<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2020/02/self-service-certificate-automation-keyfactor-servicenow/</loc>
		<lastmod>2020-04-16T03:01:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-digital-certificate-management-is-business-critical/</loc>
		<lastmod>2020-04-16T03:01:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/scaling-pki-operations-top-4-issues-to-avoid/</loc>
		<lastmod>2020-04-16T03:01:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/pki-deployment-challenges-how-to-avoid-them/</loc>
		<lastmod>2020-04-16T03:01:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-devops-evolution-what-it-means-for-pki/</loc>
		<lastmod>2020-04-16T03:01:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/visibility-vulnerabilities-and-vpns-extending-your-corporate-security-policies-and-procedures-to-cover-remote-workers/</loc>
		<lastmod>2020-04-16T05:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-big-switch-a-lack-of-employable-security-professionals-causes-companies-to-make-the-switch-to-ai/</loc>
		<lastmod>2020-04-16T06:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/join-fortinet-online-for-the-digital-edition-of-accelerate-2020/</loc>
		<lastmod>2020-04-16T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/fortinet-secure-sd-wan-improves-application-performance-for-global-company/</loc>
		<lastmod>2020-04-16T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/navigating-the-new-normal-data-security-is-squarely-in-the-hands-of-the-c-suite/</loc>
		<lastmod>2020-04-16T07:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/u-s-government-offers-5-million-bounty-for-information-on-north-korean-cyber-criminals/</loc>
		<lastmod>2020-04-16T09:25:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/nemty-ransomware-gang-shuts-down-public-gig-announces-exclusive-business-model/</loc>
		<lastmod>2020-04-16T09:44:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/shifting-cybersecurity-mindsets-how-mssps-can-become-the-enablers-of-their-customers-digital-transformations/</loc>
		<lastmod>2020-04-16T09:59:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-manage-remote-learning-security-risks-caused-by-edtech/</loc>
		<lastmod>2020-04-16T11:23:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ragnar-locker-ransomware-demands-1580-btc-from-edp/</loc>
		<lastmod>2020-04-16T11:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-mitre-attck-framework-privilege-escalation/</loc>
		<lastmod>2020-04-16T11:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-integrate-security-into-the-devop-process/</loc>
		<lastmod>2020-04-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/49-crypto-wallet-pickpocketing-browser-extensions-booted-from-the-chrome-web-store/</loc>
		<lastmod>2020-04-16T12:19:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/radware-threat-researchers-live-coronavirus-fsb/</loc>
		<lastmod>2020-04-16T12:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/alexa-do-my-kids-have-to-arbitrate/</loc>
		<lastmod>2020-04-16T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/remote-access-security-risks-best-practices/</loc>
		<lastmod>2020-04-16T13:09:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/wappalyzer-reveals-data-breach-after-hacker-disclosed-incident-to-customers/</loc>
		<lastmod>2020-04-16T13:26:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/iso-enabled-free-access-to-iso-31000-iso-22301-and-other-business-continuity-standards/</loc>
		<lastmod>2020-04-16T13:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/investors-buy-up-the-wrong-zoom/</loc>
		<lastmod>2020-04-16T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/hack-the-box-htb-machines-walkthrough-series-forest/</loc>
		<lastmod>2020-04-16T15:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/phishing-techniques-expired-password-account/</loc>
		<lastmod>2020-04-16T15:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/enabling-secure-workforce-productivity-with-native-privileged-session-management/</loc>
		<lastmod>2020-04-16T15:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/canadian-authorities-email-private-details-of-247-ms-zaandam-cruise-passengers/</loc>
		<lastmod>2020-04-16T15:51:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/zoom-zero-day-windows-vulnerability-selling-for-500000/</loc>
		<lastmod>2020-04-16T15:56:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-vanessa-sauters-the-voight-kampff-test-for-discovering-vulnerabilities/</loc>
		<lastmod>2020-04-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/new-tech-semperis-introduces-tools-to-improve-security-resiliency-of-windows-active-directory/</loc>
		<lastmod>2020-04-16T16:21:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/sipping-from-the-coronavirus-domain-firehose/</loc>
		<lastmod>2020-04-16T16:23:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/email-security-is-it-any-good-against-hackers/</loc>
		<lastmod>2020-04-16T16:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/10-things-your-endpoint-security-software-must-allow-you-to-do/</loc>
		<lastmod>2020-04-16T16:32:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cybersecurity-issues-abound-during-the-covid-19-pandemic-2/</loc>
		<lastmod>2020-04-16T16:47:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cybersecurity-issues-abound-during-the-covid-19-pandemic/</loc>
		<lastmod>2020-04-16T16:47:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/xkcd-coronavirus-charts/</loc>
		<lastmod>2020-04-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/announcing-shiftleft-scan%e2%80%8a-%e2%80%8aan-integrated-scanner-for-modern-devops/</loc>
		<lastmod>2020-04-16T17:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/residential-internet-connections-are-now-business-connections-what-about-security-and-compliance/</loc>
		<lastmod>2020-04-16T17:37:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/corporate-account-takeover-attacks-detecting-and-preventing-it/</loc>
		<lastmod>2020-04-16T17:52:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/top-5-considerations-for-multicloud-security/</loc>
		<lastmod>2020-04-16T17:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-jayson-graces-mose-using-configuration-management-for-evil/</loc>
		<lastmod>2020-04-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/upcoming-webinar-why-taking-a-risk-based-approach-to-your-cybersecurity-is-required-in-todays-changing-landscape-may-13-2020/</loc>
		<lastmod>2020-04-16T18:16:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/new-cyber-threat-index-shows-industries-are-under-attack-in-uncertain-times/</loc>
		<lastmod>2020-04-16T18:23:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/secure-messaging-and-student-health-during-covid-19/</loc>
		<lastmod>2020-04-16T18:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/your-guide-to-appsec-tools-sast-or-sca/</loc>
		<lastmod>2020-04-16T18:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/tips-to-keep-your-ios-device-secure-avast/</loc>
		<lastmod>2020-04-16T18:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/malvertising-campaign-targeting-internet-explorer-users-avast/</loc>
		<lastmod>2020-04-16T18:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/misconfiguration-remains-the-1-cause-of-data-breaches-in-the-cloud/</loc>
		<lastmod>2020-04-16T18:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/semperis-introduces-tools-to-improve-security-resiliency-of-windows-active-directory/</loc>
		<lastmod>2020-04-16T19:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/semperis-introduces-tools-to-improve-security-resiliency-of-windows-active-directory-2/</loc>
		<lastmod>2020-04-16T19:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/supplier-hacked-next-steps-to-take/</loc>
		<lastmod>2020-04-16T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/a-zoom-zero-day-exploit-is-up-for-sale-for-500000/</loc>
		<lastmod>2020-04-16T19:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-fears-present-opportunities-for-new-phishing-campaigns/</loc>
		<lastmod>2020-04-16T20:08:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/application-security-but-i-have-a-waf/</loc>
		<lastmod>2020-04-16T21:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cloud-series-say-goodbye-to-passwords-and-usernames/</loc>
		<lastmod>2020-04-16T21:07:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/top-10-questions-to-ask-when-evaluating-a-certificate-management-tool/</loc>
		<lastmod>2020-04-16T21:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/press-release-anitian-completes-soc-2-type-2-certification-for-security-operations-services/</loc>
		<lastmod>2020-04-16T21:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/9-hilariously-bad-security-fails/</loc>
		<lastmod>2020-04-17T00:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/groupsense-shares-instances-of-covid-19-fraud/</loc>
		<lastmod>2020-04-17T04:08:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto47571119.jpg</image:loc>
			<image:title><![CDATA[canstockphoto47571119]]></image:title>
			<image:caption><![CDATA[COVID]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/COVIDfraud.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/COVIDfraud2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/security-considerations-for-a-blended-workforce/</loc>
		<lastmod>2020-04-17T04:08:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Staff-Turnover.jpg</image:loc>
			<image:caption><![CDATA[behavioral biometrics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/zix-unfurls-secure-cloud-service-for-productivty-apps/</loc>
		<lastmod>2020-04-17T04:08:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Branch-Office-Security.jpg</image:loc>
			<image:caption><![CDATA[Zix]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/president-signs-two-broadband-bills/</loc>
		<lastmod>2020-04-17T04:08:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Prudent-Security-Admin.jpg</image:loc>
			<image:title><![CDATA[Prudent-Security-Admin]]></image:title>
			<image:caption><![CDATA[broadband]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/zoom-zero-days-for-sale-critical-rce-at-500000/</loc>
		<lastmod>2020-04-17T04:08:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/dumpster-fire-brian-neumann-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[dumpster-fire--brian-neumann--cc-by-nd]]></image:title>
			<image:caption><![CDATA[Zoom]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/hackers-using-apts-to-exploit-covid-19-fears/</loc>
		<lastmod>2020-04-17T04:08:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Malicious-Insider-Threat.jpg</image:loc>
			<image:title><![CDATA[privacy]]></image:title>
			<image:caption><![CDATA[APTs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/machine-learnings-role-in-safe-livestreaming/</loc>
		<lastmod>2020-04-17T04:08:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/canstockphoto79621178.jpg</image:loc>
			<image:title><![CDATA[canstockphoto79621178]]></image:title>
			<image:caption><![CDATA[livestreaming]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/businesses-skating-on-thin-ice-using-third-party-services/</loc>
		<lastmod>2020-04-17T04:08:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/SOAR-Mood-Swings.jpg</image:loc>
			<image:title><![CDATA[SOAR-Mood-Swings]]></image:title>
			<image:caption><![CDATA[security employees]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/okta-strengthens-endpoint-security/</loc>
		<lastmod>2020-04-17T04:08:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Supply-Chain-Vulnerabilities.jpg</image:loc>
			<image:title><![CDATA[Supply-Chain-Vulnerabilities]]></image:title>
			<image:caption><![CDATA[Okta endpoint security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/devops-chat-specops-makes-password-auditor-free-to-help-wfh/</loc>
		<lastmod>2020-04-17T04:08:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/IAM-Solution-Organization.jpg</image:loc>
			<image:caption><![CDATA[passwords]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/twitter-your-privacy-is-for-sale-you-cant-opt-out/</loc>
		<lastmod>2020-04-17T04:08:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/canstockphoto14905993.jpg</image:loc>
			<image:title><![CDATA[canstockphoto14905993]]></image:title>
			<image:caption><![CDATA[Twitter privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/best-practices-for-securing-a-remote-workforce/</loc>
		<lastmod>2020-04-17T04:08:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cybersecurity-Skills-Gap.jpg</image:loc>
			<image:caption><![CDATA[remote workforce]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-cyber-secure-is-your-state/</loc>
		<lastmod>2020-04-17T04:08:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Attacks-Web-Mobile.jpg</image:loc>
			<image:caption><![CDATA[states cyber]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/hospitals-forced-to-fight-another-pandemic/</loc>
		<lastmod>2020-04-17T04:08:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto77252211.jpg</image:loc>
			<image:title><![CDATA[canstockphoto77252211]]></image:title>
			<image:caption><![CDATA[prepare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/broken-biometrics-fingerprint-readers-spoofed-80-of-the-time/</loc>
		<lastmod>2020-04-17T04:08:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/stop-hammertime-rich-anderson-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[stop-hammertime--rich-anderson--cc-by-sa]]></image:title>
			<image:caption><![CDATA[fingerprint]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/radware-report-malicious-bots-more-human-like/</loc>
		<lastmod>2020-04-17T04:08:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto8670695.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8670695]]></image:title>
			<image:caption><![CDATA[bots]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/security-in-todays-global-remote-workforce-era/</loc>
		<lastmod>2020-04-17T04:08:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/CISO-Security-Necessary.jpg</image:loc>
			<image:title><![CDATA[CISO-Security-Necessary]]></image:title>
			<image:caption><![CDATA[corporate security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/why-cybersecurity-should-be-your-companys-next-social-good-investment/</loc>
		<lastmod>2020-04-17T04:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Employee-Convenience.jpg</image:loc>
			<image:caption><![CDATA[cyber insurance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/untangle-extends-security-alliance-with-webroot/</loc>
		<lastmod>2020-04-17T04:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto36344373.jpg</image:loc>
			<image:title><![CDATA[canstockphoto36344373]]></image:title>
			<image:caption><![CDATA[Webroot]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/Untangle.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/doj-calls-for-mandatory-data-breach-reporting-to-law-enforcement/</loc>
		<lastmod>2020-04-17T04:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Breach-Disclosure-Laws.jpg</image:loc>
			<image:title><![CDATA[Breach-Disclosure-Laws]]></image:title>
			<image:caption><![CDATA[Disney contract]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/report-details-covid-19-phishing-attacks-based-on-emails-from-white-house/</loc>
		<lastmod>2020-04-17T04:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Phishing-Evolving-Threat.jpg</image:loc>
			<image:title><![CDATA[Phishing-Evolving-Threat]]></image:title>
			<image:caption><![CDATA[phishing email]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/white_house_phish_site-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/trump_impersonation-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/increase-in-small-ddos-attacks-could-take-down-vpns/</loc>
		<lastmod>2020-04-17T04:08:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/HIV-Registry-Exposed.jpg</image:loc>
			<image:title><![CDATA[HIV-Registry-Exposed]]></image:title>
			<image:caption><![CDATA[DDoS attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/should-a-wfh-soc-be-a-new-reality/</loc>
		<lastmod>2020-04-17T04:08:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Higher-Ed-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Higher-Ed-Cybersecurity]]></image:title>
			<image:caption><![CDATA[WFH SOC]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/russia-hijacks-traffic-of-huge-cloud-and-cdn-services/</loc>
		<lastmod>2020-04-17T04:08:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/putin-donkeyhotey-cc-by.jpg</image:loc>
			<image:title><![CDATA[putin--donkeyhotey--cc-by]]></image:title>
			<image:caption><![CDATA[Russia spies]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/new-ransomware-innovations-bring-shame/</loc>
		<lastmod>2020-04-17T04:08:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Fileless-Malware-RSAC.jpg</image:loc>
			<image:caption><![CDATA[Zerologon]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/5-security-mistakes-your-remote-team-is-making-right-now/</loc>
		<lastmod>2020-04-17T04:08:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Risk-Vulnerability-Management.jpg</image:loc>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/critical-chrome-cyber-bugs-update-now/</loc>
		<lastmod>2020-04-17T04:08:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/chrome-andrew-skudder-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[chrome--andrew-skudder--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Chrome]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/keeping-up-with-encryption-in-2020/</loc>
		<lastmod>2020-04-17T04:08:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto7243964.jpg</image:loc>
			<image:title><![CDATA[canstockphoto7243964]]></image:title>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-china-and-russia-disinformation-and-shenanigans/</loc>
		<lastmod>2020-04-17T04:08:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/canstockphoto26694156.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26694156]]></image:title>
			<image:caption><![CDATA[China]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/3-governance-risk-and-compliance-trends-to-watch/</loc>
		<lastmod>2020-04-17T04:08:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/CCPA-Data-Deletion.jpg</image:loc>
			<image:title><![CDATA[CCPA-Data-Deletion]]></image:title>
			<image:caption><![CDATA[compliance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/devops-chats-free-remote-endpoint-protection-from-qualys/</loc>
		<lastmod>2020-04-17T04:08:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/QualysDevOpsChat.jpg</image:loc>
			<image:title><![CDATA[QualysDevOpsChat]]></image:title>
			<image:caption><![CDATA[Qualys DevOps Chats]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/devops-chats-open-source-security-with-whitesource/</loc>
		<lastmod>2020-04-17T04:08:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/Opensourcesecuritydevopschat.jpg</image:loc>
			<image:title><![CDATA[Opensourcesecuritydevopschat]]></image:title>
			<image:caption><![CDATA[open source security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/guardicore-labs-vollgar-botnet-targets-sql-server-dbs/</loc>
		<lastmod>2020-04-17T04:08:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto33014599.jpg</image:loc>
			<image:title><![CDATA[canstockphoto33014599]]></image:title>
			<image:caption><![CDATA[Vollgar botnet]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/protecting-healthcare-data-and-infrastructure/</loc>
		<lastmod>2020-04-17T04:08:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Preventing-Security-Breaches.jpg</image:loc>
			<image:caption><![CDATA[healthcare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-response-following-best-telehealth-security-practices/</loc>
		<lastmod>2020-04-17T04:08:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/canstockphoto12990602.jpg</image:loc>
