<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2020/05/its-isolation-tim-but-not-as-we-know-it/</loc>
		<lastmod>2020-05-08T00:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/employee-spotlight-lee-isenman/</loc>
		<lastmod>2020-05-08T01:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/improving-security-posture-the-easy-way/</loc>
		<lastmod>2020-05-08T01:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/nra-supports-governors-capitol-building-gun-ban/</loc>
		<lastmod>2020-05-08T02:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-is-the-average-cost-of-a-data-breach-highlights-from-fortinets-executive-cyber-exchange-series/</loc>
		<lastmod>2020-05-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/it-and-security-teams-adjust-to-new-normal-of-covid-19-quarantine/</loc>
		<lastmod>2020-05-08T07:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/escape-from-the-maze-part-2/</loc>
		<lastmod>2020-05-08T09:27:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/time-to-see-it-with-your-own-eyes/</loc>
		<lastmod>2020-05-08T09:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/godaddy-data-breach-affects-28000-user-accounts/</loc>
		<lastmod>2020-05-08T11:43:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/meant-to-combat-id-theft-unemployment-benefits-letter-prompts-id-theft-worries/</loc>
		<lastmod>2020-05-08T12:19:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hackers-dont-break-in-they-log-in/</loc>
		<lastmod>2020-05-08T12:37:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/a-brief-summary-of-nist-password-guidelines/</loc>
		<lastmod>2020-05-08T12:53:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/disney-insisting-on-hashtag-contract/</loc>
		<lastmod>2020-05-11T06:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Breach-Disclosure-Laws.jpg</image:loc>
			<image:title><![CDATA[Breach-Disclosure-Laws]]></image:title>
			<image:caption><![CDATA[Disney contract]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/iot-security-sen-warners-letter-to-iot-manufacturers/</loc>
		<lastmod>2020-05-11T07:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Vulnerable-IoT.jpg</image:loc>
			<image:title><![CDATA[Vulnerable-IoT]]></image:title>
			<image:caption><![CDATA[IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/kuppingercole-analysts-name-cyberark-the-one-to-beat-in-privileged-access-management/</loc>
		<lastmod>2020-05-08T13:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/privatevpn-and-betternet-apps-vulnerability-let-attackers-send-malicious-updates/</loc>
		<lastmod>2020-05-08T13:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/evaluating-and-selecting-appsec-vendors-to-fit-your-business-needs/</loc>
		<lastmod>2020-05-08T13:45:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/wechat-is-surveilling-international-user-files-to-strengthen-chinas-national-censorship-model/</loc>
		<lastmod>2020-05-08T14:15:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/devsecops-delivered-automated-github-pull-requests/</loc>
		<lastmod>2020-05-08T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/malvertising-attackers-target-900000-wordpress-sites-avast/</loc>
		<lastmod>2020-05-08T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-yu-jye-tungs-an-effective-approach-to-software-obfuscation/</loc>
		<lastmod>2020-05-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tiny-coppa-case-provides-broad-guidance/</loc>
		<lastmod>2020-05-08T16:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/are-we-ready-for-cloud-workspaces/</loc>
		<lastmod>2020-05-08T16:19:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bad-bots-vs-seo-where-security-and-marketing-collide/</loc>
		<lastmod>2020-05-08T16:50:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/establishing-a-culture-of-closure/</loc>
		<lastmod>2020-05-08T16:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-joy-of-tech-support-group-for-writers-of-end-user-licensing-agreements-2/</loc>
		<lastmod>2020-05-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-is-privileged-access-management-pam-2/</loc>
		<lastmod>2020-05-08T17:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/webinars-tools-to-enable-developers-open-source-risk-in-ma/</loc>
		<lastmod>2020-05-08T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/employees-share-an-average-of-8-passwords-between-personal-and-work-accounts-survey-shows/</loc>
		<lastmod>2020-05-08T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidessf-2020-reed-lodens-closing-ceremony/</loc>
		<lastmod>2020-05-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cloud-series-authorize-anyone-anything-with-macaroons/</loc>
		<lastmod>2020-05-08T18:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-phishing-update-bec-lures-use-pandemic-to-enhance-attacks/</loc>
		<lastmod>2020-05-08T18:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/integrating-the-ambassador-edge-stack-with-the-signal-sciences-web-application-firewall/</loc>
		<lastmod>2020-05-08T19:53:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/nist-introduces-framework-for-secure-software-development/</loc>
		<lastmod>2020-05-08T20:22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/great-minds-think-alike-aligning-security-with-business-priorities/</loc>
		<lastmod>2020-05-08T20:55:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/book-review-cybersecurity-attack-and-defense-strategies/</loc>
