmod>2020-03-05T15:34:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/jackpotting-malware/</loc>
		<lastmod>2020-03-05T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-work-how-data-science-and-machine-learning-are-affecting-cybersecurity/</loc>
		<lastmod>2020-03-05T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-cloud-village-chris-le-roys-build-to-hack-hack-to-build/</loc>
		<lastmod>2020-03-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/which-industries-are-doing-best-at-email-security-research-part-2/</loc>
		<lastmod>2020-03-05T17:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/an-eye-on-iot-security/</loc>
		<lastmod>2020-03-05T17:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ceos-quit-social-media-to-keep-them-secure-avast/</loc>
		<lastmod>2020-03-05T17:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/eight-ways-to-improve-cyber-hygiene-in-the-enterprise/</loc>
		<lastmod>2020-03-05T17:39:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/8-tips-for-recruiting-more-women-in-software-development/</loc>
		<lastmod>2020-03-05T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/kill-the-restructure-says-dr-cherry-vu-and-rob-england-video/</loc>
		<lastmod>2020-03-05T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rsa-conference-2020-wrap-up-from-software-security-to-soulcycle/</loc>
		<lastmod>2020-03-05T18:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-winnona-desombres-bestsellers-in-the-underground-economy/</loc>
		<lastmod>2020-03-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/xkcd-self-isolate/</loc>
		<lastmod>2020-03-05T20:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/centros-para-el-control-de-enfermedades-combate-los-microbios/</loc>
		<lastmod>2020-03-05T20:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cloud-series-express-delivers-modern-identity-in-minutes/</loc>
		<lastmod>2020-03-05T20:32:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/evaluating-paths-to-incident-response/</loc>
		<lastmod>2020-03-05T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/my-take-former-nsa-director-says-cybersecurity-solutions-need-to-reflect-societal-values/</loc>
		<lastmod>2020-03-05T21:38:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/investing-in-the-analyst-why-its-so-important/</loc>
		<lastmod>2020-03-05T23:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/was-your-new-disney-plus-account-stolen/</loc>
		<lastmod>2020-03-05T23:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-secret-to-championing-data-privacy-and-strengthening-your-competitive-advantage/</loc>
		<lastmod>2020-03-06T01:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/automatically-discover-prioritize-and-remediate-apache-tomcat-ajp-file-inclusion-vulnerability-cve-2020-1938-using-qualys-vmdr/</loc>
		<lastmod>2020-03-06T01:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/stop-data-exfiltration-with-cloud-dlp/</loc>
		<lastmod>2020-03-06T02:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/celebrating-international-womens-day/</loc>
		<lastmod>2020-03-06T05:38:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-its-important-to-have-a-customer-community-in-the-world-of-cybersecurity/</loc>
		<lastmod>2020-03-06T05:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/video-how-ertico-is-making-mobility-smarter-safer-and-cleaner-in-europe/</loc>
		<lastmod>2020-03-06T07:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/generation-equality-and-the-digital-divide/</loc>
		<lastmod>2020-03-06T09:42:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/behind-the-crime-new-phishing-attack-launched-every-two-minutes/</loc>
		<lastmod>2020-03-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/expired-certificates-used-as-disguise-to-spread-buerak-mokes-malware/</loc>
		<lastmod>2020-03-06T12:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/virgin-media-admits-failing-to-secure-online-database-with-info-on-900000-customers/</loc>
		<lastmod>2020-03-06T13:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/more-on-crypto-ag/</loc>
		<lastmod>2020-03-06T13:48:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/over-one-billion-android-devices-at-risk-as-they-no-longer-receive-security-updates/</loc>
		<lastmod>2020-03-06T14:15:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/data-breach-u-s-retailer-j-crew-reveals-2019-security-incident-to-customers/</loc>
		<lastmod>2020-03-06T14:31:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/national-day-of-unplugging-how-switching-off-can-boost-business-security/</loc>
		<lastmod>2020-03-06T14:51:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-threat-actors-are-abusing-coronavirus-uncertainty/</loc>
		<lastmod>2020-03-06T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rsa-attendees-seek-to-close-security-gaps/</loc>
		<lastmod>2020-03-06T15:48:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/take-my-daughter-to-work-days/</loc>
		<lastmod>2020-03-06T16:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/domain-spoofing-declines-as-protective-measures-grow-research-part-3/</loc>
		<lastmod>2020-03-06T16:30:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-travis-palmers-first-try-dns-cache-poisoning-with-ipv4-and-ipv6/</loc>
		<lastmod>2020-03-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-do-developers-build-a-security-program-start-with-these-3-questions/</loc>
		<lastmod>2020-03-06T17:20:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/exposure-managing-third-party-risk-in-a-digital-world/</loc>
		<lastmod>2020-03-06T16:23:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-is-targeted-ransomware-so-dangerous/</loc>
		<lastmod>2020-03-06T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-joy-of-tech-coffee-shop-culture/</loc>
		<lastmod>2020-03-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/webinars-open-source-in-ma-due-diligence-cloud-application-security/</loc>
		<lastmod>2020-03-06T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cathay-pacific-fined-500000-for-data-breach-avast/</loc>
		<lastmod>2020-03-06T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-tom-kopchaks-lessons-learned-running-a-pentesting-competition/</loc>
		<lastmod>2020-03-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-client-grade-technology-doesnt-cut-it-for-cloud-workload-protection/</loc>
		<lastmod>2020-03-06T19:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/</loc>
		<lastmod>2020-03-06T20:08:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/huawei-backdoors-explanation-explained/</loc>
		<lastmod>2020-03-06T20:57:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/shared-intel-heres-why-ceos-whove-quit-tweeting-are-very-smart-to-do-so/</loc>
		<lastmod>2020-03-06T21:41:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/pci-compliance-penetration-testing-and-the-sucuri-waf/</loc>
		<lastmod>2020-03-07T01:58:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/each-for-equal-2020-international-womens-day-theme-resonates-in-devsecops-because-it-is-a-business-issue/</loc>
		<lastmod>2020-03-07T02:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-cloud-security-challenges-facing-enterprises-today/</loc>
		<lastmod>2020-03-07T03:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/evading-antivirus-with-better-meterpreter-payloads/</loc>
		<lastmod>2020-03-07T03:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/threat-research-report-the-state-of-cryptomining/</loc>
		<lastmod>2020-03-07T03:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/women-unite-over-ctf-inspiring-women-to-infosec/</loc>
		<lastmod>2020-03-07T03:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/big-data-visualization-errors-and-revelations-in-popular-covid-19-virus-maps/</loc>
		<lastmod>2020-03-07T03:33:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/opaque-donor-source-funds-berkeley-data-transparency-project/</loc>
		<lastmod>2020-03-07T03:33:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/visualizing-coronavirus-spread-many-tools-results-vary-widely/</loc>
		<lastmod>2020-03-07T03:33:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/quiet-professionalism-of-defense-can-mean-cyber-offense-gets-all-the-airtime/</loc>
		<lastmod>2020-03-07T03:33:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/british-had-a-laugh-at-rommels-1942-crude-propaganda-attempts/</loc>
		<lastmod>2020-03-07T03:33:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/inarticulate-grief/</loc>
		<lastmod>2020-03-07T03:33:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/that-a16z-defensive-moat-around-your-jail-cell-doesnt-make-it-any-less-of-a-jail-cell/</loc>
		<lastmod>2020-03-07T03:33:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/brake-indicators-are-public-therefore-braking-data-isnt-protected/</loc>
		<lastmod>2020-03-07T03:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/drone-countermeasures-against-laser-weapons/</loc>
		<lastmod>2020-03-07T03:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/interactive-map-of-u-s-supply-chain-vulnerabilities/</loc>
		<lastmod>2020-03-07T03:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/blade-runner-2020-are-we-there-yet/</loc>
		<lastmod>2020-03-07T03:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/add-threat-and-business-data-to-vulnerabilities-using-the-latest-open-source-risk-tools/</loc>
		<lastmod>2020-03-07T03:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/jfk-assassinated-weeks-after-shifting-to-cuba-accommodation/</loc>
		<lastmod>2020-03-07T03:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/im-speaking-at-rsa-conference-2020-breaking-bad-ai/</loc>
		<lastmod>2020-03-07T03:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/survey-shows-most-organizations-plan-to-embrace-zero-trust-yet-remain-unconfident-in-ability-to-implement/</loc>
		<lastmod>2020-03-07T03:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/quantum-matter-anyone/</loc>
		<lastmod>2020-03-07T03:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-communicate-risk-profiles-dashboards-and-responsibilities/</loc>
		<lastmod>2020-03-07T04:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-mitre-attck-framework-impact/</loc>
		<lastmod>2020-03-07T04:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/identifying-lets-encrypt-revoked-certificates/</loc>
		<lastmod>2020-03-07T04:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/video-blackberry-labs-is-forging-the-path-to-a-safe-and-secure-future/</loc>