			<image:title><![CDATA[canstockphoto12990602]]></image:title>
			<image:caption><![CDATA[telehealth]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/collaboration-tools-essential-but-risky-amid-remote-work-directives/</loc>
		<lastmod>2020-04-17T04:08:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Privacy-Employees-Weakest.jpg</image:loc>
			<image:title><![CDATA[Privacy-Employees-Weakest]]></image:title>
			<image:caption><![CDATA[security remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/limiting-the-impact-of-the-cybercrime-pandemic/</loc>
		<lastmod>2020-04-17T04:08:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Security-Mistakes.jpg</image:loc>
			<image:title><![CDATA[danger]]></image:title>
			<image:caption><![CDATA[breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/bill-gates-youtube-bitcoin-giveaway-of-course-not/</loc>
		<lastmod>2020-04-17T04:09:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/bill-gates-claudio-toledo-cc-by.jpg</image:loc>
			<image:title><![CDATA[bill-gates--claudio-toledo--cc-by]]></image:title>
			<image:caption><![CDATA[Bitcoin]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/for-coronavirus-take-care-of-personal-and-cyber-hygiene/</loc>
		<lastmod>2020-04-17T04:09:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/AI-Federal-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[Qualys]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/protect-your-enterprise-from-bgp-route-hijacking/</loc>
		<lastmod>2020-04-17T04:09:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Virtualization-Flaw-Uptick.jpg</image:loc>
			<image:caption><![CDATA[BGP hijacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/devops-chats-route-intelligence-from-contrast-security/</loc>
		<lastmod>2020-04-17T04:09:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto47571119.jpg</image:loc>
			<image:title><![CDATA[canstockphoto47571119]]></image:title>
			<image:caption><![CDATA[COVID]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cybersecurity-cloud-transition-likely-to-accelerate/</loc>
		<lastmod>2020-04-17T04:09:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Software-Defined-Perimeter.jpg</image:loc>
			<image:caption><![CDATA[vendor access management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/report-highlights-microsoft-admin-privilege-risks/</loc>
		<lastmod>2020-04-17T04:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Malicious-Insider-Threat.jpg</image:loc>
			<image:title><![CDATA[privacy]]></image:title>
			<image:caption><![CDATA[APTs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/apple-turns-the-anti-ad-thumbscrews-with-safari-cookie-blocking/</loc>
		<lastmod>2020-04-17T04:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/cookie-louis-briscese-pd.jpg</image:loc>
			<image:title><![CDATA[cookie--louis-briscese--pd]]></image:title>
			<image:caption><![CDATA[Safari]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/covid-19-pandemic-drives-spike-in-phishing-attacks/</loc>
		<lastmod>2020-04-17T04:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Phishing-Exploits-Gullibility.jpg</image:loc>
			<image:caption><![CDATA[phishing attack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/maine-suit-challenges-privacy-regulation-on-first-amendment-grounds/</loc>
		<lastmod>2020-04-17T04:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Privileged-Account-Management.jpg</image:loc>
			<image:title><![CDATA[Privileged-Account-Management]]></image:title>
			<image:caption><![CDATA[First Amendment]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-traditional-security-is-failing-us-part-2/</loc>
		<lastmod>2020-04-17T04:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Corporate-Boot-Camps.jpg</image:loc>
			<image:title><![CDATA[cybersecurity]]></image:title>
			<image:caption><![CDATA[cybersecurity startups]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/levandowski-admits-to-stealing-waymos-ip/</loc>
		<lastmod>2020-04-17T04:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Court.jpg</image:loc>
			<image:title><![CDATA[Court]]></image:title>
			<image:caption><![CDATA[IP]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/moving-to-a-new-reality-the-work-from-home-soc/</loc>
		<lastmod>2020-04-17T04:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/CISCO-Security-Boulevard.jpg</image:loc>
			<image:title><![CDATA[CISCO-Security-Boulevard]]></image:title>
			<image:caption><![CDATA[work-from-home SOC]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/raspi-sdp-ensuring-impenetrable-perimeters-in-a-perimeterless-world/</loc>
		<lastmod>2020-04-17T04:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Holes.jpg</image:loc>
			<image:title><![CDATA[Holes]]></image:title>
			<image:caption><![CDATA[OT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rsac-2020-video-interviews-part-2/</loc>
		<lastmod>2020-04-17T04:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto15297426.jpg</image:loc>
			<image:title><![CDATA[canstockphoto15297426]]></image:title>
			<image:caption><![CDATA[RSAC videos]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/font-file-fail-critical-windows-zero-day-patch-in-3-weeks/</loc>
		<lastmod>2020-04-17T04:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/font-alexnewworld-pixabay.jpg</image:loc>
			<image:title><![CDATA[font--alexnewworld--pixabay]]></image:title>
			<image:caption><![CDATA[font file]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/risks-to-digital-identities-a-qa-with-ted-shorter-cto-at-keyfactor/</loc>
		<lastmod>2020-04-17T04:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Zero-Trust.jpg</image:loc>
			<image:caption><![CDATA[digital identities]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/TedShorter.jpg</image:loc>
			<image:caption><![CDATA[digital identities]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rsac-2020-video-interviews-part-1/</loc>
		<lastmod>2020-04-17T04:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto5323852.jpg</image:loc>
			<image:title><![CDATA[canstockphoto5323852]]></image:title>
			<image:caption><![CDATA[RSAC]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/skills-gap-firms-cant-fill-specific-security-roles/</loc>
		<lastmod>2020-04-17T04:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Human-Error-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[pandemic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/russia-fronton-tool-will-take-down-entire-countries/</loc>
		<lastmod>2020-04-17T04:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/d1g1r3v.jpg</image:loc>
			<image:title><![CDATA[d1g1r3v]]></image:title>
			<image:caption><![CDATA[Fronton]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/a-security-audit-is-critical-to-mitigate-risk/</loc>
		<lastmod>2020-04-17T04:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/gold-padlock-locking-door-164425-scaled-e1584961042449.jpg</image:loc>
			<image:title><![CDATA[gold-padlock-locking-door-164425]]></image:title>
			<image:caption><![CDATA[audit]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/akamai-expands-managed-security-services/</loc>
		<lastmod>2020-04-17T04:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Container-Security-Whitesource.jpg</image:loc>
			<image:caption><![CDATA[wfh]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/auth0-to-streamline-analysis-of-reputation-data/</loc>
		<lastmod>2020-04-17T04:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/AI-Data-Protection.jpg</image:loc>
			<image:title><![CDATA[AI-Data-Protection]]></image:title>
			<image:caption><![CDATA[Auth0]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/Auth0-IP-Signals-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/covid-19-fears-bring-google-chrome-dev-to-screeching-halt/</loc>
		<lastmod>2020-04-17T04:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/chromiumos-tan-codiemorgan-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[chromiumos-tan--codiemorgan--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Chrome]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/data-privacy-and-security-in-the-travel-industry/</loc>
		<lastmod>2020-04-17T04:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto245790.jpg</image:loc>
			<image:title><![CDATA[canstockphoto245790]]></image:title>
			<image:caption><![CDATA[travel]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/top-5-open-source-serverless-security-tools/</loc>
		<lastmod>2020-04-17T04:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto36344373.jpg</image:loc>
			<image:title><![CDATA[canstockphoto36344373]]></image:title>
			<image:caption><![CDATA[Webroot]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-coronavirus-pandemic-and-the-death-of-the-vpn/</loc>
		<lastmod>2020-04-17T04:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto3025211.jpg</image:loc>
			<image:title><![CDATA[canstockphoto3025211]]></image:title>
			<image:caption><![CDATA[COVID-19 cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/report-97-of-firms-compromised-right-now-really/</loc>
		<lastmod>2020-04-17T04:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/security-pixel2013-pixabay.jpg</image:loc>
			<image:title><![CDATA[security--pixel2013--pixabay]]></image:title>
			<image:caption><![CDATA[compromised]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-good-reasons-to-outsource-security-testing/</loc>
		<lastmod>2020-04-17T04:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto47950254-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto47950254]]></image:title>
			<image:caption><![CDATA[security testing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/fusion-creates-online-pandemic-readiness-resource/</loc>
		<lastmod>2020-04-17T04:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto48101457.jpg</image:loc>
			<image:title><![CDATA[canstockphoto48101457]]></image:title>
			<image:caption><![CDATA[pandemic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/storage-is-your-data-lifecycle-weak-spot/</loc>
		<lastmod>2020-04-17T04:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/PCI-Compliance.jpg</image:loc>
			<image:caption><![CDATA[data lifecycle]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/7-linux-distros-for-security-testing/</loc>
		<lastmod>2020-04-17T04:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/VPN-Leaks.jpg</image:loc>
			<image:caption><![CDATA[security testing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/supply-chain-security-coronavirus-fallout/</loc>
		<lastmod>2020-04-17T04:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto6511232.jpg</image:loc>
			<image:title><![CDATA[canstockphoto6511232]]></image:title>
			<image:caption><![CDATA[coronavirus]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-traditional-security-is-failing-us/</loc>
		<lastmod>2020-04-17T04:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Securing-New-Network.jpg</image:loc>
			<image:caption><![CDATA[security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/zeronorth-raises-10m-to-advance-risk-orchestration/</loc>
		<lastmod>2020-04-17T04:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Cybersecurity-SD-WAN-Concern.jpg</image:loc>
			<image:caption><![CDATA[ZeroNorth]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/ZeroNorth-5x5_March-2020-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/contrast-security-advances-devsecops/</loc>
		<lastmod>2020-04-17T04:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto39752295.jpg</image:loc>
			<image:title><![CDATA[canstockphoto39752295]]></image:title>
			<image:caption><![CDATA[Contrast Security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/ContrastSecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-security-challenges-of-the-cloud/</loc>
		<lastmod>2020-04-17T04:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cloud-Service-Security.jpg</image:loc>
			<image:title><![CDATA[Cloud-Service-Security]]></image:title>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/windows-10-suffers-yet-another-wormable-zero-day/</loc>
		<lastmod>2020-04-17T04:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/samba-ckim828-pixabay.jpg</image:loc>
			<image:title><![CDATA[samba--ckim828--pixabay]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/dealing-with-viruses-computer-and-biological/</loc>
		<lastmod>2020-04-17T04:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Fileless-Malware.jpg</image:loc>
			<image:caption><![CDATA[virus]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/phaxttachments-are-latest-spin-on-phishing-attacks/</loc>
		<lastmod>2020-04-17T04:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/BEC-Fraud.jpg</image:loc>
			<image:title><![CDATA[BEC-Fraud]]></image:title>
			<image:caption><![CDATA[phaxttachments]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/medusalocker-leaves-no-network-drive-safe/</loc>
		<lastmod>2020-04-17T04:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto14142984.jpg</image:loc>
			<image:title><![CDATA[canstockphoto14142984]]></image:title>
			<image:caption><![CDATA[MedusaLocker]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/note.png</image:loc>
			<image:caption><![CDATA[medusa ransomware - ransom demanding message]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/shared-responsibility-in-data-security/</loc>
		<lastmod>2020-04-17T04:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Development-Security-Rift.jpg</image:loc>
			<image:title><![CDATA[Development-Security-Rift]]></image:title>
			<image:caption><![CDATA[Adaptive Shield]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/transforming-security-through-zero-trust/</loc>
		<lastmod>2020-04-17T04:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Modernized-Industrial.jpg</image:loc>
			<image:caption><![CDATA[zero trust]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-amd-processor-bug-breaks-encryption/</loc>
		<lastmod>2020-04-17T04:09:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/amd-opengridscheduler-pd.jpg</image:loc>
			<image:title><![CDATA[amd--opengridscheduler--pd]]></image:title>
			<image:caption><![CDATA[AMD]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/california-proposal-for-mandatory-cyber-insurance/</loc>
		<lastmod>2020-04-17T04:09:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto38856026.jpg</image:loc>
			<image:title><![CDATA[canstockphoto38856026]]></image:title>
			<image:caption><![CDATA[cyber insurance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-sign-in-with-apple-is-a-good-thing/</loc>
		<lastmod>2020-04-17T04:09:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto26236143.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26236143]]></image:title>
			<image:caption><![CDATA[Sign in with Apple]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/Applesignin.png</image:loc>
			<image:caption><![CDATA[sign in with apple]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/report-details-security-threats-posed-by-cloud-file-services/</loc>
		<lastmod>2020-04-17T04:09:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/PrivacyTrends.jpg</image:loc>
			<image:title><![CDATA[PrivacyTrends]]></image:title>
			<image:caption><![CDATA[cloud file service]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coming-very-soon-devsecops-days-virtual-summit/</loc>
		<lastmod>2020-04-17T04:09:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/Blog-post-image.png</image:loc>
			<image:title><![CDATA[Blog post image]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/keeping-systems-safe-from-third-parties/</loc>
		<lastmod>2020-04-17T04:09:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Consumer-Records.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/recycling-state-sponsored-malware-for-fun-and-profit/</loc>
		<lastmod>2020-04-17T04:09:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/patrick-wardle-the-cyberwire-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[patrick-wardle--the-cyberwire--cc-by-nd]]></image:title>
			<image:caption><![CDATA[malware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/nexus-innovator-ken-dauria-of-the-hartford/</loc>
		<lastmod>2020-04-17T04:09:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/devsecops-the-best-security-strategy-in-2020/</loc>
		<lastmod>2020-04-17T04:09:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto44559434.jpg</image:loc>
			<image:title><![CDATA[security challenges]]></image:title>
			<image:caption><![CDATA[open source security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/coronavirus-concerns-to-put-remote-access-to-the-security-test/</loc>
		<lastmod>2020-04-17T04:09:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto77252211.jpg</image:loc>
			<image:title><![CDATA[canstockphoto77252211]]></image:title>
			<image:caption><![CDATA[prepare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-intel-chipset-bug-utter-chaos-will-reign/</loc>
		<lastmod>2020-04-17T04:09:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/intel-bruno-pixabay.jpg</image:loc>
			<image:title><![CDATA[intel--bruno--pixabay]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/managing-security-and-privacy-in-the-public-cloud/</loc>
		<lastmod>2020-04-17T04:09:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Secure-Cloud-Access.jpg</image:loc>
			<image:caption><![CDATA[public cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/threat-report-cybercriminals-expand-vertical-focus/</loc>
		<lastmod>2020-04-17T04:09:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Service-Scans-Chrome.jpg</image:loc>
			<image:caption><![CDATA[threat report]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-power-of-mentoring-in-threat-research/</loc>
		<lastmod>2020-04-17T04:09:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Security-Professionals.jpg</image:loc>
			<image:title><![CDATA[Security-Professionals]]></image:title>
			<image:caption><![CDATA[remote work security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/mentorshippic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/Screen-Shot-2020-03-04-at-6.35.00-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-treacherous-tricks-of-ransomware-authors/</loc>
		<lastmod>2020-04-17T04:09:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Ransomware.jpg</image:loc>
			<image:title><![CDATA[Ransomware]]></image:title>
			<image:caption><![CDATA[Ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/women-of-hamas-and-their-social-engineering-skills/</loc>
		<lastmod>2020-04-17T04:09:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SupplyChain-1.jpg</image:loc>
			<image:caption><![CDATA[Hamas]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/HAMAS-IDF-women-2020.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/zatu.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/catch-and-see.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/grixy-app.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/open-raven-launches-open-source-platform-to-secure-data/</loc>
		<lastmod>2020-04-17T04:09:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Doing-Automation-Right.jpg</image:loc>
			<image:title><![CDATA[data]]></image:title>
			<image:caption><![CDATA[business risk]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/Open-Raven.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/sim-swap-crypto-lawsuit-goes-forward-in-los-angeles/</loc>
		<lastmod>2020-04-17T04:09:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Mobile-Fraud-Threats.jpg</image:loc>
			<image:title><![CDATA[MFA]]></image:title>
			<image:caption><![CDATA[multi-factor authentication]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-partners-can-leverage-access-controls-to-secure-customers-changing-workforces/</loc>
		<lastmod>2020-04-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/web-skimmer-with-a-domain-name-generator/</loc>