		<lastmod>2020-05-08T20:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/office-work-will-we-ever-go-back-2/</loc>
		<lastmod>2020-05-08T20:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-email-threat-avast/</loc>
		<lastmod>2020-05-08T22:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/working-windows-hello-for-business-yubikey-login/</loc>
		<lastmod>2020-05-08T23:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/orca-security-raises-20m-to-secure-cloud-platforms/</loc>
		<lastmod>2020-05-09T15:30:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Netography-Leverages-Software.jpg</image:loc>
			<image:title><![CDATA[Netography-Leverages-Software]]></image:title>
			<image:caption><![CDATA[f5]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/Orca-Dashboard_main-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/zero-day-vulnerabilities-and-the-visibility-gap-challenge-during-mass-remote-work/</loc>
		<lastmod>2020-05-09T15:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-nova-2020-matt-edmondsons-weaponizing-the-deep-web/</loc>
		<lastmod>2020-05-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-preprint/</loc>
		<lastmod>2020-05-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-nova-2020-josh-kamdjous-voight-kampff-for-email-addresses/</loc>
		<lastmod>2020-05-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/3-2-1-backup-rule-the-rule-of-thumb-to-solve-your-data-loss-problems/</loc>
		<lastmod>2020-05-09T18:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/emailrep-squeezing-actionable-info-from-malicious-email-addresses/</loc>
		<lastmod>2020-05-10T14:48:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-nova-2020-jake-williams-cybersecurity-merger-and-acquisition-due-diligence/</loc>
		<lastmod>2020-05-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/coronavirus-lessons-to-help-fight-cyber-crime/</loc>
		<lastmod>2020-05-10T16:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/robert-m-lees-jeff-haas-little-bobby-comics-week-276/</loc>
		<lastmod>2020-05-10T17:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-nova-2020-erich-krons-lies-deception-and-manipulation-lets-talk-about-deepfakes/</loc>
		<lastmod>2020-05-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/godaddy-security-incident-fake-downloaders-firefox-lockwise/</loc>
		<lastmod>2020-05-11T04:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ransomware-here-today-here-tomorrow/</loc>
		<lastmod>2020-05-11T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/eclypsium-named-a-cool-vendor-in-the-may-2020-gartner-cool-vendors-in-security-operations-and-threat-intelligence-report/</loc>
		<lastmod>2020-05-11T09:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-scam-roundup-may-11-2020/</loc>
		<lastmod>2020-05-11T09:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-4-stages-to-a-successful-vulnerability-management-program/</loc>
		<lastmod>2020-05-11T09:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/digitalocean-accidentally-leaks-customer-data/</loc>
		<lastmod>2020-05-11T10:51:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/zero-trust-in-the-iot-ot-space/</loc>
		<lastmod>2020-05-11T11:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/government-helps-its-supply-chain-build-ot-and-iot-cybersecurity/</loc>
		<lastmod>2020-05-11T11:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/announcing-the-launch-of-the-rsa-iot-security-monitor/</loc>
		<lastmod>2020-05-11T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/8-vulnerable-wordpress-plugins-attacked-recently/</loc>
		<lastmod>2020-05-11T12:11:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/wp-content-a-beginners-guide-to-wordpress-most-important-directory/</loc>
		<lastmod>2020-05-11T12:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cognizant-expects-to-lose-up-to-70-million-from-april-ransomware-attack/</loc>
		<lastmod>2020-05-11T12:21:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/my-take-covid-19s-silver-lining-could-turn-out-to-be-more-rapid-wide-adoption-of-cyber-hygiene/</loc>
		<lastmod>2020-05-11T12:36:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-owasp-api-security-top-10-from-a-real-world-perspective/</loc>
		<lastmod>2020-05-11T12:50:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/chatbooks-security-breach-users-told-to-change-their-passwords/</loc>
		<lastmod>2020-05-11T13:39:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hashing-what-you-need-to-know-about-storing-passwords/</loc>
		<lastmod>2020-05-11T13:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/strong-protection-in-uncertain-times/</loc>
		<lastmod>2020-05-11T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-security-misconfiguration-are-higher-during-covid-19/</loc>
		<lastmod>2020-05-11T14:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/66-percent-of-consumers-recycle-their-account-passwords-do-you/</loc>
		<lastmod>2020-05-11T14:05:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/quick-guide-how-to-use-shodan/</loc>
		<lastmod>2020-05-11T14:25:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/zoombombing-how-it-works-and-how-to-prevent-it-from-happening-to-you/</loc>
		<lastmod>2020-05-11T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/top-5-enterprise-tools-that-have-free-home-trials/</loc>
		<lastmod>2020-05-11T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/european-cyber-units-dismantle-infinityblack-hacking-group-in-poland/</loc>