		<lastmod>2020-03-07T06:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ssl-testing-methods/</loc>
		<lastmod>2020-03-07T07:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cybersecurity-trends-to-watch-in-2020-2/</loc>
		<lastmod>2020-03-07T07:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tcg-addresses-the-rapid-pace-of-iot-security-with-new-guidelines-for-software-updates-on-embedded-systems/</loc>
		<lastmod>2020-03-07T08:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tcg-addresses-the-rapid-pace-of-iot-security-with-new-guidelines-for-software-updates-on-embedded-systems-3/</loc>
		<lastmod>2020-03-07T08:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/u-s-govt-makes-it-harder-to-get-gov-domains/</loc>
		<lastmod>2020-03-07T15:01:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-sam-erbs-hunting-certificates-and-servers/</loc>
		<lastmod>2020-03-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/xkcd-business-greetings/</loc>
		<lastmod>2020-03-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-russell-butturinis-phishing-freakonomics/</loc>
		<lastmod>2020-03-07T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-mike-raggos-stegoaugmented-malware/</loc>
		<lastmod>2020-03-08T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/celebrating-iwd2020/</loc>
		<lastmod>2020-03-08T15:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/robert-m-lees-jeff-haas-little-bobby-comics-week-267/</loc>
		<lastmod>2020-03-08T17:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-matt-nashs-head-in-the-clouds/</loc>
		<lastmod>2020-03-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-actions-plans-and-risks-to-consider/</loc>
		<lastmod>2020-03-09T01:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/international-womens-day-connecting-the-dots-during-career-change/</loc>
		<lastmod>2020-03-09T02:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/iot-device-attacks-fcc-fines-mobile-carriers-lets-encrypt-certificate-bug/</loc>
		<lastmod>2020-03-09T04:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/to-be-or-not-to-be-bcsi-in-the-cloud/</loc>
		<lastmod>2020-03-09T04:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-variant-of-trickbot-being-spread-by-word-document/</loc>
		<lastmod>2020-03-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/addressing-the-four-most-critical-cybersecurity-challenges-of-our-generation/</loc>
		<lastmod>2020-03-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/one-big-month-for-awards-that-was-years-in-the-making/</loc>
		<lastmod>2020-03-09T07:02:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/america-admits-to-cooking-its-numbers-on-coronavirus/</loc>
		<lastmod>2020-03-09T07:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cybersecurity-risk-management-beyond-the-golden-period/</loc>
		<lastmod>2020-03-09T10:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/healthcare-providers-lose-an-average-2-75-million-per-data-breach/</loc>
		<lastmod>2020-03-09T10:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/3-tips-for-enterprise-patch-management/</loc>
		<lastmod>2020-03-09T10:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-tech-exabeam-positions-siem-technology-to-help-protect-iot-ot-systems/</loc>
		<lastmod>2020-03-09T11:39:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/making-your-customer-the-hero/</loc>
		<lastmod>2020-03-09T12:51:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/facebook-sued-by-oaic-for-allegedly-violating-over-300k-aussies-privacy/</loc>
		<lastmod>2020-03-09T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rsa-2020-the-human-element/</loc>
		<lastmod>2020-03-09T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-is-exposed-password-screening/</loc>
		<lastmod>2020-03-09T14:57:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/nexus-intelligence-insights-whats-in-a-ghostcat-cve-2020-1938-apache-tomcat-local-file-inclusion-potentially-leads-to-rce/</loc>
		<lastmod>2020-03-09T14:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/a-round-up-of-data-breaches-in-february-2020/</loc>
		<lastmod>2020-03-09T15:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/enabling-business-continuity-in-an-uncertain-global-environment/</loc>
		<lastmod>2020-03-09T16:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-jeff-mans-rethinking-security-given-the-spectre-of-a-meltdown/</loc>
		<lastmod>2020-03-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/network-traffic-analysis-for-ir-basic-protocols-in-networking/</loc>
		<lastmod>2020-03-09T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-top-5-states-for-cybersecurity-jobs/</loc>
		<lastmod>2020-03-09T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/road-to-detection-yara-l-examples%e2%80%8a-%e2%80%8apart-4-of-3/</loc>
		<lastmod>2020-03-09T16:32:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-case-for-csp-automation/</loc>
		<lastmod>2020-03-09T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-caution-forces-support-for-the-largest-number-of-remote-workers-in-history/</loc>
		<lastmod>2020-03-09T17:01:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-joseph-muniz-old-tech-vs-new-adversaries-round-1/</loc>
		<lastmod>2020-03-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-cyber-security-software-is-manufacturing/</loc>
		<lastmod>2020-03-09T18:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-overarching-challenge-to-the-american-way-of-life-predatory-john-deere-fighting-the-right-and-capability-to-repair/</loc>
		<lastmod>2020-03-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/keeping-systems-safe-from-third-parties-2/</loc>
		<lastmod>2020-03-09T19:26:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-debate-around-password-rotation-policies/</loc>
		<lastmod>2020-03-09T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/bluetooth-security-in-windows-10/</loc>
		<lastmod>2020-03-09T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/luke-kingmas-lou-patrick-mackays-futurism-cartoons-scrolling/</loc>
		<lastmod>2020-03-09T19:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/inspiring-the-next-ada-lovelace/</loc>
		<lastmod>2020-03-09T21:02:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/3-d-secure-sms-otp-phishing/</loc>
		<lastmod>2020-03-09T21:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-actions-plans-and-risks-to-consider-2/</loc>
		<lastmod>2020-03-09T23:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/appsec-instrumentation-addresses-appsec-skills-shortage/</loc>
		<lastmod>2020-03-09T23:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-avoid-control-deficiencies-that-can-negatively-impact-your-audit-results/</loc>
		<lastmod>2020-03-10T01:44:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/secure-o365-and-secure-g-suite-for-your-enterprise/</loc>
		<lastmod>2020-03-10T02:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/contrast-labs-jenkins-maven-hpi-plugin-exposes-developer-laptops/</loc>
		<lastmod>2020-03-10T03:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/no-really-whats-ai/</loc>
		<lastmod>2020-03-10T03:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/four-important-steps-to-secure-the-united-states-2020-election/</loc>
		<lastmod>2020-03-10T03:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/amazon-secretly-researching-how-to-eliminate-sick-workers/</loc>
		<lastmod>2020-03-10T06:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-video-why-is-network-data-the-best-source-for-actionable-data-in-cybersecurity/</loc>
		<lastmod>2020-03-10T07:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-should-large-organisations-achieve-and-maintain-pci-compliance/</loc>
		<lastmod>2020-03-10T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/introducing-akamai-edge-dns/</loc>
		<lastmod>2020-03-10T10:53:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rsa-2020-conference-recap-7-conference-observations-from-the-floor/</loc>
		<lastmod>2020-03-10T11:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rsa-2020-conference-recap-7-conference-observations-from-the-floor-2/</loc>
		<lastmod>2020-03-10T11:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/us-awards-highest-civilian-award-to-1980s-ambassador-of-apartheid/</loc>
		<lastmod>2020-03-10T11:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-tech-devolutions-pam-solution-helps-smbs-deal-with-rising-authentication-risks/</loc>
		<lastmod>2020-03-10T11:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/resilient-in-times-of-disruption/</loc>
		<lastmod>2020-03-10T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-myths-about-ddos-in-2020/</loc>
		<lastmod>2020-03-10T13:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/disruptops-raises-9m-series-a-to-scale-cloud-security-operations/</loc>
		<lastmod>2020-03-10T13:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/spammers-use-coronavirus-message-to-deploy-keylogger/</loc>
		<lastmod>2020-03-10T13:48:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/experts-honor-hysolate-with-top-awards-in-privileged-access-protection-and-cybersecurity-innovation/</loc>
		<lastmod>2020-03-10T13:53:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/fbi-arrests-alleged-owner-of-deer-io-a-top-broker-of-stolen-accounts/</loc>
		<lastmod>2020-03-10T14:17:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/passwords-remain-the-main-method-of-authentication-and-top-cause-of-data-breaches/</loc>
		<lastmod>2020-03-10T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cloud-series-accelerate-your-own-forgerock-cloud-deployment/</loc>
		<lastmod>2020-03-10T15:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/gold-standard-cybersecurity-for-the-gig-economy/</loc>
		<lastmod>2020-03-10T15:22:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/chatbot-used-by-phishing-scammers-to-help-victims-provide-their-data/</loc>
		<lastmod>2020-03-10T15:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-role-of-ot-iot-visibility-in-physical-and-cyber-environments/</loc>
		<lastmod>2020-03-10T15:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-jay-dimartinos-the-art-of-detection/</loc>
		<lastmod>2020-03-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-work-how-to-become-an-apt-hunter-with-carbon-black/</loc>
		<lastmod>2020-03-10T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/domain-vs-workgroup-accounts-in-windows-10/</loc>
		<lastmod>2020-03-10T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/phishing-techniques-clone-phishing/</loc>