		<lastmod>2020-04-17T10:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-protect-your-website-from-wordpress-brute-force-attacks/</loc>
		<lastmod>2020-04-17T10:36:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/insurance-client-sues-small-law-firm-1-5m-for-dark-overlord-payment/</loc>
		<lastmod>2020-04-20T06:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Dumb-Privacy-Rules.jpg</image:loc>
			<image:caption><![CDATA[GRU]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/internal-fraud-surging-during-covid-19/</loc>
		<lastmod>2020-04-20T07:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17405520.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17405520]]></image:title>
			<image:caption><![CDATA[fraud COVID]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/getting-started-with-grc-helping-organizations-plan-for-a-successful-grc-program/</loc>
		<lastmod>2020-04-17T15:01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/top-global-bank-selects-verint-to-provide-enterprise-solution-for-fraud-and-security-investigations/</loc>
		<lastmod>2020-04-17T15:12:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ftc-reports-over-13m-stolen-in-covid-19-scams-avast/</loc>
		<lastmod>2020-04-17T15:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-use-nancy-to-improve-your-go-application-security/</loc>
		<lastmod>2020-04-17T15:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-dod-isnt-fixing-its-security-problems/</loc>
		<lastmod>2020-04-17T15:35:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-byron-roosas-a-look-at-jython-enhanced-reverse-engineering-with-ghidra/</loc>
		<lastmod>2020-04-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/dc-court-ruling-reduces-webscraping-risk/</loc>
		<lastmod>2020-04-17T16:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-transition-from-devops-to-devsecops/</loc>
		<lastmod>2020-04-17T16:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/breach-or-blackout-when-ransomware-locks-the-grids-back-office/</loc>
		<lastmod>2020-04-17T16:20:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/luke-kingma-lou-patrick-mackays-futurism-cartoon-masks/</loc>
		<lastmod>2020-04-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-phishing-update-voicemail-attacks-surface-targeting-office-365-users/</loc>
		<lastmod>2020-04-17T17:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/u-s-house-oversight-committee-meeting-disrupted-by-zoom-bombers/</loc>
		<lastmod>2020-04-17T17:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/incident-response-requires-a-new-appsec-model/</loc>
		<lastmod>2020-04-17T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-ari-eitans-mapping-the-connections-inside-russias-apt-ecosystem/</loc>
		<lastmod>2020-04-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/from-my-gartner-blog-new-research-open-source-tools/</loc>
		<lastmod>2020-04-17T18:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/manage-covid-19-business-impact-without-limiting-planned-security-spend/</loc>
		<lastmod>2020-04-17T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/revisiting-2000-cuts-using-binary-ninjas-new-decompiler/</loc>
		<lastmod>2020-04-17T19:53:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/500k-miscreants-flog-zoom-0days-one-for-windows-one-for-macos/</loc>
		<lastmod>2020-04-17T20:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/white-house-reveals-secret-head-of-covid-19-policy/</loc>
		<lastmod>2020-04-17T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-other-coronavirus-epidemic-cybercrime-avast/</loc>
		<lastmod>2020-04-17T22:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/data-security-issues-in-cloud-computing-avast/</loc>
		<lastmod>2020-04-18T14:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-arkadiy-tetelmans-non-political-security-learnings-from-the-mueller-report/</loc>
		<lastmod>2020-04-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/xkcd-garbage-math/</loc>
		<lastmod>2020-04-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-hon-kwoks-secure-by-design-usable-security-tooling/</loc>
		<lastmod>2020-04-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/anonymous-donates-rare-film-to-bletchley-park/</loc>
		<lastmod>2020-04-19T04:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/qualys-delivers-on-promise-to-automate-endpoint-security/</loc>
		<lastmod>2020-04-19T15:13:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17608370.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17608370]]></image:title>
			<image:caption><![CDATA[Qualys endpoint]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/Qualys-VMDR-patch-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-tanya-jancas-purple-is-the-new-black-modern-approaches-to-application-security/</loc>
		<lastmod>2020-04-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/robert-m-lees-jeff-haas-little-bobby-comics-week-273/</loc>
		<lastmod>2020-04-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ai-in-your-email-what-is-human-layer-security/</loc>
		<lastmod>2020-04-19T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-jay-jacobss-visualizing-security/</loc>
		<lastmod>2020-04-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/zoom-hacked-accounts-north-korean-hackers-facebook-senior-pictures/</loc>
		<lastmod>2020-04-20T04:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/5g-technology-how-to-make-sure-the-benefits-outweigh-the-security-risks/</loc>
		<lastmod>2020-04-20T05:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cisos-on-cisos-overcoming-new-security-challenges-presented-by-the-remote-work-reality/</loc>
		<lastmod>2020-04-20T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-scam-roundup-april-20-2020/</loc>
		<lastmod>2020-04-20T07:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/security-risks-during-recovery-and-repair/</loc>
		<lastmod>2020-04-20T10:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-dangers-of-persistent-binaries-and-how-to-spot-them-part-i-2/</loc>
		<lastmod>2020-04-20T11:57:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/vulnerability-finding-using-machine-learning/</loc>
		<lastmod>2020-04-20T11:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-dangers-of-persistent-binaries-and-how-to-spot-them-part-i/</loc>
		<lastmod>2020-04-20T11:57:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-chinoxy-backdoor-a-network-perspective/</loc>
		<lastmod>2020-04-20T12:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/it-services-giant-cognizant-hit-by-maze-ransomware-attack/</loc>
		<lastmod>2020-04-20T12:43:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/simplifying-bot-prevention-with-cdn-integration/</loc>
		<lastmod>2020-04-20T13:24:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/enforcing-secure-access-with-global-login-policies/</loc>
		<lastmod>2020-04-20T13:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/coronavirus-is-a-new-challenge-for-cybersecurity/</loc>
		<lastmod>2020-04-20T13:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/preveil-is-pc-magazines-editors-choice/</loc>
		<lastmod>2020-04-20T13:57:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-contact-tracing-your-privacy-for-your-health/</loc>
		<lastmod>2020-04-21T06:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/canstockphoto8577277.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8577277]]></image:title>
			<image:caption><![CDATA[contact tracing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ensuring-business-continuity-during-peak-times-6-recommendations-to-optimize-streaming-and-download-bandwidth-usage/</loc>
		<lastmod>2020-04-20T14:30:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/apts-rats-and-code-signing-attacks/</loc>
		<lastmod>2020-04-21T07:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/SMB-Good-Security.jpg</image:loc>
			<image:caption><![CDATA[code-signing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/3-essential-tips-for-streamlining-data-security-and-minimizing-redundancies/</loc>
		<lastmod>2020-04-20T15:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-jared-casners-and-rob-shaws-bootstrapping-security/</loc>
		<lastmod>2020-04-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-phishing-lures-explode-google-blocks-18m-in-7-days/</loc>
		<lastmod>2020-04-20T16:07:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/fishing-johannes-plenio-cc-by.jpg</image:loc>
			<image:title><![CDATA[fishing--johannes-plenio--cc-by]]></image:title>
			<image:caption><![CDATA[COVID]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-risks-of-ex-domain-re-use-on-websites-and-how-to-stay-protected-against-it/</loc>
		<lastmod>2020-04-20T16:12:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-keep-your-ci-cd-pipeline-secure-with-a-remote-workforce/</loc>
		<lastmod>2020-04-20T16:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/report-increased-spending-on-compliance-not-helping-security/</loc>
		<lastmod>2020-04-20T16:30:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Risk-Assessment.jpg</image:loc>
			<image:caption><![CDATA[compliance spending]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/making-everyone-visible-in-tech/</loc>
		<lastmod>2020-04-20T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-joy-of-tech-lockdown-relationship-stress/</loc>
		<lastmod>2020-04-20T17:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/gigaspaces-announces-version-15-2-doubling-performance-simplifying-operations-and-improving-security/</loc>
		<lastmod>2020-04-22T13:30:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-geller-bedoyas-serverless-osquery-backend-and-big-data-exploration/</loc>
		<lastmod>2020-04-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-phishing-update-bad-actors-use-stimulus-payment-delays-to-capture-banking-credentials/</loc>
		<lastmod>2020-04-20T18:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/armis-webinar-series/</loc>
		<lastmod>2020-04-20T18:49:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/newsbites-drilldown-for-the-week-ending-17-april-2020/</loc>
		<lastmod>2020-04-20T18:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/shifting-cloud-security-left-with-infrastructure-as-code-2/</loc>
		<lastmod>2020-04-20T19:12:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/this-day-in-history-1812-luddites-destroy-a-zoom-factory/</loc>
		<lastmod>2020-04-20T19:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/whos-behind-the-reopen-domain-surge/</loc>
		<lastmod>2020-04-20T20:19:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/google-beyondcorp-remote-access-is-released/</loc>
		<lastmod>2020-04-20T20:23:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/everything-you-wanted-to-know-about-the-security-sy0-601-but-were-afraid-to-ask/</loc>
		<lastmod>2020-04-20T20:57:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/rangeforce-and-ectacom-gmbh-team-up-to-deliver-the-most-advanced-cyber-security-training-platform-in-the-dach-and-east-european-region/</loc>
		<lastmod>2020-04-20T21:47:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/spanning-backup-for-office-365-powershell-module-update-3-4-0-1/</loc>
		<lastmod>2020-04-20T21:57:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ai-in-your-email-what-is-human-layer-security-2/</loc>
		<lastmod>2020-04-20T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/what-to-know-about-government-contact-tracing-apps-avast/</loc>
		<lastmod>2020-04-21T00:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/from-verodin-to-mandiant-bringing-security-validation-to-an-expertise-backed-portfolio-by-tracey-moon/</loc>
		<lastmod>2020-04-21T00:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/symfonos-5-2-ctf-walkthrough/</loc>
		<lastmod>2020-04-21T02:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/keeping-alexa-out-of-the-boardroom-and-the-bedroom-office-iot-security-tips-for-remote-employees/</loc>
		<lastmod>2020-04-21T02:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/building-effective-cybersecurity-budgets/</loc>
		<lastmod>2020-04-21T03:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/filling-the-cybersecurity-skills-gap-with-network-security-training/</loc>
		<lastmod>2020-04-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/deconstructing-an-evasive-formbook-campaign-leveraging-covid-19-themes/</loc>
		<lastmod>2020-04-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/filling-the-cybersecurity-skills-gap-with-network-security-training-2/</loc>
		<lastmod>2020-04-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/federal-government-is-excelling-at-digital-transformation-while-security-challenges-gain-ground/</loc>
		<lastmod>2020-04-21T07:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/6-reasons-you-need-to-train-cyber-conscious-employees/</loc>
		<lastmod>2020-04-21T08:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bad-bot-report-2020-bad-bots-strike-back/</loc>
		<lastmod>2020-04-21T08:31:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/back-to-basics-the-gdpr-and-pci-dss/</loc>
		<lastmod>2020-04-21T09:15:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/hackers-continue-to-exploit-patched-pulse-secure-vpn-flaws-cisa-warns/</loc>
		<lastmod>2020-04-21T09:26:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/a-hackers-dream-payday-ledf-me-and-uniswap-lose-25-million-worth-of-cryptocurrency/</loc>
		<lastmod>2020-04-21T09:57:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/a-remote-workforce-makes-security-training-more-critical/</loc>
		<lastmod>2020-04-22T06:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/canstockphoto4458949.jpg</image:loc>
			<image:title><![CDATA[canstockphoto4458949]]></image:title>
			<image:caption><![CDATA[COVID-19]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/sledgehammer-vpn-approach-not-serving-apps-users-or-it/</loc>
		<lastmod>2020-04-22T07:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Network-Security-Connected.jpg</image:loc>
			<image:title><![CDATA[Network-Security-Connected]]></image:title>
			<image:caption><![CDATA[sledgehammer VPN]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/VPNsledgehammer.png</image:loc>
			<image:caption><![CDATA[VPNsledgehammer]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/series-e-funding-marks-a-momentous-day-at-forgerock/</loc>
		<lastmod>2020-04-21T11:08:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/another-story-of-bad-1970s-encryption/</loc>
		<lastmod>2020-04-21T11:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ddos-in-the-time-of-covid-19-attacks-and-raids/</loc>
		<lastmod>2020-04-21T12:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/managedmethods-wins-2020-excellence-in-customer-service-award/</loc>
		<lastmod>2020-04-21T12:30:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/have-you-accidentally-received-money-through-venmo-its-probably-another-scam/</loc>
		<lastmod>2020-04-21T12:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/replace-your-door-peephole-with-a-diy-thermal-camera/</loc>
		<lastmod>2020-04-21T12:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/what-the-clearview-ai-breach-tells-us-about-cybersecurity-today/</loc>
		<lastmod>2020-04-21T12:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/oil-and-gas-sectors-targeted-by-agenttesla-infostealer-campaigns/</loc>
		<lastmod>2020-04-21T13:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ferc-approves-deferment-of-3-cip-standards/</loc>
		<lastmod>2020-04-21T13:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/zoom-bombing-attack-targets-u-s-government-meeting/</loc>
		<lastmod>2020-04-21T13:51:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/rethink-your-cyber-security-stack-to-avoid-agent-fatigue/</loc>
		<lastmod>2020-04-21T13:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ensuring-security-in-the-coronavirus-remote-working-era/</loc>
		<lastmod>2020-04-21T13:57:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/some-users-lost-access-to-their-nintendo-accounts/</loc>
		<lastmod>2020-04-21T14:20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/surge-in-remote-working-highlights-growing-need-for-network-traffic-analytics/</loc>
		<lastmod>2020-04-21T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/unmanaged-medical-devices-are-critically-vulnerable-to-cyberattacks/</loc>
		<lastmod>2020-04-21T14:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/devops-metrics-measuring-what-matters/</loc>
		<lastmod>2020-04-21T14:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/is-covid-19-going-to-accelerate-the-future-of-work/</loc>
		<lastmod>2020-04-21T14:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/raluca-popa-is-reiventing-cybersecurity/</loc>
		<lastmod>2020-04-21T15:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/understanding-windows-services/</loc>
		<lastmod>2020-04-21T15:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/understanding-windows-registry/</loc>
		<lastmod>2020-04-21T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/web-traffic-analysis/</loc>
		<lastmod>2020-04-21T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/windows-10-auditing-features/</loc>
		<lastmod>2020-04-21T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-how-criminals-take-advantage-of-the-pandemic/</loc>
		<lastmod>2020-04-21T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cyber-work-podcast-growing-the-number-of-women-in-cybersecurity-with-olivia-rose/</loc>
		<lastmod>2020-04-21T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ics-scada-security-technologies-and-tools/</loc>
		<lastmod>2020-04-21T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/windows-internals-for-malware-analysis/</loc>
		<lastmod>2020-04-21T15:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-sameer-ahirraos-and-yogesh-karpates-privacy-nightmares-while-using-ml-ai/</loc>
		<lastmod>2020-04-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/addressing-covid-19-cybersecurity-challenges-with-tips-from-nasa/</loc>
		<lastmod>2020-04-21T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/pen-testing-stories-from-the-field-combining-tools-to-take-over-an-entire-domain/</loc>
		<lastmod>2020-04-21T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/xkcd-sourdough-starter/</loc>
		<lastmod>2020-04-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cybersecurity-maturity-model-certification-domains-explained/</loc>
		<lastmod>2020-04-21T17:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/5-steps-to-protect-sensitive-data/</loc>
		<lastmod>2020-04-21T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-marc-vilanovas-and-forest-monsens-dispatch-crisis-management-automation-when-everything-is-on-fire/</loc>
		<lastmod>2020-04-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/maze-ransomware-are-you-vulnerable/</loc>
		<lastmod>2020-04-21T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/becoming-an-all-around-defender/</loc>
		<lastmod>2020-04-21T18:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/obfuscated-wordpress-malware-dropper/</loc>
		<lastmod>2020-04-21T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-and-the-perfect-security-storm/</loc>
		<lastmod>2020-04-21T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/passpoint-r1-r2-compared/</loc>
		<lastmod>2020-04-21T20:31:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-complete-application-security-checklist/</loc>
		<lastmod>2020-04-21T20:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/oil-gas-spearphishing-campaigns-drop-agent-tesla-spyware-in-advance-of-historic-opec-deal/</loc>
		<lastmod>2020-04-21T20:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/accelerator-program-for-early-stage-innovations-in-water-update-introducing-our-innovators/</loc>
		<lastmod>2020-04-21T21:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/youre-one-unsecured-testing-environment-away-from-a-digital-attack/</loc>