		<lastmod>2020-05-11T14:45:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/semperis-announces-40-million-in-growth-funding-after-completing-six-consecutive-profitable-quarters/</loc>
		<lastmod>2020-05-13T13:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/pi-and-working-from-home-dont-betray-your-customers-trust/</loc>
		<lastmod>2020-05-11T15:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/almost-a-third-of-companies-in-europe-and-middle-east-still-rely-on-classic-credentials-for-security/</loc>
		<lastmod>2020-05-11T15:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/businesses-underestimate-covid-19-cybersecurity-risks/</loc>
		<lastmod>2020-05-12T06:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Infamous-Hacks-Phishes.jpg</image:loc>
			<image:title><![CDATA[Infamous-Hacks-Phishes]]></image:title>
			<image:caption><![CDATA[COVID-19]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/u-s-marshals-announced-data-breach-of-prisoners-information/</loc>
		<lastmod>2020-05-11T15:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-nova-2020-nikki-robinson-phds-vulnerability-management-lets-talk-vulnerability-chaining/</loc>
		<lastmod>2020-05-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-everyone-is-needed-to-make-cybersecurity-matter/</loc>
		<lastmod>2020-05-12T07:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Human-Error-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[pandemic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ransomware-hit-atm-giant-diebold-nixdorf/</loc>
		<lastmod>2020-05-11T16:37:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/iam-101-series-federation-and-federated-sso/</loc>
		<lastmod>2020-05-11T16:49:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/def-con-is-canceled-wanna-buy-a-bridge/</loc>
		<lastmod>2020-05-11T16:54:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/vegas-young-soo-park-pixabay.jpg</image:loc>
			<image:title><![CDATA[vegas--young-soo-park--pixabay]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-evaluate-different-pricing-models-for-cybersecurity-software-platforms/</loc>
		<lastmod>2020-05-11T17:40:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/your-zero-trust-strategy-depends-on-active-directory-integrity-2/</loc>
		<lastmod>2020-05-11T17:53:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tips-for-safe-online-dating-apps-avast/</loc>
		<lastmod>2020-05-11T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-use-nexus-repository-with-maven-deploy-video/</loc>
		<lastmod>2020-05-11T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-nova-2020-mark-shapiros-democratized-intelligence-promises-and-pitfalls/</loc>
		<lastmod>2020-05-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-joy-of-tech-a-glitch-in-the-character-simulation/</loc>
		<lastmod>2020-05-11T18:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/grammatech-codesonar-refreshes-iec-61508-iso26262-and-cenelec-en-50128-certifications/</loc>
		<lastmod>2020-05-11T18:47:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/sounding-the-pharma-alarma-an-overview-of-the-pharmaceutical-threat-landscape/</loc>
		<lastmod>2020-05-11T19:03:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-case-for-continuous-security-validation-and-why-it-matters-to-you-by-tracey-moon/</loc>
		<lastmod>2020-05-11T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-do-we-ensure-safety-in-the-next-generation-of-ot-networks/</loc>
		<lastmod>2020-05-11T19:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/analyzing-the-effects-of-covid-19-on-mpulse-traffic/</loc>
		<lastmod>2020-05-11T20:09:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-use-azure-ad-with-802-1x/</loc>
		<lastmod>2020-05-11T20:36:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-cyber-security-fuzzing-does-not-mean-random/</loc>
		<lastmod>2020-05-11T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/modern-workplace-advantages-without-compromising-security-avast/</loc>
		<lastmod>2020-05-11T20:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-prepare-for-salesforce-data-recovery-service-end-of-life/</loc>
		<lastmod>2020-05-11T21:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/detect-anomalous-activity-ahead-of-a-data-breach-with-heuristics/</loc>
		<lastmod>2020-05-12T01:54:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-a-19th-century-approach-to-modern-cyber-security-isnt-working/</loc>
		<lastmod>2020-05-12T02:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/press-release-anitian-introduces-first-ever-cloud-based-documentation-automation-to-provide-security-and-compliance-with-a-single-click/</loc>
		<lastmod>2020-05-12T02:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/your-guide-to-rsac-2020-sessions-keynotes-the-best-parties/</loc>
		<lastmod>2020-05-12T02:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/press-release-anitian-bolsters-executive-team-appoints-john-vecchi-as-chief-marketing-officer/</loc>
		<lastmod>2020-05-12T02:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-adventures-of-microservice-risk-mitigation-2-2/</loc>
		<lastmod>2020-06-15T06:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/ms-01-11-dh.jpg</image:loc>
			<image:caption><![CDATA[To Kill a Machine]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/best-practices-for-scoring-your-environments-security-measures/</loc>
		<lastmod>2020-05-12T03:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-whitepaper-how-predictive-ai-is-disrupting-the-cybersecurity-industry/</loc>