		<lastmod>2020-03-10T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-is-the-best-way-to-protect-data/</loc>
		<lastmod>2020-03-10T16:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/xkcd-scientific-briefing/</loc>
		<lastmod>2020-03-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/a-day-in-the-life-of-the-data-driven-ciso/</loc>
		<lastmod>2020-03-10T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-does-iast-fit-into-devsecops/</loc>
		<lastmod>2020-03-10T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-rise-of-cyber-security-product-sprawl/</loc>
		<lastmod>2020-03-10T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/whats-next-in-cyber-threat-intelligence/</loc>
		<lastmod>2020-03-10T17:59:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-jay-beales-attacking-and-defending-kubernetes/</loc>
		<lastmod>2020-03-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-biggest-gap-in-cybersecurity-is-empathy/</loc>
		<lastmod>2020-03-10T18:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/eclypsium-named-to-fast-companys-annual-list-of-the-worlds-most-innovative-companies-for-2020/</loc>
		<lastmod>2020-03-10T18:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/mitre-attck-for-ics-practical-applications-part-4/</loc>
		<lastmod>2020-03-10T18:45:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/australian-information-commissioner-holds-facebooks-feet-to-the-barbie/</loc>
		<lastmod>2020-03-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/travel-restrictions-and-work-from-home-policies-do-not-have-to-put-your-organization-at-risk/</loc>
		<lastmod>2020-03-10T19:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-tips-for-remote-work/</loc>
		<lastmod>2020-03-10T19:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/reversing-and-exploiting-with-free-tools-part-4/</loc>
		<lastmod>2020-03-10T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/bitdefender-researchers-discover-new-side-channel-attack/</loc>
		<lastmod>2020-03-10T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/digital-transformation-and-cloud-migration-initiatives-shouldnt-leave-security-behind/</loc>
		<lastmod>2020-03-10T21:51:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/march-2020-patch-tuesday-115-vulns-26-critical-microsoft-word-and-workstation-patches/</loc>
		<lastmod>2020-03-10T21:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/vert-threat-alert-march-2020-patch-tuesday-analysis/</loc>
		<lastmod>2020-03-10T22:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/is-shift-left-the-gold-standard-for-application-security/</loc>
		<lastmod>2020-03-10T22:31:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-manual-verification-still-matters/</loc>
		<lastmod>2020-03-10T22:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-tips-to-defend-against-mobile-adware-avast/</loc>
		<lastmod>2020-03-10T23:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-you-need-to-rethink-your-security-governance/</loc>
		<lastmod>2020-03-10T23:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/microsoft-patch-tuesday-march-2020-edition/</loc>
		<lastmod>2020-03-10T23:44:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-power-of-the-public-cloud/</loc>
		<lastmod>2020-03-11T01:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-leverage-nist-cybersecurity-framework-for-data-integrity/</loc>
		<lastmod>2020-03-11T03:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/we-want-you-win-the-war-on-ransomware-today/</loc>
		<lastmod>2020-03-11T03:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/to-beat-ransomware-consider-the-human-side-of-cybersecurity/</loc>
		<lastmod>2020-03-11T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-prevent-the-data-breach-that-keeps-on-happening-2/</loc>
		<lastmod>2020-03-11T08:08:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-prevent-the-data-breach-that-keeps-on-happening/</loc>
		<lastmod>2020-03-11T08:08:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/it-leaders-aim-to-outgun-hackers-with-bigger-cybersecurity-budgets-in-2020/</loc>
		<lastmod>2020-03-11T08:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-easily-repair-hacked-website-complete-guide/</loc>
		<lastmod>2020-03-11T11:14:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/my-take-why-speedy-innovation-requires-much-improved-cyber-hygiene-cloud-security/</loc>
		<lastmod>2020-03-11T12:41:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/advance-your-modernize-iam-program-with-forgerocks-new-accelerators/</loc>
		<lastmod>2020-03-11T14:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/secret-sharing-app-whisper-failed-to-keep-users-fetishes-and-locations-private/</loc>
		<lastmod>2020-03-11T14:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/risk-mitigation-requires-complete-visibility/</loc>
		<lastmod>2020-03-11T15:18:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/expected-technology-at-the-2020-olympics-in-tokyo/</loc>
		<lastmod>2020-03-11T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/leading-analyst-overheard-bitglass-smartedge-tech-is-sase-on-steroids/</loc>
		<lastmod>2020-03-11T15:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-gleb-esmans-solving-crimes-with-wireless-geofencing/</loc>
		<lastmod>2020-03-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/secure-transactions-a-pci-dss-pa-dss-overview-and-compliance-checklist/</loc>
		<lastmod>2020-03-11T16:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/apache-struts-research-at-scale-part-2-execution-environments/</loc>
		<lastmod>2020-03-11T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-joy-of-tech-your-smartphone-is-disgusting/</loc>
		<lastmod>2020-03-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/some-vpn-apps-secretly-gather-anonymized-user-data/</loc>
		<lastmod>2020-03-11T17:51:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/remote-employees-offer-different-security-challenges/</loc>
		<lastmod>2020-03-11T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/wordpress-database-brute-force-and-backdoors/</loc>
		<lastmod>2020-03-11T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-emilio-coutos-circo-cisco-implant-raspberry-controlled-ops/</loc>
		<lastmod>2020-03-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/virtualization-based-sandbox-malware/</loc>
		<lastmod>2020-03-11T18:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/mitre-attck-system-shutdown-reboot/</loc>
		<lastmod>2020-03-11T18:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/your-website-knows-where-your-users-are-but-is-it-keeping-that-data-secret/</loc>
		<lastmod>2020-03-11T18:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/full-life-cycle-cloud-security/</loc>
		<lastmod>2020-03-11T19:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/disruptops-raises-9m-series-a-to-scale-cloud-security-operations-2/</loc>
		<lastmod>2020-03-11T19:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/connectwise-strengthening-its-security-posture/</loc>
		<lastmod>2020-03-13T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/introducing-1-click-nist-password-standard-compliance-more/</loc>
		<lastmod>2020-03-11T19:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/spam-campaign-leverages-iqy-files-to-distribute-paradise-ransomware/</loc>
		<lastmod>2020-03-11T19:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/security-concerns-remain-with-containers-and-kubernetes-per-new-report/</loc>
		<lastmod>2020-03-11T19:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/five-ways-cyberattacks-put-manufacturing-systems-at-risk/</loc>
		<lastmod>2020-03-11T21:08:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/buy-smart-your-guide-for-buying-a-network-traffic-analysis-solution/</loc>
		<lastmod>2020-03-11T21:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-benefits-of-remote-work-beyond-avoiding-the-coronavirus-covid-19/</loc>
		<lastmod>2020-03-11T21:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/risk-mitigation-how-saas-backup-addresses-operational-risk/</loc>
		<lastmod>2020-03-11T21:39:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/forgerock-secure-sharing-ingredients-who-what-and-how/</loc>
		<lastmod>2020-03-11T22:29:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/idaptive-takes-home-infosec-award-cybersecurity-excellence-awards-for-2020/</loc>
		<lastmod>2020-03-11T22:55:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/iranian-coronavirus-app-collecting-sensitive-information-avast/</loc>
		<lastmod>2020-03-11T23:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-best-practices-for-safe-and-secure-remote-work/</loc>
		<lastmod>2020-03-12T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/crafty-web-skimming-domain-spoofs-https/</loc>
		<lastmod>2020-03-12T00:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/staying-accountable-a-sarbanes-oxley-sox-overview-and-compliance-checklist/</loc>
		<lastmod>2020-03-12T02:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/microsoft-windows-smbv3-remote-code-execution-vulnerability-cve-2020-0796/</loc>
		<lastmod>2020-03-12T05:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/mitre-releases-an-update-to-the-common-weakness-enumeration-cwe/</loc>
		<lastmod>2020-03-12T05:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-experts-guide-on-tackling-the-cybersecurity-skills-gap/</loc>
		<lastmod>2020-03-12T05:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/six-steps-for-securing-your-remote-workforce-at-scale/</loc>
		<lastmod>2020-03-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cve-2020-0796-memory-corruption-vulnerability-in-windows-10-smb-server/</loc>
		<lastmod>2020-03-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-jumpstart-your-nist-cybersecurity-framework-maturity-respond-function/</loc>
		<lastmod>2020-03-12T10:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/should-maintained-plugins-be-suspended-from-the-wordpress-repository-when-there-is-a-security-issue/</loc>
		<lastmod>2020-03-12T10:20:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cybercriminals-taking-advantage-of-the-coronavirus/</loc>
		<lastmod>2020-03-12T11:07:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/shared-intel-bogus-coronavirus-email-alerts-underscore-risk-posed-by-weaponized-email/</loc>
		<lastmod>2020-03-12T11:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/web-content-filter-myths-impacting-k-12-cybersecurity-safety/</loc>
		<lastmod>2020-03-12T11:26:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/working-from-the-home-front-securely/</loc>