		<lastmod>2020-04-21T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/re-imagine-endpoint-protection-even-if-you-dont-have-edr/</loc>
		<lastmod>2020-04-21T21:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/security-weakness-in-tiktok-avast/</loc>
		<lastmod>2020-04-21T21:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/state-of-the-art-appsec-goes-beyond-perimeter-into-application-runtimes/</loc>
		<lastmod>2020-04-21T23:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/what-is-configuration-drift/</loc>
		<lastmod>2020-04-22T07:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/why-cloud-dlp-is-the-most-important-technology-for-saas-apps/</loc>
		<lastmod>2020-04-22T07:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/protecting-e-mail-in-times-of-crisis-9-challenges-for-email-security-experts/</loc>
		<lastmod>2020-04-22T08:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/securing-the-work-at-home-environment/</loc>
		<lastmod>2020-04-22T08:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/third-parties-prove-persistent-healthcare-data-risk/</loc>
		<lastmod>2020-04-22T10:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/in-times-of-disruption-dont-forget-your-third-parties/</loc>
		<lastmod>2020-04-22T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/helping-you-adapt-to-the-new-normal-rsas-commitment-to-meet-this-moment/</loc>
		<lastmod>2020-04-22T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/managedmethods-partners-with-five-star-technology-solutions-to-add-cybersecurity-student-safety-monitoring-to-five-stars-k-12-education-services-portfolio/</loc>
		<lastmod>2020-04-22T12:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/aqua-security-introduces-dynamic-threat-analysis-for-containers-mitigating-risks-of-sophisticated-malware-attacks/</loc>
		<lastmod>2020-04-22T12:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/mcafee-mvision-cloud-provides-secure-and-compliant-way-to-manage-data-and-user-activity-in-microsoft-teams/</loc>
		<lastmod>2020-04-23T16:01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/u-s-treasury-anticipates-surge-in-fraudulent-attempts-regarding-economic-stimulus-payments/</loc>
		<lastmod>2020-04-22T12:52:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/are-we-giving-up-our-privacy/</loc>
		<lastmod>2020-04-22T12:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/office-exodus-drives-endpoint-insecurity/</loc>
		<lastmod>2020-04-22T13:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/specialized-threat-intelligence-breach-data-to-defensive-solution/</loc>
		<lastmod>2020-04-22T13:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/securing-remote-work-part-1-your-data-is-on-the-move/</loc>
		<lastmod>2020-04-22T13:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/metrics-evaluation-using-static-analysis-for-automotive-software-specified-by-kgas-and-automotive-spice/</loc>
		<lastmod>2020-04-22T13:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/fbi-warns-about-people-sharing-security-information-on-social-media/</loc>
		<lastmod>2020-04-22T13:50:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cmmc-ready-preveil-named-editors-choice-by-pc-magazine/</loc>
		<lastmod>2020-04-22T13:54:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/successful-social-distancing-for-businesses/</loc>
		<lastmod>2020-04-22T14:06:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/keep-applications-secure-in-atlassian-bitbucket-with-automated-pull-requests/</loc>
		<lastmod>2020-04-22T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/doppelpaymer-ransomware-struck-city-in-los-angeles-county/</loc>
		<lastmod>2020-04-22T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/embracing-cybersecurity-for-better-vendor-access-risk-management/</loc>
		<lastmod>2020-04-22T14:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/single-sign-on-sso-101/</loc>
		<lastmod>2020-04-22T14:45:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/data-breach-bad-actor-leaks-23-million-account-credentials-from-webkinz-childrens-platform/</loc>
		<lastmod>2020-04-22T14:51:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/heres-how-human-like-bots-perform-online-fraud/</loc>
		<lastmod>2020-04-22T14:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/facebook-privacy-tracking-lawsuit-can-continue-court-says/</loc>
		<lastmod>2020-04-23T06:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Dumb-Privacy-Rules.jpg</image:loc>
			<image:caption><![CDATA[GRU]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/what-is-grc/</loc>
		<lastmod>2020-04-22T15:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/signs-you-might-be-ready-for-an-ids-upgrade/</loc>
		<lastmod>2020-04-22T15:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/signs-you-might-be-ready-for-an-ids-upgrade-2/</loc>
		<lastmod>2020-04-22T15:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/3-governance-risk-and-compliance-trends-to-watch-2/</loc>
		<lastmod>2020-04-22T15:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/before-5g-or-ai-companies-need-a-strong-security-foundation/</loc>
		<lastmod>2020-04-23T07:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Breach-Incidents-2019.jpg</image:loc>
			<image:title><![CDATA[ransomware]]></image:title>
			<image:caption><![CDATA[Egregor]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-alexis-hancocks-kurt-opsahls-hayley-tsukayamas-and-jamie-williams-ask-the-eff/</loc>
		<lastmod>2020-04-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/asset-discovery/</loc>
		<lastmod>2020-04-22T16:03:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/rangeforce-intros-hands-on-yara-training-modules-with-free-promotion/</loc>
		<lastmod>2020-04-22T16:06:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/zoom-malware-can-record-meetings-attack-simulation-shows-how/</loc>
		<lastmod>2020-04-22T16:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/through-the-decades-security-innovation-in-response-to-threats/</loc>
		<lastmod>2020-04-22T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-joy-of-tech-coronavirus-changes-everything/</loc>
		<lastmod>2020-04-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/six-tips-for-keeping-your-employees-and-operations-safe-avast/</loc>
		<lastmod>2020-04-22T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-shift-to-remote-work-makes-red-team-testing-more-important-than-ever/</loc>
		<lastmod>2020-04-22T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/6-key-considerations-for-iot-security-by-design/</loc>
		<lastmod>2020-04-22T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/controlling-the-zoom-effect-forescout-research-labs-explores-telework-in-healthcare-government-and-financial-services/</loc>
		<lastmod>2020-04-22T17:36:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/certifications-compared-gcfa-vs-csfa-vs-ccfp/</loc>
		<lastmod>2020-04-22T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/phishing-techniques-contest-winner-scam/</loc>
		<lastmod>2020-04-22T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-aaron-browns-sharks-in-the-water-open-source-component-risk-and-mitigation/</loc>
		<lastmod>2020-04-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ubuntu-20-04-lts-arrives/</loc>
		<lastmod>2020-04-23T12:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/new-tech-why-it-makes-more-sense-for-pam-tools-to-manage-activities-instead-of-access/</loc>
		<lastmod>2020-04-22T18:57:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/zooms-security-fails-common-knowledge-to-the-companys-partners/</loc>
		<lastmod>2020-04-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/exposure-of-nih-who-and-gates-foundation-credentials-underscores-the-critical-importance-of-credential-screening/</loc>
		<lastmod>2020-04-22T19:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/outstanding/</loc>
		<lastmod>2020-04-22T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/phishing-statistics-the-29-latest-phishing-stats-to-know-in-2020/</loc>
		<lastmod>2020-04-22T20:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/pinnaclecart-server-side-skimmers-and-backdoors/</loc>
		<lastmod>2020-04-22T22:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/introducing-the-mgt512-cyber42-security-leadership-simulation/</loc>
		<lastmod>2020-04-22T23:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/instructor-spotlight-keith-palmgren-sans-senior-instructor/</loc>
		<lastmod>2020-04-22T23:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/you-asked-we-delivered-sans-introduces-electronic-courseware/</loc>
		<lastmod>2020-04-23T01:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bank-implements-branch-modernization-project-with-flexibility-of-fortinet-secure-sd-wan/</loc>
		<lastmod>2020-04-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/six-considerations-for-business-continuity-in-the-age-of-telecommuting/</loc>
		<lastmod>2020-04-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/top-3-considerations-for-your-critical-apps-in-the-age-of-teleworking/</loc>
		<lastmod>2020-04-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-protect-your-wordpress-website-from-file-upload-vulnerability/</loc>
		<lastmod>2020-04-23T07:26:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/qualys-ceo-outlines-plan-to-converge-cybersecurity-and-it-management/</loc>
		<lastmod>2020-04-23T10:30:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/AI-Federal-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[Qualys]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/Qualys-VMDR-patch-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/right-of-access-under-ccpa-and-gdpr/</loc>
		<lastmod>2020-04-24T07:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Compliant-With-NIST.jpg</image:loc>
			<image:title><![CDATA[Compliant-With-NIST]]></image:title>
			<image:caption><![CDATA[HIPAA]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/google-drive-security-for-remote-learning-working/</loc>
		<lastmod>2020-04-23T11:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/trucking-companies-the-new-target-for-scammers/</loc>
		<lastmod>2020-04-24T06:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/canstockphoto3321704.jpg</image:loc>
			<image:title><![CDATA[canstockphoto3321704]]></image:title>
			<image:caption><![CDATA[trucking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/stop-using-your-ios-mail-app-now-heres-what-you-need-to-know-about-the-scary-flaw-just-discovered-and-how-to-stay-safe/</loc>
		<lastmod>2020-04-23T11:37:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/announcing-the-1st-international-workshop-on-smart-contract-analysis/</loc>
		<lastmod>2020-04-23T11:50:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ncsc-launches-new-uk-cyber-aware-campaign-avast/</loc>
		<lastmod>2020-04-23T11:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-challenge-of-managing-identities-in-a-cloud-y-it-environment/</loc>
		<lastmod>2020-04-23T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-update-php-version-in-wordpress-beginners-guide/</loc>
		<lastmod>2020-04-23T12:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/malwarebytes-expands-into-privacy-with-fast-frictionless-vpn/</loc>
		<lastmod>2020-04-23T12:03:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-completely-remove-defacement-from-wordpress-site/</loc>
		<lastmod>2020-04-23T12:08:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/fbi-warns-extortion-scams-are-on-the-rise-amid-stay-at-home-orders/</loc>
		<lastmod>2020-04-23T12:27:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/travelex-up-for-sale/</loc>
		<lastmod>2020-04-23T12:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/will-iot-get-us-through-the-covid-19-pandemic/</loc>
		<lastmod>2020-04-23T12:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ppmwp-2-2-out-of-the-box-support-for-custom-login-pages-other-updates/</loc>
		<lastmod>2020-04-23T12:40:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/loginradius-bans-video-conferencing-app-zoom-over-security-concerns/</loc>
		<lastmod>2020-04-23T13:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cyber-aware-campaign-in-the-uk-asks-for-peoples-help-and-83-phishing-scams-get-shut-down/</loc>
		<lastmod>2020-04-23T14:09:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/sba-loan-program-for-covid-19-relief-suffers-data-breach/</loc>
		<lastmod>2020-04-23T14:11:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Rules-of-Engagement.jpg</image:loc>
			<image:caption><![CDATA[contractors]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/canonical-adds-more-security-to-ubuntu-os/</loc>
		<lastmod>2020-04-23T14:44:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto42851015.jpg</image:loc>
			<image:title><![CDATA[canstockphoto42851015]]></image:title>
			<image:caption><![CDATA[Ubuntu]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/scam-everything-opioids-netflix-phish-covid-charities-and-government-refunds-in-one-network-neighborhood/</loc>
		<lastmod>2020-04-23T14:51:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/email-credentials-of-who-the-gates-foundation-other-leaked-online/</loc>
		<lastmod>2020-04-23T15:09:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/not-all-ai-and-ml-is-created-equal/</loc>
		<lastmod>2020-04-23T15:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cracking-the-netatmo-smart-indoor-security-camera/</loc>
		<lastmod>2020-04-23T15:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/was-my-data-really-stolen/</loc>
		<lastmod>2020-04-23T15:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-david-sparks-mike-johnsons-and-olivia-roses-ciso-vendor-relationship-podcast/</loc>
		<lastmod>2020-04-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/xkcd-use-or-discard-by/</loc>
		<lastmod>2020-04-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/security-threats-facing-modern-mobile-apps/</loc>
		<lastmod>2020-04-23T17:05:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/when-in-doubt-hang-up-look-up-call-back/</loc>
		<lastmod>2020-04-23T17:27:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/best-practices-for-earning-insurance-customer-loyalty/</loc>
		<lastmod>2020-04-23T17:36:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/apple-scrambles-to-patch-old-ios-mail-bugs/</loc>
		<lastmod>2020-04-23T17:42:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/iphone-paulo-henrique-cc-by.jpg</image:loc>
			<image:title><![CDATA[iphone--paulo-henrique--cc-by]]></image:title>
			<image:caption><![CDATA[Apple]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-alexei-kojenovs-break-crypto-like-a-pro/</loc>
		<lastmod>2020-04-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/secure-work-from-home-with-preveil-pc-magazines-editors-choice/</loc>
		<lastmod>2020-04-23T18:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/top-reviews-for-authentic8-silo/</loc>
		<lastmod>2020-04-23T18:21:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/nexus-intelligence-insights-protect-your-bitcoins-from-700-malicious-rubygems-with-sonatype-2020-0196/</loc>
		<lastmod>2020-04-23T18:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-does-your-security-incident-response-sir-program-measure-up/</loc>
		<lastmod>2020-04-23T18:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/teddys-citizenship-in-a-republic-speech-the-110th-anniversary/</loc>
		<lastmod>2020-04-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/are-hackers-changing-up-their-techniques-as-cybersecurity-advances/</loc>
		<lastmod>2020-04-23T19:08:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/what-is-the-state-of-software-security-in-these-crazy-times/</loc>
		<lastmod>2020-04-23T19:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/dev-sec-ops-devsecops/</loc>
		<lastmod>2020-04-23T19:56:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/faked-websites-promote-pandemic-survival-book-avast/</loc>
		<lastmod>2020-04-23T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bad-bot-traffic-is-on-the-rise-and-financial-services-industry-takes-the-brunt/</loc>
		<lastmod>2020-04-23T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/expanding-trust-in-mobile-devices/</loc>
		<lastmod>2020-04-23T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/forescout-eyesegment-recent-product-enhancements/</loc>
		<lastmod>2020-04-23T20:59:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/victorygate-monero-mining-botnet-spread-via-infected-usb-devices/</loc>
		<lastmod>2020-04-23T21:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/maze-ransomware-what-you-need-to-know/</loc>
		<lastmod>2020-04-23T21:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-manage-certificates-using-azure-active-directory-ad/</loc>
		<lastmod>2020-04-23T22:07:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/vulnhub-ctf-walkthrough-sar-1/</loc>
		<lastmod>2020-04-23T22:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cyber-work-podcast-teach-yourself-cybersecurity-with-skills-based-education-with-john-wagnon/</loc>
		<lastmod>2020-04-23T22:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/enabling-workforce-productivity-in-challenging-times/</loc>
		<lastmod>2020-04-23T23:06:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/responding-to-insider-threats-with-soar/</loc>
		<lastmod>2020-04-24T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/digital-transformation-and-security-protecting-endpoints-and-dxps/</loc>
		<lastmod>2020-04-24T01:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/tips-and-tactics-for-creating-your-own-capture-the-flag-event/</loc>
		<lastmod>2020-04-24T03:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/contact-tracing-controversy-fighting-covid-19-criminal-activity/</loc>
		<lastmod>2020-04-24T04:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/expert-thoughts-on-how-infosec-pros-can-make-the-most-of-working-from-home/</loc>
		<lastmod>2020-04-24T05:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/a-productive-transformation-of-ngfw-over-the-dedicated-ips/</loc>
		<lastmod>2020-04-24T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/businesses-are-increasingly-considering-paying-ransomware-attackers/</loc>
		<lastmod>2020-04-24T08:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/text-bomb-crashes-iphones-ipads-macs-and-apple-watches-what-you-need-to-know/</loc>
		<lastmod>2020-04-24T10:14:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/apple-ios-mail-bug-doesnt-pose-an-immediate-risk-to-our-users/</loc>
		<lastmod>2020-04-24T10:39:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/report-domains-promoting-resistance-to-covid-19-orders-tied-to-one-owner/</loc>
		<lastmod>2020-04-24T10:40:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/canstockphoto19021397.jpg</image:loc>
			<image:title><![CDATA[canstockphoto19021397]]></image:title>
			<image:caption><![CDATA[domain]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/Dorr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/maintaining-meeting-security-during-the-coronavirus/</loc>
		<lastmod>2020-04-27T07:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/DevSecOps-RSAC.jpg</image:loc>
			<image:caption><![CDATA[meeting]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/heineken-freebies-scammers-resurrect-an-old-phishing-scam-to-steal-your-personal-data/</loc>
		<lastmod>2020-04-24T11:23:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-impact-of-coronavirus-on-the-threat-landscape/</loc>
		<lastmod>2020-04-27T06:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto77252211.jpg</image:loc>
			<image:title><![CDATA[canstockphoto77252211]]></image:title>
			<image:caption><![CDATA[prepare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-privileged-access-management-can-protect-pii/</loc>
		<lastmod>2020-04-24T13:26:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-block-the-sindhi-text-bomb-on-ios/</loc>