		<lastmod>2020-03-12T11:34:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-big-data-missed-early-warning-signs-of-covid-19/</loc>
		<lastmod>2020-03-12T12:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/security-with-extended-berkeley-packet-filter-and-pam/</loc>
		<lastmod>2020-03-12T13:39:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/sony-vs-north-korea-when-nation-states-attack-private-firms/</loc>
		<lastmod>2020-03-12T13:39:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-its-four-most-prevalent-cyber-threats/</loc>
		<lastmod>2020-03-12T13:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/fbi-to-internet-users-dont-let-your-browser-remember-your-password/</loc>
		<lastmod>2020-03-12T14:12:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/security-hygiene-during-coronavirus-threat-avast/</loc>
		<lastmod>2020-03-12T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/appsec-analytics-and-reporting-tools-give-you-the-edge-of-insight/</loc>
		<lastmod>2020-03-12T14:31:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/microsoft-windows-smb-server-could-allow-for-remote-code-execution-cve-2020-0796-security-advisory/</loc>
		<lastmod>2020-03-12T14:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-not-to-pay-a-ransom-twice/</loc>
		<lastmod>2020-03-12T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/learn-new-languages-while-practicing-covid-19-safety/</loc>
		<lastmod>2020-03-12T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-utahs-top-health-insurance-company-uses-data-to-empower-healthier-living/</loc>
		<lastmod>2020-03-12T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/reverse-proxy-and-tls-termination/</loc>
		<lastmod>2020-03-12T15:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/live-coronavirus-map-used-to-spread-malware/</loc>
		<lastmod>2020-03-12T15:53:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-d9s-hacking-corporate-org-socialization/</loc>
		<lastmod>2020-03-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-safety-tips-for-working-remotely/</loc>
		<lastmod>2020-03-12T16:25:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-do-you-effectively-remediate-the-increasing-sea-of-vulnerabilities/</loc>
		<lastmod>2020-03-12T16:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/building-blocks-professionally-evil-fundamentals-series/</loc>
		<lastmod>2020-03-12T16:51:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/we-speak-your-language-new-ecosystems-available-in-nexus-lifecycle/</loc>
		<lastmod>2020-03-12T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/phishing-technique-message-from-the-boss/</loc>
		<lastmod>2020-03-12T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-work-podcast-email-attack-trend-predictions-for-2020/</loc>
		<lastmod>2020-03-12T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/partner-best-practices-for-remote-incident-response-and-assessment-service-delivery/</loc>
		<lastmod>2020-03-12T17:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/evasion-techniques-user-agent-blocking/</loc>
		<lastmod>2020-03-12T17:56:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/two-thirds-of-healthcare-organizations-have-suffered-a-security-incident/</loc>
		<lastmod>2020-03-12T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-cheryl-biswas-patching-it-is-complicated/</loc>
		<lastmod>2020-03-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/phishing-attacks-exploit-youtube-redirects-to-catch-the-unwary/</loc>
		<lastmod>2020-03-12T18:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/healthcare-communications-during-a-crisis/</loc>
		<lastmod>2020-03-12T18:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/integrating-mixmode-with-deepinstinct/</loc>
		<lastmod>2020-03-12T18:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-a-telephone-might-be-the-best-tool-to-stem-third-party-cyber-risk/</loc>
		<lastmod>2020-03-12T19:07:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/latest-firefox-version-unveils-and-fixes-an-airpod-vulnerability/</loc>
		<lastmod>2020-03-12T19:20:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-actionable-takeaways-from-ponemon-and-keyfactors-2020-pki-study/</loc>
		<lastmod>2020-03-12T19:21:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/odo-security-offers-free-remote-access-solution-for-employees-working-from-home-during-the-coronavirus-outbreak/</loc>
		<lastmod>2020-03-12T19:24:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/trivy-vulnerability-scanner-from-aqua-security-adopted-by-leading-cloud-native-platforms/</loc>
		<lastmod>2020-03-16T12:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/iowa-and-la-primary-voting-blunders-avast/</loc>
		<lastmod>2020-03-12T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/professor-rivest-on-election-security/</loc>
		<lastmod>2020-03-12T20:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/microsoft-smbv3-11-vulnerability-and-patch-cve-2020-0796-explained/</loc>
		<lastmod>2020-03-12T20:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/frequently-asked-questions-mgt516-managing-security-vulnerabilities-enterprise-and-cloud/</loc>
		<lastmod>2020-03-12T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/tips-to-secure-your-organization-in-a-work-from-home-environment/</loc>
		<lastmod>2020-03-12T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/throwback-threat-thursday-wordpress-4-7-wp-json-content-injection-vulnerability/</loc>
		<lastmod>2020-03-12T23:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-spies-in-our-cell-networks/</loc>
		<lastmod>2020-03-13T01:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/provide-secure-access-for-everyone/</loc>
		<lastmod>2020-03-13T01:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/dont-be-misled-by-cvss-scores/</loc>
		<lastmod>2020-03-13T03:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-earn-it-act/</loc>
		<lastmod>2020-03-13T11:20:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/our-full-report-on-the-voatz-mobile-voting-platform/</loc>
		<lastmod>2020-03-13T11:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/is-it-legit-to-use-fear-as-part-of-my-pretext/</loc>
		<lastmod>2020-03-13T11:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/get-rsa-securid-access-for-free-to-help-in-this-time-of-uncertainty/</loc>
		<lastmod>2020-03-13T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/api-access-lets-security-engineers-get-creative/</loc>
		<lastmod>2020-03-13T13:30:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/managing-nexus-api-using-jenkins-x/</loc>
		<lastmod>2020-03-13T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/a-passwordless-future/</loc>
		<lastmod>2020-03-13T14:08:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/corona-and-how-we-work-from-home/</loc>
		<lastmod>2020-03-13T15:11:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-adams-sneakernet72-security-to-make-the-cfo-happy/</loc>
		<lastmod>2020-03-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/phishing-attacks-exploit-coronavirus-anxiety/</loc>
		<lastmod>2020-03-13T16:54:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/xkcd-symptoms/</loc>
		<lastmod>2020-03-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-besim-altinoks-wi-fi-threat-modeling-and-monitoring/</loc>
		<lastmod>2020-03-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/business-continuity-during-coronavirus-covid-19-outbreak/</loc>
		<lastmod>2020-03-13T18:28:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/discussing-appsec-policies-within-devsecops/</loc>
		<lastmod>2020-03-13T18:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-scams-phishing-websites-emails-target-unsuspecting-users/</loc>
		<lastmod>2020-03-13T18:56:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/unlock-the-future-of-smart-cities/</loc>
		<lastmod>2020-03-13T19:15:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/illinois-public-health-depts-website-went-down-after-netwalker-attack/</loc>
		<lastmod>2020-03-13T19:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/improving-customer-experience-in-the-hospitality-industry/</loc>
		<lastmod>2020-03-13T20:03:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/alert-logic-covid-19-preparedness-and-response/</loc>
		<lastmod>2020-03-13T20:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-hoard-hand-sanitizer-if-soap-works-better/</loc>
		<lastmod>2020-03-13T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/2008-u-s-report-of-the-commission-on-the-prevention-of-wmd-proliferation-and-terrorism/</loc>
		<lastmod>2020-03-13T20:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/boost-manufacturing-security-with-a-vendor-access-management-strategy/</loc>
		<lastmod>2020-03-13T21:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-details-emerge-on-the-ransomware-attack-against-epiq-global/</loc>
		<lastmod>2020-03-13T22:25:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/clearview-ai-cases-impact-on-consumers-avast/</loc>
		<lastmod>2020-03-13T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/smbghost-details-leaked-in-microsoft-snafu-avast/</loc>
		<lastmod>2020-03-13T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-four-signs-of-an-effective-compliance-program-quality-consistency-oversight-and-efficiency/</loc>
		<lastmod>2020-03-14T00:37:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/an-update-from-the-sans-institute/</loc>
		<lastmod>2020-03-14T01:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-is-your-gcp-infra-worth-about-700-bugbounty/</loc>
		<lastmod>2020-03-14T02:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/webinars-sast-and-sca-together-managed-pen-testing-for-risk-management/</loc>
		<lastmod>2020-03-14T06:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-packet-hacking-village-cesare-pizzis-sandbox-creative-usage-for-fun-and-problems/</loc>
		<lastmod>2020-03-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-joy-of-tech-remote-control/</loc>
		<lastmod>2020-03-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-vik-sharmas-creating-cake-from-scratch/</loc>
		<lastmod>2020-03-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cia-dirty-laundry-aired/</loc>
		<lastmod>2020-03-15T01:10:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/microsoft-sets-proper-example-with-necurs-botnet-takedown/</loc>
		<lastmod>2020-03-15T07:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/avast-response-to-covid-19-outbreak-avast/</loc>
		<lastmod>2020-03-15T08:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/please-inform-your-readers-best-and-worst-visualizations-of-covid-19/</loc>
		<lastmod>2020-03-15T09:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-oatmeals-matthew-inman-touch-your-face-less/</loc>
		<lastmod>2020-03-15T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-sarang-noether-phd-if-you-like-it-put-a-ring-signature-on-it/</loc>
		<lastmod>2020-03-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/robert-m-lees-jeff-haas-little-bobby-comics-week-268/</loc>
		<lastmod>2020-03-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-dr-robin-renwicks-perspective-of-privacy-blockchain-as-a-boundary-object/</loc>
		<lastmod>2020-03-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/it-fire-drill-remote-access-expansion-under-covid-19/</loc>
		<lastmod>2020-03-16T01:20:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/covid-19-cybersecurity-impact-hacking-the-hackers-whisper-app-data-leak/</loc>
		<lastmod>2020-03-16T04:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/as-a-fortigate-customer-your-teleworker-strategy-is-already-in-place/</loc>
		<lastmod>2020-03-16T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/working-from-home-during-covid-19-what-you-and-your-organization-need-to-consider/</loc>
		<lastmod>2020-03-16T08:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/supporting-business-continuity-during-the-covid-19-pandemic/</loc>
		<lastmod>2020-03-16T09:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/real-time-file-monitoring-on-windows-with-osquery/</loc>
		<lastmod>2020-03-16T11:12:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-tech-byos-pushes-micro-segmentation-approach-to-cybersecurity-down-to-device-level/</loc>
		<lastmod>2020-03-16T11:51:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/conquering-cyberthreats-as-the-cloud-booms/</loc>
		<lastmod>2020-03-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/82-percent-of-organizations-still-use-spreadsheets-to-manage-third-parties/</loc>
		<lastmod>2020-03-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-fix-warning-your-connection-is-not-private-warning/</loc>
		<lastmod>2020-03-16T12:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/it-admins-allegedly-offer-hackers-naked-photos-of-bosss-secretary-in-exchange-for-ransomware-decryption-keys/</loc>
		<lastmod>2020-03-16T12:20:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cloudflare-worker-employed-as-cc-server-by-blackwater-malware/</loc>
		<lastmod>2020-03-16T12:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-webs-bot-containment-unit-needs-your-help/</loc>
		<lastmod>2020-03-16T12:55:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/bitglass-security-spotlight-cyber-attack-results-in-defense-contractor-paying-500000-ransom/</loc>
		<lastmod>2020-03-16T12:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/act-now-on-critical-microsoft-smb-vulnerability-cve-2020-0796/</loc>
		<lastmod>2020-03-16T13:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/forallsecures-response-to-covid-19-3/</loc>
		<lastmod>2020-03-16T14:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/uk-intelligence-agency-warns-of-cybercriminals-exploiting-the-coronavirus-outbreak/</loc>
		<lastmod>2020-03-16T14:05:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/seczetta-and-focal-point-announce-new-partnership-to-strengthen-third-party-identity-and-lifecycle-management/</loc>
		<lastmod>2020-03-16T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/tsa-admits-liquid-ban-is-security-theater/</loc>
		<lastmod>2020-03-16T14:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/use-of-ai-for-cyber-security-in-the-intelligence-community/</loc>
		<lastmod>2020-03-16T14:47:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-accelerates-need-to-secure-remote-workers/</loc>
		<lastmod>2020-03-16T15:54:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-reuben-yaps-handling-broken-cryptography-and-building-a-new-one/</loc>
		<lastmod>2020-03-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-is-security-debt-and-how-do-i-get-out-of-it/</loc>
		<lastmod>2020-03-16T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/xkcd-2010-and-2020/</loc>
		<lastmod>2020-03-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/south-korean-data-protection-laws/</loc>
		<lastmod>2020-03-16T17:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-kristy-leigh-minehans-the-future-of-accessible-mining/</loc>
		<lastmod>2020-03-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-allan-stevos-infosec-vs-hacker-the-war-for-the-soul-of-a-technology/</loc>
		<lastmod>2020-03-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/this-is-big-please-help-secure-orgs-around-the-world-literally-due-to-covid-19/</loc>
		<lastmod>2020-03-16T18:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/microsoft-acquires-npm-a-healthy-move-for-critical-public-infrastructure/</loc>
		<lastmod>2020-03-16T18:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/community-updates-nancy-has-a-new-ship-and-found-oysters/</loc>
		<lastmod>2020-03-16T18:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-is-servicenow-irm/</loc>
		<lastmod>2020-03-16T19:36:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/redefining-bot-detection-why-identity-matters/</loc>
		<lastmod>2020-03-16T19:40:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/are-your-iam-systems-up-to-the-challenge-of-covid-19/</loc>
		<lastmod>2020-03-16T19:49:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/mysterious-cyberattack-cripples-czech-hospital-amid-covid-19-outbreak/</loc>
		<lastmod>2020-03-16T20:05:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/triangulation-fraud-coming-to-an-ecommerce-site-near-you/</loc>
		<lastmod>2020-03-16T20:36:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/social-distancing-cybersecurity-desk-audits-to-stem-the-spread-of-covid-19/</loc>
		<lastmod>2020-03-16T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/this-is-why-our-latest-funding-round-will-make-devops-more-secure/</loc>
		<lastmod>2020-03-16T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/so-youre-having-to-work-from-home-due-to-the-coronavirus-pandemic-now-what-here-are-18-tips-to-help-you-make-the-best-of-working-remote/</loc>
		<lastmod>2020-03-16T20:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-are-the-5-levels-of-cmmc/</loc>
		<lastmod>2020-03-16T21:01:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/mitre-attck-for-ics-practical-applications-part-5/</loc>
		<lastmod>2020-03-16T21:04:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/vice-iran-launched-a-mobile-app-that-claimed-to-diagnose-coronavirus/</loc>
		<lastmod>2020-03-16T21:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/when-developing-from-home-is-your-new-status-quo-due-to-covid-19/</loc>
		<lastmod>2020-03-16T21:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/imperva-wants-to-hear-from-you/</loc>
		<lastmod>2020-03-16T22:32:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/loops/</loc>
		<lastmod>2020-03-16T22:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ways-to-protect-your-mobile-applications-against-hacking/</loc>
		<lastmod>2020-03-16T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/hack-the-box-htb-machines-walkthrough-series-sneaky/</loc>
		<lastmod>2020-03-16T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/forallsecures-response-to-covid-19/</loc>
		<lastmod>2020-03-16T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/avast-support-for-our-msp-partners-during-covid-19-outbreak-avast/</loc>
		<lastmod>2020-03-16T23:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/covid-19-and-remote-work-crisis-opportunity/</loc>
		<lastmod>2020-03-16T23:48:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/automatically-discover-prioritize-and-remediate-microsoft-smbv3-rce-vulnerability-cve-2020-0796-using-qualys-vmdr/</loc>
		<lastmod>2020-03-16T23:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-ransomware/</loc>
		<lastmod>2020-03-17T00:12:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/feature-spotlight-using-the-siemplify-integrated-development-environment/</loc>
		<lastmod>2020-03-17T00:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/2014-ted-bill-gates-the-next-outbreak-were-not-ready/</loc>
		<lastmod>2020-03-17T02:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/2020-website-security-glossary/</loc>
		<lastmod>2020-03-17T02:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/healthcare-cybersecurity-part-ii-pernicious-threats-and-their-ripple-effects/</loc>
		<lastmod>2020-03-17T03:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-protocol-thats-putting-enterprise-iot-at-extreme-risk-2/</loc>
		<lastmod>2020-03-17T03:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/hackers-use-coronavirus-panic-to-push-phishing-email-scams/</loc>
		<lastmod>2020-03-17T06:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/future-of-cybersecurity-threats-looking-ahead-so-we-can-prepare-now/</loc>
		<lastmod>2020-03-17T08:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/discovered-artifacts-in-decrypted-https/</loc>
		<lastmod>2020-03-17T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-security-risks-for-companies-when-adopting-work-from-home/</loc>
		<lastmod>2020-03-17T09:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/as-coronavirus-spreads-attackers-wont-let-up-on-healthcare-systems/</loc>
		<lastmod>2020-03-17T09:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-coronavirus-impacts-on-cybersecurity/</loc>
		<lastmod>2020-03-17T10:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-medical-supply-scams-prey-on-fear/</loc>
		<lastmod>2020-03-17T10:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-is-multi-factor-authentication-and-what-does-it-have-to-do-with-you/</loc>
		<lastmod>2020-03-17T10:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-state-of-the-cybersecurity-market-where-weve-come-where-were-going/</loc>
		<lastmod>2020-03-17T10:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/nine-network-security-topics-grabbing-headlines-in-q1-2020/</loc>
		<lastmod>2020-03-17T11:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/nine-network-security-topics-grabbing-headlines-in-q1-2020-2/</loc>
		<lastmod>2020-03-17T11:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-phishing-scams-exploit-misinformation/</loc>
		<lastmod>2020-03-17T11:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/renaissance-of-the-otp-hardware-token/</loc>