		<lastmod>2020-04-24T13:36:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/anexinet-launches-innovative-identity-access-management-iam-modernization-assessment/</loc>
		<lastmod>2020-04-24T13:54:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/us-law-enforcement-takes-down-covid-19-related-online-malicious-campaigns/</loc>
		<lastmod>2020-04-24T13:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/flaw-in-ios-mail-app-may-put-millions-at-risk-avast/</loc>
		<lastmod>2020-04-24T13:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/zoom-phishing-campaign-tricks-people-into-revealing-login-credentials/</loc>
		<lastmod>2020-04-24T14:12:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/advanced-encryption-standard-aes-what-it-is-and-how-it-works/</loc>
		<lastmod>2020-04-24T14:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/finance-teams-can-rely-on-preveil-pc-magazines-editors-choice/</loc>
		<lastmod>2020-04-24T14:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/debunking-cybersecurity-jargon-part-one-what-is-adaptive-redaction/</loc>
		<lastmod>2020-04-24T15:25:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/new-phishing-campaign-spoofed-skype-to-steal-users-credentials/</loc>
		<lastmod>2020-04-24T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/nexus-innovator-bryan-batty-of-bloomberg-industry-group-part-2/</loc>
		<lastmod>2020-04-24T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/nexus-innovator-bryan-batty-of-bloomberg-industry-group-a-four-part-conversation/</loc>
		<lastmod>2020-04-24T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-lokesh-pidawekars-adventures-in-vendor-security-and-continuous-review/</loc>
		<lastmod>2020-04-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cjis-compliance-guide-13-policy-areas-to-know/</loc>
		<lastmod>2020-04-24T16:19:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/unproven-coronavirus-therapy-proves-cash-cow-for-shadow-pharmacies/</loc>
		<lastmod>2020-04-24T16:45:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-joy-of-tech-iphone-ses-good-with-masks/</loc>
		<lastmod>2020-04-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/friction-free-experience-vs-secure-access-lessons-from-the-zoombombing-fallout/</loc>
		<lastmod>2020-04-24T17:26:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/nexus-innovator-bryan-batty-of-bloomberg-industry-group-part-4/</loc>
		<lastmod>2020-04-24T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/nexus-innovator-bryan-batty-of-bloomberg-industry-group-part-3/</loc>
		<lastmod>2020-04-24T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/securely-maintaining-business-continuity-with-eyesegment/</loc>
		<lastmod>2020-04-24T17:45:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/china-wants-to-control-all-the-internet-with-new-ip-plan/</loc>
		<lastmod>2020-04-24T17:50:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/xi-jinping-donkeyhotey-cc-by.jpg</image:loc>
			<image:title><![CDATA[xi-jinping--donkeyhotey--cc-by]]></image:title>
			<image:caption><![CDATA[TikTok]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-kyle-tobeners-and-chris-john-rileys-managing-the-assets-of-your-security-career/</loc>
		<lastmod>2020-04-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/quick-tip-2-dnsmap/</loc>
		<lastmod>2020-04-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-phishing-update-threat-actors-abusing-utility-concerns/</loc>
		<lastmod>2020-04-24T18:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/friction-free-experience-vs-secure-access-lessons-from-the-zoombombing-fallout-2/</loc>
		<lastmod>2020-04-24T18:05:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cybersecurity-during-a-pandemic-and-what-you-can-do-to-keep-employees-safe/</loc>
		<lastmod>2020-04-24T19:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/continuous-contextual-authentication-cybersecurity-and-identity-converge-in-a-hybrid-cloud-world/</loc>
		<lastmod>2020-04-24T20:30:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cyber-hygiene-crucial-to-resolving-covid-19-avast/</loc>
		<lastmod>2020-04-24T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/iot-verdenen-gjenoppdager-pc-problemene/</loc>
		<lastmod>2020-04-24T21:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/duplicated-vulnerabilities-in-wordpress-plugins/</loc>
		<lastmod>2020-04-24T22:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/anzac-day-dawn-service-official-broadcast/</loc>
		<lastmod>2020-04-24T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-anne-ricketts-and-hilary-spreiters-transform-your-presentation-skills/</loc>
		<lastmod>2020-04-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/xkcd-coronavirus-genome/</loc>
		<lastmod>2020-04-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-reed-lodens-day-two-opening-remarks/</loc>
		<lastmod>2020-04-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/data-in-transit-encryption-avast/</loc>
		<lastmod>2020-04-26T01:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/more-insights-on-the-global-ddos-threat-landscape/</loc>
		<lastmod>2020-04-26T11:51:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-larkin-ryders-keynote-whats-new-or-not-in-2020-are-we-making-progress/</loc>
		<lastmod>2020-04-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/robert-m-lees-jeff-haas-little-bobby-comics-week-274/</loc>
		<lastmod>2020-04-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-sohini-mukherjees-leveraging-osquery-for-dfir-at-scale/</loc>
		<lastmod>2020-04-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/disc-sans-ics-virtual-conference-and-ics-ctf-event-details/</loc>
		<lastmod>2020-04-26T23:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/immigrants-and-billionaires-why-are-we-blaming-them/</loc>
		<lastmod>2020-04-27T02:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-end-of-passwords-as-we-know-it/</loc>
		<lastmod>2020-04-27T04:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/beware-of-the-gif-account-takeover-vulnerability-in-microsoft-teams/</loc>
		<lastmod>2020-04-27T04:01:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/new-technique-lets-hackers-use-vulnerability-to-disable-any-anti-virus-av-software-running-on-any-os-windows-mac-linux/</loc>
		<lastmod>2020-04-27T04:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/stomping-shadow-copies-a-second-look-into-deletion-methods/</loc>
		<lastmod>2020-04-27T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/sd-wan-for-teleworkers-scalability-and-application-performance/</loc>
		<lastmod>2020-04-27T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/osint-using-threat-intelligence-to-secure-your-organisation/</loc>
		<lastmod>2020-04-27T07:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/pci-pal-launches-webinar-series-on-payment-security-compliance/</loc>
		<lastmod>2020-04-27T07:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/shared-intel-new-book-on-cyber-warfare-foreshadows-attacks-on-elections-remote-workers/</loc>
		<lastmod>2020-04-27T08:56:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/advanced-bot-protection-integrated-into-impervas-cloud-application-security/</loc>
		<lastmod>2020-04-27T09:34:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-are-you-implementing-compensating-controls-for-owasp-top-10/</loc>
		<lastmod>2020-04-27T10:06:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-email-attack-or-email-harvesting/</loc>
		<lastmod>2020-04-28T06:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Fileless-Malware-RSAC.jpg</image:loc>
			<image:caption><![CDATA[Zerologon]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/automatic-instacart-bots/</loc>
		<lastmod>2020-04-27T11:13:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/security-risk-controls-why-you-need-them/</loc>
		<lastmod>2020-04-27T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/why-u-s-software-companies-dont-have-to-protect-our-data/</loc>
		<lastmod>2020-04-28T07:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Infamous-Hacks-Phishes.jpg</image:loc>
			<image:title><![CDATA[Infamous-Hacks-Phishes]]></image:title>
			<image:caption><![CDATA[COVID-19]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/insider-threats-jump-47-percent-as-incident-costs-reach-11-45-million-new-study-shows/</loc>
		<lastmod>2020-04-27T12:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/italys-most-experienced-information-security-company-relies-on-netsparker/</loc>
		<lastmod>2020-04-27T13:23:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-business-value-of-the-comptia-pentest-employee-certification/</loc>
		<lastmod>2020-04-27T13:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-choose-the-right-strategy-for-iso-27001-risk-management/</loc>
		<lastmod>2020-04-27T13:46:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/medical-information-of-233000-individuals-exposed-after-genetic-testing-lab-hack/</loc>
		<lastmod>2020-04-27T13:57:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/grc-software-and-the-impact-of-integrated-risk-management/</loc>
		<lastmod>2020-04-27T13:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/nintendo-confirms-that-160000-accounts-were-compromised/</loc>
		<lastmod>2020-04-27T14:18:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-science-of-compliance-early-code-to-secure-your-node/</loc>
		<lastmod>2020-04-27T14:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/improving-business-continuity-avast/</loc>
		<lastmod>2020-04-27T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/who-admits-to-leaked-credentials-says-number-of-cyber-attacks-increased-fivefold/</loc>
		<lastmod>2020-04-27T15:02:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/zero-day-flaw-allowed-attackers-to-achieve-rce-on-firewalls/</loc>
		<lastmod>2020-04-27T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-scam-roundup-april-27-2020/</loc>
		<lastmod>2020-04-27T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-chris-barcellos-and-abhi-kafles-chrome-extension-risks-and-you/</loc>
		<lastmod>2020-04-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/introducing-a-technical-guide-to-remote-security-operations/</loc>
		<lastmod>2020-04-27T16:24:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/seczetta-and-stack-solutions-announce-new-partnership-to-improve-user-experience-and-governance-for-third-party-users/</loc>
		<lastmod>2020-04-27T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-duality-of-attackers-or-why-bad-guys-are-a-good-thing/</loc>
		<lastmod>2020-04-27T16:36:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-joy-of-tech-bettering-oneself-during-lockdown/</loc>
		<lastmod>2020-04-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-contact-tracing-apps-fight-privacy-fears/</loc>
		<lastmod>2020-04-27T17:26:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/spikey-david-figuera-cc-by.jpg</image:loc>
			<image:title><![CDATA[spikey--david-figuera--cc-by]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/securing-remote-work-part-2-bitglass-casb-for-saas/</loc>
		<lastmod>2020-04-27T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-clint-giblers-zane-lackeys-astha-singhals-justine-osbornes-and-doug-deperrys-panel-lessons-learned-from-the-devsecops-trenches/</loc>
		<lastmod>2020-04-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/delphix-partner-spotlight-on-tdglobal/</loc>
		<lastmod>2020-04-27T18:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/maintaining-your-appsec-program-through-office-closures-and-economic-uncertainty/</loc>
		<lastmod>2020-04-27T18:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/5-questions-you-need-to-answer-for-a-better-security-posture/</loc>
		<lastmod>2020-04-27T18:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/simplifying-data-center-and-iaas-visibility-and-protection/</loc>
		<lastmod>2020-04-27T19:03:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/card-cycling-damages-brands-even-if-it-doesnt-happen-in-your-environment/</loc>
		<lastmod>2020-04-27T20:07:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/a-gif-image-could-have-let-hackers-hijack-microsoft-teams-at-your-firm/</loc>
		<lastmod>2020-04-27T20:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/newsbites-drilldown-for-the-week-ending-24-april-2020/</loc>
		<lastmod>2020-04-27T22:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/announcement-loginradius-now-supports-pin-login-with-enhanced-features/</loc>
		<lastmod>2020-04-28T01:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cisos-on-cisos-leveraging-secure-sd-wan-to-meet-todays-security-and-network-requirements/</loc>
		<lastmod>2020-04-28T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/important-data-security-steps-to-take-when-working-remote/</loc>
		<lastmod>2020-04-28T08:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/supporting-cybersecurity-programs-throughout-the-covid-19-crisis/</loc>
		<lastmod>2020-04-28T08:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/what-is-the-cyber-essentials-certification-and-how-can-it-help-your-business/</loc>
		<lastmod>2020-04-28T08:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/five-tips-on-training-staff-to-avoid-coronavirus-scams/</loc>
		<lastmod>2020-04-28T09:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/endpoint-device-controls-for-secure-remote-working/</loc>
		<lastmod>2020-04-28T09:44:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/3-tips-for-security-in-the-age-of-remote-work/</loc>
		<lastmod>2020-04-29T07:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Awareness.jpg</image:loc>
			<image:caption><![CDATA[remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/my-take-why-covid-19-digital-distancing-is-every-bit-as-vital-as-social-distancing/</loc>
		<lastmod>2020-04-28T10:50:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/rsa-archer-offers-rapid-response-for-business-resiliency/</loc>
		<lastmod>2020-04-28T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/rsa-continues-user-experience-evolution-with-rsa-archer-release-6-8/</loc>
		<lastmod>2020-04-28T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/rsa-archer-offers-rapid-response-for-business-resiliency-2/</loc>
		<lastmod>2020-04-28T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/compliance-in-canada-today/</loc>
		<lastmod>2020-04-28T12:18:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cybercriminals-leak-execupharm-internal-documents-after-ransomware-attack/</loc>
		<lastmod>2020-04-28T12:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/malware-virus-anti-malware-antivirus-whats-the-difference/</loc>
		<lastmod>2020-04-28T12:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/attackers-on-the-hunt-for-exposed-rdp-servers/</loc>
		<lastmod>2020-04-28T13:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/operators-of-shade-ransomware-publish-750k-decryption-keys/</loc>
		<lastmod>2020-04-28T13:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/guardsquare-announces-threatcast-a-revolution-in-mobile-application-threat-intelligence/</loc>
		<lastmod>2020-04-28T13:54:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/joining-the-front-lines-of-appsec/</loc>
		<lastmod>2020-04-28T13:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/psd2-and-open-banking-the-new-way-to-work-your-money/</loc>
		<lastmod>2020-04-28T14:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/reading-from-memory/</loc>
		<lastmod>2020-04-28T14:26:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/time-to-rethink-how-you-provide-secure-internet-access-for-remote-workers/</loc>
		<lastmod>2020-04-28T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/abcs-of-ueba-n-is-for-network/</loc>
		<lastmod>2020-04-28T14:59:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/secrets-security-insights-and-apis/</loc>
		<lastmod>2020-04-28T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ddos-protection-is-like-airbags-in-your-car/</loc>
		<lastmod>2020-04-28T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ics-scada-malware-threats/</loc>
		<lastmod>2020-04-28T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/biggest-threats-to-ics-scada-systems/</loc>
		<lastmod>2020-04-28T15:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/web-server-security-active-defense/</loc>
		<lastmod>2020-04-28T15:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-audit-windows-10-application-logs/</loc>
		<lastmod>2020-04-28T15:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/6-ways-to-address-the-owasp-top-10-vulnerabilities/</loc>
		<lastmod>2020-04-28T15:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/siem-for-ics-scada-environments/</loc>
		<lastmod>2020-04-28T15:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/intrusion-detection-and-prevention-for-ics-scada-environments/</loc>
		<lastmod>2020-04-28T15:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/firewalls-for-ics-scada-environments/</loc>
		<lastmod>2020-04-28T15:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/credential-stuffing-attack-prevention-mitigation/</loc>
		<lastmod>2020-04-28T15:32:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/fooling-nlp-systems-through-word-swapping/</loc>
		<lastmod>2020-04-28T15:38:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/using-video-conferencing-tools-securely-during-covid-19/</loc>
		<lastmod>2020-04-28T15:54:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/list-of-passpoint-supported-operating-systems/</loc>
		<lastmod>2020-04-28T15:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cyrc-analysis-cve-2020-7958-biometric-data-extraction-in-android-devices/</loc>
		<lastmod>2020-04-28T15:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-travis-knapp-praseks-san-serif-rules-everything-around-me/</loc>
		<lastmod>2020-04-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/smart-parking-meter-company-hit-by-sodinokibi/</loc>
		<lastmod>2020-04-28T16:25:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-world-bank-groups-cloud-journey-with-devsecops/</loc>
		<lastmod>2020-04-28T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bitglass-on-apptega-cyberxchange/</loc>
		<lastmod>2020-04-28T16:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/digital-transformation-and-security-impacts-avast/</loc>
		<lastmod>2020-04-28T16:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/isc2-survey-finds-cybersecurity-professionals-being-repurposed-during-covid-19-pandemic/</loc>
		<lastmod>2020-04-28T17:04:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/covid-19-phishing-update-money-flipping-schemes-promise-coronavirus-cash/</loc>
		<lastmod>2020-04-28T17:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/accurics-launches-with-a-vision-of-making-cloud-infrastructure-security-ubiquitous/</loc>
		<lastmod>2020-04-28T17:13:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cloud-series-design-and-adjust-complex-user-journeys-across-all-your-digital-channels/</loc>
		<lastmod>2020-04-28T17:25:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/massachusetts-to-receive-18-2-million-in-settlement-against-equifax/</loc>
		<lastmod>2020-04-28T17:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-dylan-ayreys-and-allison-donovans-the-gcp-metadata-api-security-considerations-vulnerabilities-and-remediations/</loc>
		<lastmod>2020-04-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/accelerate-migration-from-legacy-wam-while-enabling-zero-trust-access-with-eaa-and-single-host-access/</loc>
		<lastmod>2020-04-28T18:51:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/tufin-securecloud-now-available-on-the-red-hat-marketplace/</loc>
		<lastmod>2020-04-28T18:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/governed-by-imbeciles/</loc>
		<lastmod>2020-04-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/getting-ready-for-cmmc-compliance/</loc>