		<lastmod>2020-03-17T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rolling-out-the-red-carpet/</loc>
		<lastmod>2020-03-17T12:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-and-cybersecurity-crime/</loc>
		<lastmod>2020-03-17T12:51:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/securely-work-from-home-during-covid-19/</loc>
		<lastmod>2020-03-17T12:55:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/infosec-pros-agree-human-skills-matter-most-in-a-cybersecurity-stack/</loc>
		<lastmod>2020-03-17T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/phishing-email-aims-to-trick-hospital-staff-with-coronavirus-seminar/</loc>
		<lastmod>2020-03-17T13:03:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/defending-active-directory-security-vulnerabilities/</loc>
		<lastmod>2020-03-17T13:11:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/election-2020-cybersecurity-and-preveil/</loc>
		<lastmod>2020-03-17T13:17:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-pros-and-cons-of-password-rotation-policies/</loc>
		<lastmod>2020-03-17T13:19:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/covid-19-the-rise-of-the-telecommuter-the-impacts-on-businesses/</loc>
		<lastmod>2020-03-17T13:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/policypak-file-associations-manager-manage-windows-10-file-association/</loc>
		<lastmod>2020-03-17T13:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/web-server-protection-logs-and-web-server-security/</loc>
		<lastmod>2020-03-17T13:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/information-security-manager-certifications/</loc>
		<lastmod>2020-03-17T13:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/in-the-face-of-a-pandemic-cyberattackers-seek-to-take-advantage/</loc>
		<lastmod>2020-03-17T14:12:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/spanning-release-notes-office-365-backup-with-integrated-dark-web-monitoring/</loc>
		<lastmod>2020-03-17T14:51:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/introducing-the-all-in-one-guide-to-maturing-your-mssp/</loc>
		<lastmod>2020-03-17T14:57:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-tech-can-mpc-multi-party-computation-disrupt-encryption-boost-cloud-commerce/</loc>
		<lastmod>2020-03-17T15:04:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/when-soc-teams-are-impacted-by-the-coronavirus/</loc>
		<lastmod>2020-03-17T15:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/sonatypes-commitment-to-customers-and-employees-during-covid-19/</loc>
		<lastmod>2020-03-17T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-justin-ehrenhofers-improving-monero-release-schedule/</loc>
		<lastmod>2020-03-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-role-of-static-analysis-in-the-eu-medical-devices-regulation-mdr/</loc>
		<lastmod>2020-03-17T16:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-intersection-of-compliance-and-third-parties-how-to-stay-compliant/</loc>
		<lastmod>2020-03-17T16:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/a-message-from-our-ceo-working-together-in-unprecedented-times/</loc>
		<lastmod>2020-03-17T16:28:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/bitdefender-blocks-cve-2020-0796-eternaldarkness-bug-at-network-level/</loc>
		<lastmod>2020-03-17T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/daniel-storis-quarantine/</loc>
		<lastmod>2020-03-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/loginradius-announces-its-business-continuity-plan-to-fight-covid-19-outbreak/</loc>
		<lastmod>2020-03-17T17:15:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/is-there-a-relationship-between-organization-policies-and-data-breaches/</loc>
		<lastmod>2020-03-17T17:56:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-tips-to-increase-security-on-windows-10-avast/</loc>
		<lastmod>2020-03-17T17:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ciso-offers-advice-for-making-work-from-home-work-avast/</loc>
		<lastmod>2020-03-17T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-aj-santos-houston-we-have-a-problem-86r-hb-4371-is-a-no-go-video/</loc>
		<lastmod>2020-03-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/private-secure-messaging-during-a-crisis/</loc>
		<lastmod>2020-03-17T18:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/sast-and-sca-why-use-both/</loc>
		<lastmod>2020-03-17T19:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/organizations-especially-vulnerable-as-cyberattacks-exploit-coronavirus-outbreak/</loc>
		<lastmod>2020-03-17T19:32:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/immediate-free-website-protection-against-third-party-risks-during-the-covid-19-crisis/</loc>
		<lastmod>2020-03-17T19:58:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cleaning-up-splunks-csv-export/</loc>
		<lastmod>2020-03-17T20:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/trabajando-desde-casa-debido-al-covid-19-lo-que-tu-y-tu-organizacion-deben-considerar/</loc>
		<lastmod>2020-03-17T20:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/uncommon-sense-security-2020-03-17-164600/</loc>
		<lastmod>2020-03-17T20:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/is-it-time-to-reset-the-ciso-reporting-structure/</loc>
		<lastmod>2020-03-17T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/reminders-for-enabling-employees-to-work-from-home-to-combat-covid-19-2/</loc>
		<lastmod>2020-03-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/reminders-for-enabling-employees-to-work-from-home-to-combat-covid-19/</loc>
		<lastmod>2020-03-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cisco-armis-delivering-a-new-era-of-device-protection/</loc>
		<lastmod>2020-03-17T22:07:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-widens-the-money-mule-pool/</loc>
		<lastmod>2020-03-17T22:11:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/route-intelligence-enables-transformation-of-traditional-application-security-testing/</loc>
		<lastmod>2020-03-17T23:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/a-letter-to-our-customers-during-covid-19/</loc>
		<lastmod>2020-03-18T00:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-organizations-can-achieve-security-availability/</loc>
		<lastmod>2020-03-18T05:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cso-strategies-for-navigating-challenging-times/</loc>
		<lastmod>2020-03-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-trickbot-module-bruteforces-rdp-connections-targets-select-telecommunication-services-in-us-and-hong-kong/</loc>
		<lastmod>2020-03-18T08:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/europol-arrests-sim-swappers-in-spain-austria-and-romania/</loc>
		<lastmod>2020-03-18T08:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/secure-virtual-coffee-top-of-mind/</loc>
		<lastmod>2020-03-18T09:16:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/embracing-zero-trust-for-iot-and-ot-a-fundamental-mind-shift/</loc>
		<lastmod>2020-03-18T10:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-scammers-exploit-spring-break-in-the-time-of-covid-19/</loc>
		<lastmod>2020-03-18T10:43:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/shared-intel-firemon-survey-shows-security-lags-behind-fast-pace-of-hybrid-cloud-deployments/</loc>
		<lastmod>2020-03-18T11:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/financial-cryptography-2020-recap/</loc>
		<lastmod>2020-03-18T11:50:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ensuring-your-employees-are-safe-secure-and-productive-during-the-covid-19-crisis/</loc>
		<lastmod>2020-03-18T11:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rsa-innovates-cyber-skills-delivery-in-apj/</loc>
		<lastmod>2020-03-18T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/mitigating-the-potential-impact-of-covid-19-related-ot-security-risks/</loc>
		<lastmod>2020-03-18T12:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cybersecurity-professionals-exhibit-risky-behavior-rsa-conference-survey/</loc>
		<lastmod>2020-03-18T12:03:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyberark-provides-free-subscription-to-alero/</loc>
		<lastmod>2020-03-18T12:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/i-know-what-azure-did-last-summer/</loc>
		<lastmod>2020-03-18T13:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/free-ransomware-help-for-coronavirus-healthcare-providers/</loc>
		<lastmod>2020-03-18T13:10:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/governance-risk-management-and-compliance-grc-101/</loc>
		<lastmod>2020-03-18T13:12:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/dont-take-our-word-for-it-listen-to-our-customers/</loc>
		<lastmod>2020-03-18T13:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/one-veracoders-climb-over-the-glaring-gender-gap-in-tech/</loc>
		<lastmod>2020-03-18T14:05:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/semperis-covid-19-update-2/</loc>
		<lastmod>2020-03-18T14:54:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/semperis-covid-19-update/</loc>
		<lastmod>2020-03-18T14:54:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/forgerock-secure-sharing-the-framework/</loc>
		<lastmod>2020-03-18T15:16:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/parallax-the-new-rat-on-the-block/</loc>
		<lastmod>2020-03-18T15:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/apklab-io-flags-malicious-covid-19-apps-avast/</loc>
		<lastmod>2020-03-18T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-allan-stevo-airbnb-for-retail-internet-a-distributed-internet-tech/</loc>
		<lastmod>2020-03-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-security-considerations-for-protecting-remote-employee-devices-and-remote-access-environments/</loc>
		<lastmod>2020-03-18T16:02:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/open-source-software-use-grows-in-germany-but-compliance-and-risk-management-need-improvement/</loc>
		<lastmod>2020-03-18T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/4-strategies-for-balancing-cybersecurity-and-business-continuity-planning-during-the-coronavirus-outbreak/</loc>
		<lastmod>2020-03-18T16:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/malware-spotlight-ekans/</loc>
		<lastmod>2020-03-18T16:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/k-12-remote-learning-checklist-securing-data-in-a-remote-learning-environment/</loc>
		<lastmod>2020-03-18T16:38:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/webinar-deepfakes-a-technical-peek-behind-the-curtain/</loc>
		<lastmod>2020-03-18T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-new-generation-of-cybersecurity-solutions-from-features-to-outcomes/</loc>
		<lastmod>2020-03-18T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-joy-of-tech-your-brain-vs-your-face/</loc>
		<lastmod>2020-03-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/4-first-steps-to-help-your-organization-shift-appsec-left/</loc>
		<lastmod>2020-03-18T17:36:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/my-top-five-cyber-security-books/</loc>
		<lastmod>2020-03-18T17:55:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/preserving-business-continuity-during-the-coronavirus-pandemic/</loc>
		<lastmod>2020-03-18T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/nefilim-ransomware-threatens-to-release-victims-data-within-a-week/</loc>
		<lastmod>2020-03-18T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-amir-montazerys-the-cost-of-good-open-source-software/</loc>
		<lastmod>2020-03-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/nexus-intelligence-insights-cve-2019-3773-spring-web-services-xml-external-entity-injection-xxe/</loc>
		<lastmod>2020-03-18T18:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-evolution-of-appsec-past-present-and-future/</loc>
		<lastmod>2020-03-18T19:25:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/looking-at-cybersecurity-through-the-eyes-of-an-attacker/</loc>
		<lastmod>2020-03-18T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/efficient-disinfection/</loc>
		<lastmod>2020-03-18T22:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ami-announces-support-for-key-management-service-kms-protocol-in-aptio-v-uefi-firmware/</loc>
		<lastmod>2020-03-18T23:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/hyperproof-releases-crosswalks-to-eliminate-duplicative-work-in-meeting-multiple-compliance-frameworks/</loc>
		<lastmod>2020-03-18T23:40:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ics-environments-and-patch-management-what-to-do-if-you-cant-patch/</loc>
		<lastmod>2020-03-19T03:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/fighting-the-appsec-fight-dont-sell-products-create-partnerships/</loc>
		<lastmod>2020-03-19T06:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-attacks-world-economic-forum-says-its-a-top-concern-but-not-everyone-thinks-so/</loc>
		<lastmod>2020-03-19T06:37:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ciso-voices-ensuring-business-continuity-during-transition/</loc>
		<lastmod>2020-03-19T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/enabling-secure-remote-working-in-times-of-crisis-plan-ahead/</loc>
		<lastmod>2020-03-19T07:04:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/whitepaper-actionable-anomalies-how-mixmode-ai-makes-your-security-data-smarter/</loc>
		<lastmod>2020-03-19T08:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/miracle-cures-and-dodgy-advice-for-coronavirus/</loc>
		<lastmod>2020-03-19T08:42:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/more-business-websites-hit-by-credit-card-skimming-malware/</loc>
		<lastmod>2020-03-19T11:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/40-of-fortune-1000-companies-will-suffer-a-breach-every-year-new-research-suggests/</loc>
		<lastmod>2020-03-19T11:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/work-from-home-security-advice/</loc>
		<lastmod>2020-03-19T11:49:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-protect-your-vpn-lessons-from-a-ddos-attack-test/</loc>
		<lastmod>2020-03-19T12:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/system-hardening-guidelines-for-2020-critical-best-practices/</loc>
		<lastmod>2020-03-19T12:46:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/food-delivery-website-in-germany-targeted-by-ddos-attackers/</loc>
		<lastmod>2020-03-19T13:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/maze-ransomware-continues-to-hit-healthcare-units-amid-coronavirus-covid-19-outbreak/</loc>
		<lastmod>2020-03-19T14:27:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/sladjana-jovanovic-and-bill-mcarthur-move-silos-to-communities-video/</loc>
		<lastmod>2020-03-19T14:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/covid-phishing-update-coronavirus-wants-your-bonus-too/</loc>
		<lastmod>2020-03-19T14:32:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cloud-series-build-buy-or-as-a-service/</loc>
		<lastmod>2020-03-19T14:36:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cisos-enable-business-growth-with-this-strategy/</loc>
		<lastmod>2020-03-19T14:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-securelink-handles-coronavirus-tips-to-be-successful-while-working-from-home/</loc>
		<lastmod>2020-03-19T15:08:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/everyone-is-telecommuting-how-to-ensure-cybersecurity/</loc>
		<lastmod>2020-03-19T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-cathie-yuns-bulletproofs-deep-dive/</loc>
		<lastmod>2020-03-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/keeping-our-forescout-family-secure-during-covid-19/</loc>
		<lastmod>2020-03-19T16:20:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-tech-whitehat-security-tackles-dangling-buckets-other-new-web-app-exposures/</loc>
		<lastmod>2020-03-19T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/covid-19-coronavirus-threats-facing-a-remote-workforce-and-industry/</loc>
		<lastmod>2020-03-19T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-you-need-to-know-about-the-new-iast-and-rasp-guidelines-in-nist-800-53/</loc>
		<lastmod>2020-03-19T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/handling-hackers-during-the-coronavirus/</loc>
		<lastmod>2020-03-19T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/xkcd-coronavirus-research/</loc>
		<lastmod>2020-03-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/4-phishing-protection-gaps-that-segs-cannot-address/</loc>
		<lastmod>2020-03-19T17:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/forrester-names-bitdefender-the-biggest-edr-vendor-you-havent-considered-but-should-have-in-2020-wave-for-edr/</loc>
		<lastmod>2020-03-19T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/9-ways-to-stay-sane-during-work-from-home-avast/</loc>
		<lastmod>2020-03-19T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/hack-the-box-htb-machines-walkthrough-series-chatterbox/</loc>
		<lastmod>2020-03-19T17:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-work-podcast-election-security-issues-for-2020/</loc>
		<lastmod>2020-03-19T17:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/whatever-happened-to-cryptojacking/</loc>
		<lastmod>2020-03-19T17:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-daniel-kims-keynote-speech-monero-introduction-and-investor-perspective/</loc>
		<lastmod>2020-03-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/data-privacy-detective-podcast-episode-32-discovering-personal-data-how-the-unknown-becomes-known/</loc>
		<lastmod>2020-03-19T18:38:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/penetration-testing-for-wordpress-websites/</loc>
		<lastmod>2020-03-19T18:42:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/to-scan-or-not-to-scan-why-frequency-matters-for-devsecops/</loc>
		<lastmod>2020-03-19T18:47:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-oatmeals-how-to-be-socially-distant/</loc>
		<lastmod>2020-03-19T19:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/you-build-an-ics-out-of-a-delorean/</loc>
		<lastmod>2020-03-19T19:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/a-random-list-of-free-resources/</loc>
		<lastmod>2020-03-19T19:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/an-important-update-regarding-tinfoil-azure-marketplace-plans/</loc>
		<lastmod>2020-03-19T20:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/phishing-scams-are-now-capitalizing-on-coronavirus-2/</loc>
		<lastmod>2020-03-19T23:08:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-imperial-college-covid-19-response-teams-impact-of-non-pharmaceutical-interventions-npis-to-reduce-covid-19-mortality-and-healthcare-demand-report/</loc>
		<lastmod>2020-03-20T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/you-built-an-ics-out-of-a-delorean/</loc>
		<lastmod>2020-03-20T00:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/humans-and-technology-an-insecure-mix/</loc>
		<lastmod>2020-03-20T00:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/tips-for-new-remote-workers/</loc>
		<lastmod>2020-03-20T04:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-prevent-sql-injections-complete-guide/</loc>
		<lastmod>2020-03-20T06:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/leveraging-a-secure-sd-wan-solution-to-secure-digital-business/</loc>
		<lastmod>2020-03-20T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/selecting-secure-sd-wan-solutions-based-on-use-case-requirements-2/</loc>
		<lastmod>2020-03-20T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/selecting-secure-sd-wan-solutions-based-on-use-case-requirements/</loc>
		<lastmod>2020-03-20T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/one-hacking-group-promises-to-stop-attacking-medical-units-until-covid-19-cools-down/</loc>
		<lastmod>2020-03-20T07:52:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/hackers-actively-exploiting-enterprise-vpn-bugs-amid-covid-19-telework-trend-says-dhs/</loc>
		<lastmod>2020-03-20T09:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/emergency-surveillance-during-covid-19-crisis/</loc>
		<lastmod>2020-03-20T11:25:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-resiliency-begins-at-home/</loc>
		<lastmod>2020-03-20T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/instant-communication-platforms-are-prime-targets-for-cybercriminals-during-covid-19-pandemic/</loc>
		<lastmod>2020-03-20T12:56:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/once-upon-a-time-there-was-a-websocket/</loc>
		<lastmod>2020-03-20T14:29:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-protect-remote-employees-from-cyber-threats/</loc>
		<lastmod>2020-03-23T07:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto66084252.jpg</image:loc>
			<image:title><![CDATA[canstockphoto66084252]]></image:title>
			<image:caption><![CDATA[remote working]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/zxyel-flaw-powers-new-mirai-iot-botnet-strain/</loc>
		<lastmod>2020-03-20T14:46:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-hospitals-can-protect-themselves-from-ransomware-avast/</loc>