		<lastmod>2020-04-28T19:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/why-rapid7-and-why-now/</loc>
		<lastmod>2020-04-28T19:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/attackers-prey-on-chaos-and-confusion-of-covid-19/</loc>
		<lastmod>2020-04-28T19:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/google-makes-identity-verification-mandatory-for-all-advertisers/</loc>
		<lastmod>2020-04-28T20:07:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/rapid7-announces-intent-to-acquire-divvycloud-and-provides-preliminary-first-quarter-2020-financial-results/</loc>
		<lastmod>2020-04-28T20:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/validating-your-security-controls-with-cyber-threat-intelligence-by-mark-arena/</loc>
		<lastmod>2020-04-28T20:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/would-you-have-fallen-for-this-phone-scam/</loc>
		<lastmod>2020-04-28T20:55:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/a-compare-and-contrast-between-next-gen-siem-and-soar/</loc>
		<lastmod>2020-04-28T21:04:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-adventures-of-microservices-the-ravishing/</loc>
		<lastmod>2020-04-28T21:10:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/ms-01-04-dh.jpg</image:loc>
			<image:caption><![CDATA[The Ravishing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-adventures-of-microservice-in-the-data-center/</loc>
		<lastmod>2020-04-28T21:12:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/ms-01-03-dh.jpg</image:loc>
			<image:caption><![CDATA[In the Data Center]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-adventures-of-microservice-the-kickoff-meeting/</loc>
		<lastmod>2020-04-28T21:13:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/ms-01-02-dh.jpg</image:loc>
			<image:caption><![CDATA[The Kickoff Meeting]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-adventures-of-microservice-the-birth-of-microservice/</loc>
		<lastmod>2020-04-28T21:14:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/ms-01-01-dh.jpg</image:loc>
			<image:caption><![CDATA[The Birth of Microservice]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/what-is-geolocation/</loc>
		<lastmod>2020-04-28T22:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/hipaa-telehealth-and-covid-19/</loc>
		<lastmod>2020-04-28T22:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/data-tokenizationwhy-governments-should-implement-it/</loc>
		<lastmod>2020-04-28T23:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/vpn-status-monitoring-amp-workflow-automation-with-soar/</loc>
		<lastmod>2020-04-29T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/automated-vpn-status-monitoring-with-soar/</loc>
		<lastmod>2020-04-29T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/where-to-start-with-it-consolidation/</loc>
		<lastmod>2020-04-29T01:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/sans-for610-reverse-engineering-malware-now-with-ghidra/</loc>
		<lastmod>2020-04-29T04:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bitglass-adds-south-america-edge-data-centers/</loc>
		<lastmod>2020-04-29T04:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cloud-under-pressure-keeping-aws-projects-secure/</loc>
		<lastmod>2020-04-29T04:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/que-es-scm-gestion-de-configuraciones-de-seguridad/</loc>
		<lastmod>2020-04-29T04:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/about/</loc>
		<lastmod>2020-04-29T05:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/over-20k-dead-in-nyc-30-days-of-covid-19/</loc>
		<lastmod>2020-04-29T05:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/securing-critical-web-applications-for-business-continuity/</loc>
		<lastmod>2020-04-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-mitre-attck-framework-credential-access/</loc>
		<lastmod>2020-04-29T09:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/avast-supports-covid-19-response-initiatives-avast/</loc>
		<lastmod>2020-04-29T10:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/lack-of-basic-security-measures-on-sheffields-anpr-system-exposes-8-6-million-records-of-vehicle-movements-and-license-plate-numbers/</loc>
		<lastmod>2020-04-29T10:33:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/shade-ransomware-groups-shuts-down-operation-and-releases-decryption-keys/</loc>
		<lastmod>2020-04-29T11:25:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/new-tech-casbs-continue-evolving-to-help-cisos-address-multiplying-cloud-mobile-risks/</loc>
		<lastmod>2020-04-29T11:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/operational-order-and-agility-in-uncertain-times/</loc>
		<lastmod>2020-04-29T11:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/managedmethods-and-k12-technology-solutions-partner-to-bring-cybersecurity-student-safety-monitoring-to-k-12-school-districts/</loc>
		<lastmod>2020-04-29T12:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/why-digital-risk-is-more-than-a-margin-maker-for-cyber-channel-partners/</loc>
		<lastmod>2020-04-29T12:48:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bricata-network-security-platform-features-support-for-mitre-attck/</loc>
		<lastmod>2020-04-29T13:12:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/new-research-shows-20-spike-in-fraud-as-digital-behavior-shifts-amid-covid-19-pandemic/</loc>
		<lastmod>2020-04-29T13:19:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/gone-phishing-coronavirus-scams-in-action/</loc>
		<lastmod>2020-04-29T13:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/4-verticals-most-targeted-by-bad-bots/</loc>
		<lastmod>2020-04-29T13:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/dashboards-are-the-future-of-cybersecurity-reporting/</loc>
		<lastmod>2020-04-29T13:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/supreme-court-looks-at-computer-trespass-meaning/</loc>
		<lastmod>2020-04-30T06:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/DataPrivacy.jpg</image:loc>
			<image:title><![CDATA[DataPrivacy]]></image:title>
			<image:caption><![CDATA[trespass]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cloud-security-challenges-in-2020/</loc>
		<lastmod>2020-04-30T07:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Security-Response-Cloud.jpg</image:loc>
			<image:caption><![CDATA[Qualys cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/time-to-celebrate-a-sensational-year-of-the-zeronorth-brand-and-vulnerability-discovery-orchestration-and-give-back/</loc>
		<lastmod>2020-04-29T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/some-small-business-owners-expect-irs-and-who-to-send-them-emails-survey-reveals/</loc>
		<lastmod>2020-04-29T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/increased-credential-threats-in-the-age-of-uncertainty-2/</loc>
		<lastmod>2020-04-29T14:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/myth-busting-in-devsecops/</loc>
		<lastmod>2020-04-29T14:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/automating-to-prevent-security-misconfigurations-during-and-after-a-crisis/</loc>
		<lastmod>2020-04-29T14:59:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ransomware-payments-up-33-as-maze-and-sodinokibi-proliferate-in-q1-2020/</loc>
		<lastmod>2020-04-29T15:09:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/epic-games-stores-to-require-2fa-when-claiming-free-games/</loc>
		<lastmod>2020-04-29T15:23:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/two-european-usenet-providers-announce-data-breach-and-blame-anonymous-third-party-company/</loc>
		<lastmod>2020-04-29T15:37:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-make-your-wordpress-website-ccpa-compliant/</loc>
		<lastmod>2020-04-29T15:37:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-dustin-deckers-k-rail-a-tool-to-manage-k8s-securely-at-speed/</loc>
		<lastmod>2020-04-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/xkcd-coronavirus-genome-2/</loc>
		<lastmod>2020-04-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-brendan-oconnors-security-politics-neutrality-and-protecting-users/</loc>
		<lastmod>2020-04-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/create-better-user-experiences-by-applying-confirmation-and-authentication-in-the-right-places/</loc>
		<lastmod>2020-04-29T18:16:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/encrypted-file-system-efs-in-windows-10/</loc>
		<lastmod>2020-04-29T18:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/share-permissions-in-windows-10/</loc>
		<lastmod>2020-04-29T18:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/federated-learning/</loc>
		<lastmod>2020-04-29T18:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/spam-filtering/</loc>
		<lastmod>2020-04-29T18:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/free-online-cyber-security-training-courses-hands-on-training-practice-exams/</loc>
		<lastmod>2020-04-29T18:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ics-scada-social-engineering-attacks/</loc>
		<lastmod>2020-04-29T18:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-work-with-hr-or-recruiters-to-improve-your-cybersecurity-hiring-strategy/</loc>
		<lastmod>2020-04-29T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/overview-of-phishing-techniques-compromised-account/</loc>
		<lastmod>2020-04-29T18:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/israels-independence-day/</loc>
		<lastmod>2020-04-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/5-software-security-courses-to-boost-your-skills-even-under-isolation/</loc>
		<lastmod>2020-04-29T19:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/privacy-principles-in-tracking-apps/</loc>
		<lastmod>2020-04-29T19:42:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-complete-cyber-security-checklist-for-small-businesses/</loc>
		<lastmod>2020-04-29T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/kudos-to-the-unsung-heroes-in-our-current-times-software-developers/</loc>
		<lastmod>2020-04-29T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/video-iot-hacking-101-firmware-funhouse/</loc>
		<lastmod>2020-04-29T21:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/new-apt-report-the-unknown-knowns/</loc>
		<lastmod>2020-04-29T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/phishing-campaign-targets-poste-italiane-sms-otp-verification/</loc>
		<lastmod>2020-04-30T00:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/a-modern-day-love-story-devops-and-dataops/</loc>
		<lastmod>2020-04-30T03:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/national-poetry-month-cybersecurity-edition/</loc>
		<lastmod>2020-04-30T03:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-benefits-of-giving-up-a-little-control-over-cybersecurity/</loc>
		<lastmod>2020-04-30T04:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/ot-security-considerations-in-the-age-of-industry-4-0/</loc>
		<lastmod>2020-04-30T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/business-managed-it-maintenance-or-break-fix/</loc>
		<lastmod>2020-04-30T08:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/accelerating-safely-on-the-digital-highway/</loc>
		<lastmod>2020-04-30T08:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cybersecurity-incidents-up-23-after-covid-19-forced-businesses-to-switch-to-remote-work/</loc>
		<lastmod>2020-04-30T08:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/network-security-automation-to-manage-access-request-spikes-and-it-skills-shortages/</loc>
		<lastmod>2020-04-30T08:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/a-single-phishing-email-can-cost-a-small-business-100k-heres-how-to-protect-your-office-against-fraud/</loc>
		<lastmod>2020-04-30T09:49:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/best-practices-how-testing-for-known-memory-vulnerabilities-can-strengthen-devsecops/</loc>
		<lastmod>2020-04-30T10:42:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/monitoring-google-meet-in-remote-learning/</loc>
		<lastmod>2020-04-30T11:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/top-5-first-strategic-steps-for-a-new-ciso/</loc>
		<lastmod>2020-05-01T07:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto37220030.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37220030]]></image:title>
			<image:caption><![CDATA[CISO]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cto-perspective-machines-protecting-themselves-the-future-of-cybersecurity/</loc>
		<lastmod>2020-04-30T11:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-future-of-preventing-digital-fraud-and-improving-the-customer-experience/</loc>
		<lastmod>2020-04-30T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/treasure-trove-of-covid-19-protective-gear-and-medical-supplies-selling-on-dark-web-markets/</loc>
		<lastmod>2020-04-30T12:27:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/coronavirus-themed-threat-reports-havent-flattened-the-curve/</loc>
		<lastmod>2020-04-30T12:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/why-financial-industry-needs-an-identity-management-system-now-more-than-ever/</loc>
		<lastmod>2020-04-30T12:29:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bitdefender-identifies-tens-of-thousands-of-phishing-emails-targeting-south-african-customers/</loc>
		<lastmod>2020-04-30T12:47:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/fbi-warns-of-major-spike-in-cyber-attacks/</loc>
		<lastmod>2020-04-30T13:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/decipher-security-podcast-with-forallsecure-ceo-david-brumley-3/</loc>
		<lastmod>2020-04-30T14:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/endpoint-protection-in-cloudcare-now-available-for-mac-avast/</loc>
		<lastmod>2020-04-30T13:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-stop-and-prevent-ddos-attacks-on-your-website/</loc>
		<lastmod>2020-04-30T13:39:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/xmatters-achieves-iso-27001-certification-with-zero-nonconformities-leading-industry-in-incident-management-security-and-privacy-assurance/</loc>
		<lastmod>2020-04-30T13:48:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/5g-hype-vs-reality-what-are-the-real-problems-and-new-opportunities/</loc>
		<lastmod>2020-04-30T13:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/8-scary-statistics-about-the-password-reuse-problem/</loc>
		<lastmod>2020-04-30T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/cybercriminals-are-using-google-recaptcha-to-hide-their-phishing-attacks/</loc>
		<lastmod>2020-04-30T14:19:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-digital-resolve-platform/</loc>
		<lastmod>2020-04-30T14:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/twitter-users-say-goodbye-to-old-fashioned-sms-tweets/</loc>
		<lastmod>2020-04-30T15:03:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/securing-internet-videoconferencing-apps-zoom-and-others/</loc>
		<lastmod>2020-04-30T15:24:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/pirated-movies-are-used-to-distribute-malware/</loc>
		<lastmod>2020-04-30T15:29:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-cost-of-third-party-remote-access-noncompliance-hipaa-edition/</loc>
		<lastmod>2020-04-30T15:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/microsoft-365-hackers-steal-millions-from-3-private-equity-firms/</loc>
		<lastmod>2020-04-30T15:31:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/nexus-repository-a-strategic-guide-from-git-to-governance/</loc>
		<lastmod>2020-04-30T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-nishil-shahs-protecting-the-bridge-from-dollars-to-bitcoin-securing-coinbases-edge-payments-infrastructure/</loc>
		<lastmod>2020-04-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/why-email-needs-a-zero-trust-security-model/</loc>
		<lastmod>2020-04-30T16:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/wearedelphix-meet-pavan-parikh/</loc>
		<lastmod>2020-04-30T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-use-microsoft-edge-security-features/</loc>
		<lastmod>2020-04-30T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/mitre-attck-spotlight-process-injection/</loc>
		<lastmod>2020-04-30T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/overview-of-phishing-techniques-urgent-limited-supplies/</loc>
		<lastmod>2020-04-30T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-to-use-bitlocker-in-windows-10-with-or-without-tpm/</loc>
		<lastmod>2020-04-30T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/securing-shared-web-passwords-with-idaptive/</loc>
		<lastmod>2020-04-30T16:48:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/newly-discovered-android-malware-steals-banking-passwords-and-2fa-codes/</loc>
		<lastmod>2020-04-30T16:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/chegg-confirmed-data-breach-of-employee-records/</loc>
		<lastmod>2020-04-30T16:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-joy-of-tech-dont-squash-the-bug/</loc>
		<lastmod>2020-04-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/authentic8-launches-osint-academy/</loc>
		<lastmod>2020-04-30T17:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/webinars-open-source-security-remote-security-testing-secure-development/</loc>
		<lastmod>2020-04-30T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/resources-for-small-businesses/</loc>
		<lastmod>2020-04-30T17:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bsidessf-2020-claire-moynahans-developing-a-baseline-security-standard-for-endpoint-devices/</loc>
		<lastmod>2020-04-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-cybercriminals-are-weathering-covid-19/</loc>
		<lastmod>2020-04-30T18:20:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/work-from-home-amidst-covid-19-boost-your-home-office-avast/</loc>
		<lastmod>2020-04-30T19:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/security-frameworks-and-cis-controls-podcast/</loc>
		<lastmod>2020-04-30T20:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/diagnosing-your-cybersecurity-anxiety/</loc>
		<lastmod>2020-04-30T20:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/considerations-when-evaluating-dual-vendor-ddos-protection/</loc>
		<lastmod>2020-04-30T20:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/mitre-attck-evaluation-results-confirm-bitdefender-as-stellar-edr-vendor-perfect-fit-for-midsized-organisations-msps/</loc>
		<lastmod>2020-04-30T21:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/what-are-healthcares-biggest-cybersecurity-weak-spots/</loc>
		<lastmod>2020-04-30T21:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/traditional-appsec-code-halts-kill-devops-release-cycles/</loc>
		<lastmod>2020-04-30T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/byod-challenges-and-secure-messaging/</loc>
		<lastmod>2020-05-01T00:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/decipher-security-podcast-with-forallsecure-ceo-david-brumley/</loc>
		<lastmod>2020-05-01T01:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/scammers-using-covid-19-coronavirus-lure-to-target-medical-suppliers/</loc>
		<lastmod>2020-05-01T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fortinets-scalable-and-secure-teleworker-solution-in-aws/</loc>
		<lastmod>2020-05-01T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/phishers-increasingly-incorporating-recaptcha-api-into-campaigns/</loc>
		<lastmod>2020-05-01T11:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/me-on-covad-19-contact-tracing-apps/</loc>
		<lastmod>2020-05-01T12:21:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/pci-compliance-is-vital-to-the-economic-engine-of-the-world/</loc>
		<lastmod>2020-05-01T12:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/something-phishy-is-happening-phishing-scams-on-the-rise/</loc>
		<lastmod>2020-05-01T12:27:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/can-the-cco-and-ciso-work-in-harmony/</loc>