		<lastmod>2020-03-20T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-diego-rehrar-salazars-monero-is-ugly-and-difficult-to-use/</loc>
		<lastmod>2020-03-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/understanding-data-encryption-requirements-for-gdpr-ccpa-lgpd-hipaa/</loc>
		<lastmod>2020-03-20T16:26:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/managing-cybersecurity-with-the-coronavirus-response-and-sudden-spike-in-remote-workers/</loc>
		<lastmod>2020-03-20T16:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/preparing-for-disruption-with-good-it/</loc>
		<lastmod>2020-03-20T17:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/security-breach-disrupts-fintech-firm-finastra/</loc>
		<lastmod>2020-03-20T16:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-joy-of-tech-pandemic-priorities/</loc>
		<lastmod>2020-03-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-access-npm-packages-after-securing-nexus-repository-manager/</loc>
		<lastmod>2020-03-20T17:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/a-message-from-our-ceo-checkmarxs-acquisition-the-road-ahead/</loc>
		<lastmod>2020-03-20T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-threat-intelligence-lack-of-training-tools-oversight/</loc>
		<lastmod>2020-03-20T17:38:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-jeremy-gillula-phd-encrypting-the-web-isnt-enough/</loc>
		<lastmod>2020-03-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/dont-be-fooled-by-coronavirus-click-baits/</loc>
		<lastmod>2020-03-20T19:10:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/eu-document-warns-of-russian-covid-19-disinfo-campaign-avast/</loc>
		<lastmod>2020-03-20T20:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/signal-sciences-introduces-advanced-rate-limiting-for-fast-easy-protection-against-advanced-web-attacks/</loc>
		<lastmod>2020-03-20T20:42:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/everybody-work-from-home-idaptive-is-ready-to-help/</loc>
		<lastmod>2020-03-20T21:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/covid-19-affects-everyone-were-here-to-help/</loc>
		<lastmod>2020-03-20T22:13:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/kids-cybersecurity-activity-book-to-the-rescue/</loc>
		<lastmod>2020-03-20T23:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-times-more-coronavirus-themed-malware-reports-during-march/</loc>
		<lastmod>2020-03-21T07:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/bicycles-deemed-best-nyc-transit-during-pandemic/</loc>
		<lastmod>2020-03-21T10:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-human-hacking-conference-year-alpha/</loc>
		<lastmod>2020-03-21T12:51:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-francisco-cabanas-critical-role-of-min-block-reward-trail-emission/</loc>
		<lastmod>2020-03-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/xkcd-coronavirus-worries/</loc>
		<lastmod>2020-03-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-monero-village-gus-clarkes-tale-of-two-tongues-examining-two-mimblewimble-protocols/</loc>
		<lastmod>2020-03-21T18:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/training-together-the-sanstrainfromhomechallenge-is-here/</loc>
		<lastmod>2020-03-22T02:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/lockpickinglawyers-using-a-rotar-pick-to-open-a-mul-t-lock-interactive/</loc>
		<lastmod>2020-03-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-joy-of-tech-time-flies/</loc>
		<lastmod>2020-03-22T17:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/lockpickinglawyers-192-ifam-huno-80-shutter-lock-v-chinese-copy-pick-gut-compare/</loc>
		<lastmod>2020-03-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/commission-delivers-u-s-cybersecurity-roadmap/</loc>
		<lastmod>2020-03-22T18:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/robert-m-lees-jeff-haas-little-bobby-comics-week-269/</loc>
		<lastmod>2020-03-22T20:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/companies-use-covid-19-downtime-to-educate-their-workforce-online/</loc>
		<lastmod>2020-03-22T21:21:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/preveil-cybersecurity-and-the-covid-19-work-from-home-rush/</loc>
		<lastmod>2020-03-23T01:48:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/covid-19-mass-surveillance-new-coronavirus-cyber-attacks-encryption-backdoors/</loc>
		<lastmod>2020-03-23T04:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/simple-steps-to-protect-you-against-covid-19-social-engineering-attacks/</loc>
		<lastmod>2020-03-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/fortinet-security-researcher-discovers-multiple-critical-vulnerabilities-in-adobe-photoshop/</loc>
		<lastmod>2020-03-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/sextortion-scam-with-a-twist-lures-friends-into-opening-malicious-attachments/</loc>
		<lastmod>2020-03-23T08:25:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/covid-19-scam-roundup-week-of-3-16-20/</loc>
		<lastmod>2020-03-23T08:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-mitre-attck-framework-initial-access/</loc>
		<lastmod>2020-03-23T08:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-organizations-can-fight-to-retain-talent-amidst-the-infosec-skills-gap/</loc>
		<lastmod>2020-03-23T08:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/defending-against-doppelpaymer-the-latest-ransomware-incident/</loc>
		<lastmod>2020-03-23T09:47:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cybercriminals-motivations-during-catastrophic-times/</loc>
		<lastmod>2020-03-23T10:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-write-an-information-security-risk-assessment-methodology/</loc>
		<lastmod>2020-03-23T10:05:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/march-2020-akamai-edge-security-leader-in-five-forrester-wave-reports/</loc>
		<lastmod>2020-03-23T11:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/akamais-prolexic-platform-completes-fifth-generation-upgrade/</loc>
		<lastmod>2020-03-23T11:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/preveil-offers-service-for-free-to-help-critical-infrastructure-institutions/</loc>
		<lastmod>2020-03-23T10:41:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/announcing-the-zeek-agent/</loc>
		<lastmod>2020-03-23T11:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-tech-start-up-quolab-enters-emerging-security-operations-platform-sop-space/</loc>
		<lastmod>2020-03-23T11:13:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/as-cios-see-expanding-roles-in-customer-experience-security-must-keep-pace/</loc>
		<lastmod>2020-03-23T11:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/covid-19-the-new-telecom-reality-traffic-management-more-important-than-ever/</loc>
		<lastmod>2020-03-23T11:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/critical-infrastructure-cybersecurity-survey-finds-perfect-storm/</loc>
		<lastmod>2020-03-23T12:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cauce-spamfighters-rally-against-corona-health-fraud-affiliate-programs/</loc>
		<lastmod>2020-03-23T12:10:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/data-breach-at-online-guitar-lesson-platform-may-have-exposed-user-credit-card-information/</loc>
		<lastmod>2020-03-23T12:17:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/se-labs-vs-covid-19/</loc>
		<lastmod>2020-03-23T12:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/recommendations-for-hipaa-password-compliance/</loc>
		<lastmod>2020-03-23T14:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/working-from-home-now-heres-how-to-do-it-securely/</loc>
		<lastmod>2020-03-23T14:12:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/accelerator-program-for-early-stage-innovations-in-water-an-akamai-india-csr-flagship-initiative/</loc>
		<lastmod>2020-03-23T14:25:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/nerc-updates-may-force-utility-companies-into-better-cybersecurity/</loc>
		<lastmod>2020-03-23T14:52:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/hack-the-box-htb-machines-walkthrough-series-joker/</loc>
		<lastmod>2020-03-23T14:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ethical-hacking-top-privilege-escalation-techniques-in-windows/</loc>
		<lastmod>2020-03-23T14:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/current-cmmc-milestones-for-2020/</loc>
		<lastmod>2020-03-23T14:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/stay-safe-but-stay-in-business/</loc>
		<lastmod>2020-03-23T15:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/bryson-koehler-equifax-cto-discusses-the-road-ahead-in-data-security-infrastructure/</loc>
		<lastmod>2020-03-23T15:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/my-take-juniper-networks-directs-ml-pattern-recognition-towards-security-tasks-at-router-level/</loc>
		<lastmod>2020-03-23T15:45:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/five-simple-rules-for-implementing-vpn-for-the-remote-workforce/</loc>
		<lastmod>2020-03-23T15:46:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/shmoocon-2020-alissa-gilberts-anti-forensics-for-fun-and-privacy/</loc>
		<lastmod>2020-03-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/dark-reading-interview-with-divvycloud-ceo/</loc>
		<lastmod>2020-03-23T16:02:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/fake-email-from-who-installs-malware/</loc>
		<lastmod>2020-03-23T16:20:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/dont-fall-for-these-covid-19-scams-fbi-warns/</loc>
		<lastmod>2020-03-23T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/are-you-a-digital-leader-or-digital-laggard-heres-how-to-accelerate-your-digital-agenda-using-hybrid-cloud-appdev/</loc>
		<lastmod>2020-03-23T16:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/xkcd-exa-exabyte/</loc>
		<lastmod>2020-03-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/common-security-concerns-and-how-to-reduce-your-risk/</loc>
		<lastmod>2020-03-23T17:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/moving-away-from-ad-cs-certificate-based-authentication-with-azure-ad-jamf/</loc>
		<lastmod>2020-03-23T17:42:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/were-all-in-this-together-reflections-on-the-2020-rsa-conference/</loc>
		<lastmod>2020-03-23T17:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-deal-with-legacy-vulnerabilities/</loc>
		<lastmod>2020-03-23T17:58:47+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->