		<lastmod>2020-05-04T07:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/security-pros-pulling-double-it-duty-during-pandemic/</loc>
		<lastmod>2020-05-04T06:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Exposing.jpg</image:loc>
			<image:title><![CDATA[Exposing]]></image:title>
			<image:caption><![CDATA[PCI DSS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/pci-password-requirements-is-it-enough/</loc>
		<lastmod>2020-05-01T13:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-eventbot-malware-steals-banking-passwords-avast/</loc>
		<lastmod>2020-05-01T14:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/gdpr-fine-print-720000-euro-penalty-for-collecting-biometrics/</loc>
		<lastmod>2020-05-01T14:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/using-vendor-management-audit-checklists-to-identify-monitor-audit-vendors-on-your-network/</loc>
		<lastmod>2020-05-01T15:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/google-takeout-is-it-a-good-backup-option/</loc>
		<lastmod>2020-05-01T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cybersecurity-maturity-model-certification-starts-with-dfars-800-171/</loc>
		<lastmod>2020-05-01T15:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-mike-malones-if-youre-not-using-ssh-certificates-youre-doing-ssh-wrong/</loc>
		<lastmod>2020-05-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cequence-achieves-pci-dss-3-2-and-soc-2-compliance/</loc>
		<lastmod>2020-05-01T16:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/poetry-by-%d1%8folcats/</loc>
		<lastmod>2020-05-01T16:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/jake-likes-onions-ye-olde-passworde/</loc>
		<lastmod>2020-05-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/leadership-lessons-adapting-to-an-all-remote-workforce/</loc>
		<lastmod>2020-05-01T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-daniel-tobins-and-paul-karayans-from-cockroaches-to-marble-floors/</loc>
		<lastmod>2020-05-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/3-web-third-party-related-events-you-dont-want-to-miss-from-early-2020/</loc>
		<lastmod>2020-05-01T18:20:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/sql-injection-attack-what-it-is-how-to-protect-your-business/</loc>
		<lastmod>2020-05-01T18:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/synopsys-named-a-leader-in-the-2020-gartner-magic-quadrant-for-application-security-testing-for-the-4th-year/</loc>
		<lastmod>2020-05-01T18:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/sometimes-real-life-is-the-best-case-study-around/</loc>
		<lastmod>2020-05-01T18:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/contrast-security-named-a-visionary-in-the-2020-gartner-magic-quadrant-for-application-security-testing/</loc>
		<lastmod>2020-05-01T18:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/quibi-jetblue-others-leaked-millions-of-emails/</loc>
		<lastmod>2020-05-01T19:06:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/mailboxes-brigitte-werner-pixabay.jpg</image:loc>
			<image:title><![CDATA[mailboxes--brigitte-werner--pixabay]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-we-built-a-culture-on-trust-and-security/</loc>
		<lastmod>2020-05-01T19:19:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/remote-work-bad-cybersecurity-advice-galore/</loc>
		<lastmod>2020-05-01T19:47:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-will-trigger-faster-wider-adoption-of-cyber-hygiene-principles-avast/</loc>
		<lastmod>2020-05-01T20:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-phishing-update-scammers-impersonating-financial-institutions-on-instagram/</loc>
		<lastmod>2020-05-01T20:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-common-iam-solutions-for-identity-based-attacks-arent-really-working/</loc>
		<lastmod>2020-05-01T21:30:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cyber-security-roundup-for-may-2020/</loc>
		<lastmod>2020-05-01T22:13:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/shade-troldesh-ransomware-decryption-tool/</loc>
		<lastmod>2020-05-02T11:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/intel-bug-bounty-program-improves-security-and-drives-community-engagement/</loc>
		<lastmod>2020-05-02T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-amol-sarwates-real-time-vulnerability-alerting/</loc>
		<lastmod>2020-05-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-everyones-an-epidemiologist/</loc>
		<lastmod>2020-05-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-bryan-zimmers-so-youre-the-first-security-hire/</loc>
		<lastmod>2020-05-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/office-work-will-we-ever-go-back/</loc>
		<lastmod>2020-05-03T10:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-kelley-robinsons-2fa-in-2020-and-beyond/</loc>
		<lastmod>2020-05-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/robert-m-lees-jeff-haas-little-bobby-comics-week-275/</loc>
		<lastmod>2020-05-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/self-teaching-a-little-security-thinking/</loc>
		<lastmod>2020-05-03T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-or-katzs-creating-threat-intelligence-signals-in-a-zero-trust-environment/</loc>
		<lastmod>2020-05-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/more-covid-charity-scammers-hosted-by-shinjiru-technologies-as45839/</loc>
		<lastmod>2020-05-03T22:33:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/workplace-surveillance-apple-and-google-contact-tracing-tech-virtual-cybersecurity-conferences/</loc>
		<lastmod>2020-05-04T04:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bitglass-adds-apac-local-edge-data-centers/</loc>
		<lastmod>2020-05-04T04:28:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/is-cyber-bullying-just-kids-being-mean-on-social-media-or-is-there-more-to-it/</loc>
		<lastmod>2020-05-04T05:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fortinet-enables-leading-precision-machining-company-to-quickly-adapt-to-covid-19/</loc>
		<lastmod>2020-05-04T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-scam-roundup-may-4-2020/</loc>
		<lastmod>2020-05-04T08:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/surveillance-privacy-and-trust/</loc>
		<lastmod>2020-05-04T10:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/moving-beyond-ot-asset-visibility-the-path-to-proactive-cybersecurity/</loc>
		<lastmod>2020-05-04T10:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/android-slocker-variant-uses-coronavirus-scare-to-take-android-hostage/</loc>
		<lastmod>2020-05-04T10:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/manufacturing-also-faces-remote-working-security-risks/</loc>
		<lastmod>2020-05-05T06:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Manufacturing-Cybercriminals-1.jpg</image:loc>
			<image:caption><![CDATA[manufacturing remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/3-lessons-learned-from-managing-a-remote-workforce-during-covid-19/</loc>
		<lastmod>2020-05-05T07:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Skills-Gap-Security.jpg</image:loc>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-healthcare-legislation-striking-a-balance-between-privacy-and-convenience/</loc>
		<lastmod>2020-05-04T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/insight-5-4-2020-confessions/</loc>
		<lastmod>2020-05-04T12:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ddos-attack-stats-accelerate-in-quarantine-era/</loc>
		<lastmod>2020-05-04T13:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/sitelock-expands-product-offering-with-new-security-awareness-training-phishing-simulation/</loc>
		<lastmod>2020-05-04T14:32:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/future-proofing-your-appsec-with-veracode-saas-solutions/</loc>
		<lastmod>2020-05-04T14:38:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/privacy-issues-in-australias-skillselect-platform-may-have-exposed-personal-information-of-700000-aspiring-migrants/</loc>
		<lastmod>2020-05-04T14:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/checkmarx-named-a-leader-in-the-2020-gartner-magic-quadrant-for-application-security-testing/</loc>
		<lastmod>2020-05-04T14:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/increase-in-ransomware-demand-amounts-driven-by-ryuk-sodinokibi/</loc>
		<lastmod>2020-05-04T14:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/web-server-protection-web-server-security-monitoring/</loc>
		<lastmod>2020-05-04T15:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-business-value-of-the-comptia-casp-employee-certification/</loc>
		<lastmod>2020-05-04T15:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/microsoft-teams-phishing-attack-wants-your-office-365-credentials/</loc>
		<lastmod>2020-05-04T15:49:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-tanya-jancas-security-learns-to-sprint-devsecops/</loc>
		<lastmod>2020-05-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/escape-from-the-maze/</loc>
		<lastmod>2020-05-04T16:10:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/compliance-for-third-party-scripts-on-your-website-and-how-to-ensure-it/</loc>
		<lastmod>2020-05-04T16:12:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/making-connections-to-sustainable-action-during-a-pandemic/</loc>
		<lastmod>2020-05-04T16:52:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-turtle-sandwich-standard-model/</loc>
		<lastmod>2020-05-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/devsecops-leaders-the-conversation-continues-online-may-7th/</loc>
		<lastmod>2020-05-04T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/3-ways-that-appsec-training-benefits-your-long-term-security-strategy/</loc>
		<lastmod>2020-05-04T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-clint-giblers-how-to-10x-your-companys-security-without-a-series-d/</loc>
		<lastmod>2020-05-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/top-cyber-security-risks-in-healthcare/</loc>
		<lastmod>2020-05-04T18:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-caused-the-sba-flaw-that-exposed-business-owners-personal-info/</loc>
		<lastmod>2020-05-04T20:37:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/now-is-the-time-for-government-agencies-to-up-their-appsec-game/</loc>
		<lastmod>2020-05-04T20:48:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/security-validation-controls-5-key-steps-to-take-now-by-brian-contos/</loc>
		<lastmod>2020-05-04T20:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/data-security-and-threat-models/</loc>
		<lastmod>2020-05-04T21:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/guide-21-osint-tools-for-threat-intelligence/</loc>
		<lastmod>2020-05-04T21:40:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/instructor-spotlight-jonathan-risto-mgt516-co-author/</loc>
		<lastmod>2020-05-04T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/newsbites-drilldown-for-the-week-ending-31-april-2020/</loc>
		<lastmod>2020-05-04T22:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/sans-live-online-vs-ondemand-which-one-is-right-for-you/</loc>
		<lastmod>2020-05-04T22:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-ultimate-list-of-sans-cheat-sheets/</loc>
		<lastmod>2020-05-04T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/labs-notes-monthly-recap-april-2020/</loc>
		<lastmod>2020-05-04T23:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/patch-management-policies-processes-avast/</loc>
		<lastmod>2020-05-04T23:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/podcast-episode-6-taking-over-iot-devices-with-mqtt/</loc>
		<lastmod>2020-05-05T03:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fortiguard-labs-discovers-multiple-critical-vulnerabilities-in-adobe-illustrator-cc-2020/</loc>
		<lastmod>2020-05-05T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/working-from-home-heres-top-6-security-tips-for-working-remotely/</loc>
		<lastmod>2020-05-05T08:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/pci-pal-shortlisted-for-omnichannel-solution-of-the-year/</loc>
		<lastmod>2020-05-05T08:20:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-many-ways-your-employees-can-get-hacked-while-working-from-home-and-how-to-respond/</loc>
		<lastmod>2020-05-05T10:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/malware-in-google-apps/</loc>
		<lastmod>2020-05-05T11:03:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/securing-the-new-digital-reality/</loc>
		<lastmod>2020-05-05T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-economic-shutdowns-impact-on-security-budgets/</loc>
		<lastmod>2020-05-06T06:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/AI-ML-Security.jpg</image:loc>
			<image:title><![CDATA[AI-ML-Security]]></image:title>
			<image:caption><![CDATA[budget]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/managedmethods-launches-google-meet-chat-monitoring-and-reporting-to-protect-k-12-school-districts-from-remote-learning-cybersecurity-student-safety-risks/</loc>
		<lastmod>2020-05-05T12:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/helping-your-people-to-safely-work-from-home-with-rel-id-wfh/</loc>
		<lastmod>2020-05-05T12:47:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/whitehat-security-named-a-leader-in-the-2020-gartner-magic-quadrant-for-application-security-testing/</loc>
		<lastmod>2020-05-05T12:49:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/digital-fraudsters-masquerading-as-finra-in-phishing-emails/</loc>
		<lastmod>2020-05-05T12:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/credential-stuffing-attack-prevention-and-mitigation/</loc>
		<lastmod>2020-05-05T13:03:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/blueliv-als-finalist-bei-den-git-security-awards-2020-ausgezeichnet/</loc>
		<lastmod>2020-05-05T13:06:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/enhancing-customer-experience-in-retail-industry/</loc>
		<lastmod>2020-05-05T13:16:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/2nd-watch-launches-devsecops-assessment-and-strategy-service/</loc>
		<lastmod>2020-05-05T13:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/securing-the-public-cloud-when-your-workforce-is-remote/</loc>
		<lastmod>2020-05-05T13:28:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/identity-and-access-management-has-a-password-problem/</loc>
		<lastmod>2020-05-05T13:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tesla-data-leak-pre-owned-vehicle-infotainment-components-store-owners-personal-details-and-passwords/</loc>
		<lastmod>2020-05-05T13:45:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/now-available-mandiant-security-effectiveness-report-2020-by-tracey-moon/</loc>
		<lastmod>2020-05-05T13:59:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/an-inside-look-at-a-week-in-the-life-of-a-social-engineer/</loc>
		<lastmod>2020-05-05T15:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cam4-data-leak-exposes-personal-data-of-millions-of-users/</loc>
		<lastmod>2020-05-05T15:06:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-trickbot-campaign-uses-fake-emails-from-u-s-department-of-labor/</loc>
		<lastmod>2020-05-05T15:11:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/global-cloud-proxies-are-essential-to-the-future-of-remote-work-says-gartner/</loc>
		<lastmod>2020-05-05T15:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/comforte-ag-wins-best-cyber-security-company-of-the-year-2020/</loc>
		<lastmod>2020-05-05T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/3-emerging-remote-security-use-cases-addressable-with-soar-playbooks/</loc>
		<lastmod>2020-05-05T15:37:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/eliminate-threats-to-your-domain-with-a-registry-lock/</loc>
		<lastmod>2020-05-05T15:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cybersecurity-manager-certifications-compared-cipm-vs-cism-vs-gslc-vs-cissp/</loc>
		<lastmod>2020-05-05T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/webinar-summary-digital-forensics-and-incident-response-is-it-the-career-for-you/</loc>
		<lastmod>2020-05-05T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-rafae-bhattis-when-gdpr-and-ccpa-strike/</loc>
		<lastmod>2020-05-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/wir-wissen-wohl-was-pki-ist-aber-wissen-wir-auch-was-es-werden-kann/</loc>
		<lastmod>2020-05-05T16:04:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/wii-n64-and-gamecube-source-codes-leak-online/</loc>
		<lastmod>2020-05-05T16:17:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/its-time-to-broaden-the-definition-of-a-vulnerability/</loc>
		<lastmod>2020-05-05T16:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/enhancing-customer-experience-in-retail-industry-2/</loc>
		<lastmod>2020-05-05T16:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/eidas-vertrauen-schaffen-bei-digitalen-signaturen/</loc>
		<lastmod>2020-05-05T16:57:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-joy-of-tech-pandemic-mental-checklist/</loc>
		<lastmod>2020-05-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-phishing-update-money-mule-scams-use-remote-opportunities-to-entice-victims/</loc>
		<lastmod>2020-05-05T17:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/avast-unveils-global-format-for-cybersecai-connected-2020-conference-avast/</loc>
		<lastmod>2020-05-05T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-manage-tech-due-diligence-from-a-social-distance/</loc>
		<lastmod>2020-05-05T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-alethe-denis-phishy-little-liars-pretexts-that-kill/</loc>
		<lastmod>2020-05-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-linux-foundation-takes-on-digital-trust-with-toip-foundation/</loc>
		<lastmod>2020-05-05T18:39:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Container-Security-Whitesource.jpg</image:loc>
			<image:caption><![CDATA[wfh]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/rangeforce-and-fortiphyd-logic-partner-to-boost-the-cybersecurity-skills-of-industrial-control-systems-operators/</loc>
		<lastmod>2020-05-05T19:12:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/dont-shoot-the-messenger-securing-communication-apps/</loc>
		<lastmod>2020-05-05T19:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/security-experts-give-thoughts-on-iloveyou-virus-20-years-later-avast/</loc>
		<lastmod>2020-05-05T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/defending-against-the-new-reality-of-fileless-malware-attacks/</loc>
		<lastmod>2020-05-05T20:09:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/u-s-officials-anticipate-rise-in-bec-scams-against-businesses-seeking-economic-relief/</loc>
		<lastmod>2020-05-05T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/are-you-teleworking-now-watch-out-cybersecurity-risks-are-everywhere/</loc>
		<lastmod>2020-05-05T21:40:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/reduce-risk-with-cyberark-and-rapid7-integrations/</loc>
		<lastmod>2020-05-05T21:50:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/access-control-uma-and-everyday-experiences/</loc>
		<lastmod>2020-05-05T22:47:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/secure-remote-work-for-contractors/</loc>
		<lastmod>2020-05-06T01:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/top-tips-for-world-password-day-2020/</loc>
		<lastmod>2020-05-06T05:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-cybersecurity-training-is-more-important-than-ever/</loc>
		<lastmod>2020-05-06T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/expect-more-from-your-network-firewall-the-fortigate-4200f/</loc>
		<lastmod>2020-05-06T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/wp-2fa-1-2-multisite-networks-support-configurable-email-notifications-templates-other-updates/</loc>
		<lastmod>2020-05-06T07:10:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/banking-and-finance-amid-lockdowns-how-eidas-e-signatures-are-helping-to-keep-it-going/</loc>
		<lastmod>2020-05-06T07:20:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-mitre-attck-framework-discovery/</loc>
		<lastmod>2020-05-06T07:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/world-password-day-using-a-passphrase-to-strengthen-your-security/</loc>
		<lastmod>2020-05-06T07:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/getting-zoom-security-right-8-tips-for-family-and-friends/</loc>
		<lastmod>2020-05-06T07:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/maze-ransomware-targets-the-hospitals-and-labs-fighting-coronavirus/</loc>
		<lastmod>2020-05-06T07:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/real-time-visibility-into-access-risks-continuously-reduces-the-attack-surface/</loc>
		<lastmod>2020-05-06T10:12:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/wfh-challenges-got-you-down-pci-pals-rapid-remote-helps-contact-centres-navigate-the-new-normal/</loc>
		<lastmod>2020-05-06T11:07:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/average-enterprise-ransomware-payments-surge-33-in-first-quarter/</loc>
		<lastmod>2020-05-06T11:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/who-is-responsible-for-securing-telemedicine/</loc>
		<lastmod>2020-05-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/thinking-beyond-cybersecurity-vulnerability-assessments-whats-next/</loc>
		<lastmod>2020-05-06T12:36:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/demystifying-a-docker-iamge/</loc>
		<lastmod>2020-05-06T13:53:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cyber-security-trends-in-times-of-crisis/</loc>
		<lastmod>2020-05-06T12:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/phishing-simulations-in-5-easy-steps-free-phishing-training-kit/</loc>
		<lastmod>2020-05-06T12:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/europes-largest-private-hospital-operator-fresenius-hit-by-ransomware/</loc>
		<lastmod>2020-05-06T13:20:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/extrahop-data-shows-shifts-in-iot-device-usage-during-covid-19-have-broad-security-implications/</loc>
		<lastmod>2020-05-06T13:29:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ntt-west-chooses-fortinet-secure-sd-wan-and-sd-branch-to-deliver-security-driven-networking-services/</loc>
		<lastmod>2020-05-06T13:33:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/5-lessons-on-cybersecurity-and-covid-the-best-laid-plans/</loc>
		<lastmod>2020-05-07T06:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/canstockphoto79603571.jpg</image:loc>
			<image:title><![CDATA[canstockphoto79603571]]></image:title>
			<image:caption><![CDATA[cybersecurity COVID]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/steal-data-through-sound-sans-speaker/</loc>
		<lastmod>2020-05-06T13:44:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/sonic-phil-kallahar-pexels.jpg</image:loc>
			<image:title><![CDATA[sonic--phil-kallahar--pexels]]></image:title>
			<image:caption><![CDATA[data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/86-of-u-s-and-european-companies-suffer-network-security-disruptions-amid-work-from-home-switch/</loc>
		<lastmod>2020-05-06T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/census-security-how-protecting-complex-cloud-systems-aids-in-accuracy/</loc>
		<lastmod>2020-05-07T07:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/MA-Cybersecurity-Marriott.jpg</image:loc>
			<image:title><![CDATA[MA-Cybersecurity-Marriott]]></image:title>
			<image:caption><![CDATA[census]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/multi-stage-phishing-attacks-launch-local-files-to-evade-existing-security/</loc>
		<lastmod>2020-05-06T14:10:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-state-of-xops-report-reveals-it-and-infosec-alignment-increases-it-security-confidence-by-three-times/</loc>
		<lastmod>2020-05-06T14:38:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/top-6-malware-strains-to-watch-out-for-in-2020/</loc>
		<lastmod>2020-05-06T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/2020-nist-ransomware-recovery-guide-what-you-need-to-know/</loc>
		<lastmod>2020-05-06T14:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tales-from-the-front-lines-why-simple-attacks-like-content-scraping-are-the-hardest-to-block/</loc>
		<lastmod>2020-05-06T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/nexus-intelligence-insights-xlsx-aka-sheetjs-regular-expression-denial-of-service-redos-and-sonatype-2018-0622/</loc>
		<lastmod>2020-05-06T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/us-and-uk-cyber-security-agencies-warn-of-apt-attacks-against-healthcare-organizations/</loc>
		<lastmod>2020-05-06T15:54:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/imperva-poised-to-deliver-its-leading-advanced-bot-protection-and-network-security-in-india/</loc>
		<lastmod>2020-05-06T15:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-chlo-messdaghis-ryan-louie-md-phds-susan-peediyakkals-panel-mental-health-for-hackers-contents-under-pressure/</loc>
		<lastmod>2020-05-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-adventures-of-microservice-the-sabotage/</loc>
		<lastmod>2020-05-06T16:08:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/ms-01-05-dh.jpg</image:loc>
			<image:caption><![CDATA[Sabotage]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-adventures-of-microservice-pandemonium/</loc>
		<lastmod>2020-05-11T06:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/ms-01-06-dh.jpg</image:loc>
			<image:caption><![CDATA[Pandemonium]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-adventures-of-microservice-disaster-recovery/</loc>
		<lastmod>2020-05-18T06:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/ms-01-07-dh.jpg</image:loc>
			<image:caption><![CDATA[Disaster Recovery]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-adventures-of-microservice-access-control/</loc>
		<lastmod>2020-05-25T06:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/ms-01-08-dh.jpg</image:loc>
			<image:caption><![CDATA[Access Control]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-adventures-of-microservice-risk-mitigation/</loc>
		<lastmod>2020-06-01T06:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/ms-01-09-dh.jpg</image:loc>
			<image:caption><![CDATA[Risk Mitigation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-adventures-of-microservice-risk-mitigation-2/</loc>
		<lastmod>2020-06-08T06:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/ms-01-10-dh.jpg</image:loc>
			<image:caption><![CDATA[death-to-the-machine]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/maintaining-mental-health-while-working-from-home/</loc>
		<lastmod>2020-05-06T16:36:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/show-how-much-you-miss-the-soc-with-our-custom-zoom-background/</loc>
		<lastmod>2020-05-06T16:42:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/phishing-campaign-targets-finra-in-search-for-microsoft-office-or-sharepoint-credentials/</loc>
		<lastmod>2020-05-06T16:55:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-2020-google-trends/</loc>
		<lastmod>2020-05-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/carpe-diem-using-your-downtime-to-prevent-downtime/</loc>
		<lastmod>2020-05-06T17:34:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/carpe-diem/</loc>
		<lastmod>2020-05-06T17:34:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/avast-joins-prpl-foundation-avast/</loc>
		<lastmod>2020-05-06T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-brianne-hughes-how-to-write-like-its-your-job/</loc>
		<lastmod>2020-05-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/enabling-cyber-resilience-during-covid-19-crisis/</loc>
		<lastmod>2020-05-06T18:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/remote-workforce-solutions-for-all-seasons-and-sizes/</loc>
		<lastmod>2020-05-06T18:07:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fueling-groundbreaking-innovation-across-the-digital-identity-landscape/</loc>
		<lastmod>2020-05-06T18:18:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xiaomi-u-turn-admits-sending-private-data-it-said-it-didnt/</loc>
		<lastmod>2020-05-06T18:21:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/xiaomi-spyware-partydoos-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[xiaomi-spyware--partydoos--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Xiaomi]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/verodin-reveals-top-trends-that-will-shape-the-cybersecurity-industry-in-2020-by-tracey-moon/</loc>
		<lastmod>2020-05-06T18:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-modern-cisos-demand-for-cybersecurity-rationalization-by-brian-contos/</loc>
		<lastmod>2020-05-06T18:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/validating-patient-safety-with-security-instrumentation-by-robert-potter/</loc>
		<lastmod>2020-05-06T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/global-headquarters-in-tyson-is-now-open-by-brian-contos/</loc>
		<lastmod>2020-05-06T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cyber-risk-and-security-effectiveness-in-the-digital-age-by-major-general-earl-matthews-usaf-ret/</loc>
		<lastmod>2020-05-06T18:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/verodin-celebrates-women-in-cybersecurity-with-new-podcast-series-by-brian-contos/</loc>
		<lastmod>2020-05-06T18:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/women-in-cyber-series-day-in-the-life-of-a-threat-research-analyst-by-ursula-cowan/</loc>
		<lastmod>2020-05-06T18:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/2020-mandiant-security-effectiveness-report-a-deep-dive-into-cyber-reality-by-tracey-moon/</loc>
		<lastmod>2020-05-06T18:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/enterprise-application-access-increases-security-for-your-enterprise-applications-and-the-data-behind-them/</loc>
		<lastmod>2020-05-06T18:45:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/shiftleft-scan-%e2%9d%a4%ef%b8%8f-github/</loc>
		<lastmod>2020-05-06T19:02:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/3-ways-to-boost-your-security-with-role-based-security-compliance-training/</loc>
		<lastmod>2020-05-06T20:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/demystifying-a-docker-image/</loc>
		<lastmod>2020-05-06T23:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-it-takes-to-be-named-one-of-inc-magazines-best-workplaces-in-2020/</loc>
		<lastmod>2020-05-07T00:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/votes-increase-for-election-security-with-multifactor-authentication/</loc>
		<lastmod>2020-05-07T03:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/online-fraud-prevention-for-nonprofits/</loc>
		<lastmod>2020-05-07T03:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/android-campaign-from-known-oceanlotus-apt-group-potentially-older-than-estimated-abused-legitimate-certificate/</loc>
		<lastmod>2020-05-07T05:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fortinet-addresses-customers-network-and-application-security-needs-with-a-dynamic-cloud-solution/</loc>
		<lastmod>2020-05-07T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ensuring-strong-cyber-hygiene-on-world-password-day/</loc>
		<lastmod>2020-05-07T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-election-is-six-months-away-now-is-the-time-to-instrument-election-infrastructure/</loc>
		<lastmod>2020-05-07T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/5-tips-to-help-retailers-successfully-transition-to-e-commerce-during-covid-19/</loc>
		<lastmod>2020-05-07T08:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xdr-the-cybersecurity-x-factor-3/</loc>
		<lastmod>2020-05-07T09:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/gogoogle-decryption-tool/</loc>
		<lastmod>2020-05-07T09:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/is-it-the-end-for-passwords-avast/</loc>
		<lastmod>2020-05-07T09:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xdr-the-cybersecurity-x-factor-2/</loc>
		<lastmod>2020-05-07T09:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/quarantine-monitoring-china-throws-privacy-out-the-door/</loc>
		<lastmod>2020-05-08T06:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Security-Awareness-Officer-Role.jpg</image:loc>
			<image:title><![CDATA[camera]]></image:title>
			<image:caption><![CDATA[AI surveillance]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/China-Video-Monitoring-COVID.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-importance-of-placing-in-the-race-to-root/</loc>
		<lastmod>2020-05-07T10:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/google-meet-best-practices-for-remote-learning-admins/</loc>
		<lastmod>2020-05-07T11:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/spike-in-snake-ransomware-activity-attributed-to-new-campaign/</loc>
		<lastmod>2020-05-07T11:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tripwire-patch-priority-index-for-april-2020/</loc>
		<lastmod>2020-05-07T11:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ransomware-operators-hit-major-healthcare-supplier-in-europe-as-covid-19-continues-to-take-lives/</loc>
		<lastmod>2020-05-07T11:29:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/windows-file-auditing-log-and-more-with-fileaudit/</loc>
		<lastmod>2020-05-07T11:59:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/solving-the-compromised-credentials-conundrum/</loc>
		<lastmod>2020-05-07T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/world-password-day-time-to-prioritize-passwords/</loc>
		<lastmod>2020-05-07T12:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/top-5-tactical-steps-for-a-new-ciso/</loc>
		<lastmod>2020-05-08T07:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Low-Priority.jpg</image:loc>
			<image:title><![CDATA[Security-Low-Priority]]></image:title>
			<image:caption><![CDATA[tactical CISO]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/presidential-executive-order-impacts-u-s-power-system-ot-iot-security/</loc>
		<lastmod>2020-05-07T13:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-turn-your-it-team-into-a-security-team/</loc>
		<lastmod>2020-05-07T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/starslord-2-0-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-05-07T14:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/whos-viktor-tracking-down-the-xtc-polaris-botnets/</loc>
		<lastmod>2020-05-07T14:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/securing-remote-work-pt-1-web-traffic-swg-a-smarter-digital-edge/</loc>
		<lastmod>2020-05-07T14:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hmrc-removes-292-covid-19-phishing-websites-in-less-than-2-months/</loc>
		<lastmod>2020-05-07T14:33:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tech-support-scam-uses-child-porn-warning/</loc>
		<lastmod>2020-05-07T14:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/battling-payments-fraud-know-your-enemy/</loc>
		<lastmod>2020-05-07T14:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Breach-Incidents-2019.jpg</image:loc>
			<image:title><![CDATA[ransomware]]></image:title>
			<image:caption><![CDATA[Egregor]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ios-xml-bug/</loc>
		<lastmod>2020-05-07T14:56:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/5-ways-to-strengthen-your-password/</loc>
		<lastmod>2020-05-07T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/5-ways-to-strengthen-your-password-2/</loc>
		<lastmod>2020-05-07T15:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/podcast-shiftleft-at-emirates-group%e2%80%8a-%e2%80%8aa-conversation-with-toufiq-ali/</loc>
		<lastmod>2020-05-07T15:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/for-six-years-samsung-smartphone-users-have-been-at-risk-from-critical-security-bug-patch-now/</loc>
		<lastmod>2020-05-07T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/attackers-try-to-deploy-remcos-malware-with-covid-19-related-messages/</loc>
		<lastmod>2020-05-07T15:59:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-jacob-bracketts-business-exploiting-medical-information-systems/</loc>
		<lastmod>2020-05-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-kaiji-botnet-malware-targets-iot-but-new-doesnt-mean-undetectable/</loc>
		<lastmod>2020-05-07T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/as-cyberattacks-continue-to-rise-half-of-organizations-claim-their-security-professionals-are-able-to-tackle-them/</loc>
		<lastmod>2020-05-07T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-emerging-threats-outwit-existing-endpoint-security/</loc>
		<lastmod>2020-05-07T16:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-uncertainties-fuel-ransomware-attacks-and-phishing-schemes/</loc>
		<lastmod>2020-05-07T16:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-error-types/</loc>
		<lastmod>2020-05-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/world-password-day-i-hate-my-paswrd/</loc>
		<lastmod>2020-05-07T17:59:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/IAM-Solution-Organization.jpg</image:loc>
			<image:caption><![CDATA[passwords]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-sourya-biswas-east-vs-west-how-the-coasts-approach-information-security-differently/</loc>
		<lastmod>2020-05-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/recommended-application-security-testing-ast-techniques/</loc>
		<lastmod>2020-05-07T18:19:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/can-i-use-the-okta-radius-agent-for-my-wi-fi/</loc>
		<lastmod>2020-05-07T19:16:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/5-ciso-priorities-during-the-covid-19-response/</loc>
		<lastmod>2020-05-07T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/solving-the-data-challenge-is-the-answer-to-educations-innovation-test/</loc>
		<lastmod>2020-05-07T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/can-i-use-passpoint-with-g-suite/</loc>
		<lastmod>2020-05-07T19:34:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/three-ways-url-analysis-and-enrichment-can-elevate-todays-soar-solutions/</loc>
		<lastmod>2020-05-07T19:50:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/zero-trust-inbox-security-with-valimail-defend/</loc>
		<lastmod>2020-05-07T19:57:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/breached-organization-uses-network-insight-to-pinpoint-source-of-infection/</loc>
		<lastmod>2020-05-07T19:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/six-memorable-sessions-with-government-devsecop-leaders-what-we-learned/</loc>
		<lastmod>2020-05-07T20:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/whats-next-for-media-companies-in-2020/</loc>
		<lastmod>2020-05-07T21:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/need-help-auditing-for-compromised-passwords/</loc>
		<lastmod>2020-05-07T21:01:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-best-way-to-manage-microsoft-certificates/</loc>
		<lastmod>2020-05-07T21:30:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/3-unorthodox-ways-to-further-protect-your-digital-accounts-from-fraud/</loc>
		<lastmod>2020-05-07T21:43:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/complete-guide-to-certificate-authorities/</loc>
		<lastmod>2020-05-07T21:49:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-drupal-website-security-best-practices-guide/</loc>
		<lastmod>2020-05-07T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/your-questions-answered-manufacturing-and-iot-device-security/</loc>
		<lastmod>2020-05-07T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/5-signs-to-replace-your-security-technology/</loc>
		<lastmod>2020-05-07T22:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/can-i-use-passpoint-with-microsoft-azure/</loc>
		<lastmod>2020-05-07T23:02:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/4-reasons-why-confusing-appsec-with-infosec-is-a-big-mistake/</loc>
		<lastmod>2020-05-07T23:28:36+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->