		<lastmod>2020-05-12T06:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/accelerate-security-operations-with-soar-across-the-security-fabric/</loc>
		<lastmod>2020-05-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/automate-network-management-to-accelerate-digital-transformation/</loc>
		<lastmod>2020-05-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/recognizing-fortinet-partners-across-the-north-american-region/</loc>
		<lastmod>2020-05-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/rooting-out-telephone-payment-security-risks/</loc>
		<lastmod>2020-05-12T07:20:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/understanding-vulnerability-scoring-cvss-explained/</loc>
		<lastmod>2020-05-12T08:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-importance-of-protecting-the-right-data/</loc>
		<lastmod>2020-05-13T07:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Third-Party-Extensions.jpg</image:loc>
			<image:title><![CDATA[Third-Party-Extensions]]></image:title>
			<image:caption><![CDATA[protecting data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/spring-2020-product-updates-managedmethods-updates-new-features/</loc>
		<lastmod>2020-05-12T10:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/latest-version-of-the-bricata-network-security-platform-adds-mitre-attck-support-and-simplified-workflows/</loc>
		<lastmod>2020-05-12T11:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/latest-version-of-the-bricata-network-security-platform-adds-mitre-attck-support-and-simplified-workflows-2/</loc>
		<lastmod>2020-05-12T11:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/breaking-in-for-noobz-social-engineering-onsite-infiltration/</loc>
		<lastmod>2020-05-12T11:05:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/gain-early-access-and-help-shape-our-ai-risk-engine/</loc>
		<lastmod>2020-05-12T11:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/digital-transformation-innovation-amid-disruption/</loc>
		<lastmod>2020-05-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/mayhem-moves-to-production-with-the-department-of-defense-3/</loc>
		<lastmod>2020-05-12T13:49:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/4-ways-privileged-access-management-secures-remote-workers/</loc>
		<lastmod>2020-05-12T13:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/nsa-guidance-to-teleworkers-rely-on-end-to-end-encryption/</loc>
		<lastmod>2020-05-12T13:02:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-2019-open-source-security-and-risk-analysis-report-is-here/</loc>
		<lastmod>2020-05-12T13:28:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/personal-information-of-3-6-million-mobifriends-is-up-for-grabs-free-download-included/</loc>
		<lastmod>2020-05-12T13:41:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/divvycloud-by-rapid7-announces-new-infrastructure-as-code-security-capability/</loc>
		<lastmod>2020-05-12T13:49:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/building-a-cyber-security-strategy-plan-as-a-new-ciso/</loc>
		<lastmod>2020-05-12T13:54:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ask-the-expert-cyber-risk-and-secops-part-1/</loc>
		<lastmod>2020-05-12T14:56:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/newsbites-drilldown-for-the-week-ending-8-may-2020/</loc>
		<lastmod>2020-05-12T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/thunderspy-attack-affects-all-computers-with-thunderbolt-released-in-the-past-decade/</loc>
		<lastmod>2020-05-12T15:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/australian-transport-company-hit-with-nefilim-ransomware-months-after-a-maito-ransomware-attack/</loc>
		<lastmod>2020-05-12T15:15:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/4-gdpr-violations-that-multiple-companies-have-been-fined-for/</loc>
		<lastmod>2020-05-12T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-nova-2020-chris-kubeckas-jc-vegas-and-hise-gibsons-lessons-from-the-war-zone-to-the-cyber-trenches-what-leaders-need-to-know/</loc>
		<lastmod>2020-05-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/critical-security-concerns-facing-the-technology-industry/</loc>
		<lastmod>2020-05-12T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/security-first-compliance-by-design/</loc>
		<lastmod>2020-05-12T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/illumio-evolves-micro-segmentation-by-enabling-self-service-functionality-for-application-teams/</loc>
		<lastmod>2020-05-12T16:58:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/real-talk-what-users-really-look-for-in-a-software-composition-analysis-sca-solution/</loc>
		<lastmod>2020-05-12T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-coronavirus-polling/</loc>
		<lastmod>2020-05-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/your-zero-trust-strategy-depends-on-active-directory-integrity/</loc>
		<lastmod>2020-05-12T17:53:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-adam-comptons-a-hillbillys-guide-to-staying-anonymous-online/</loc>
		<lastmod>2020-05-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-implementing-remote-access-for-third-parties-is-more-important-than-ever/</loc>
		<lastmod>2020-05-12T18:07:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/veracodes-leslie-bois-and-robin-montague-earn-recognition-on-crn-2020-women-of-the-channel-list/</loc>
		<lastmod>2020-05-12T18:15:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/securing-the-rise-of-rpa/</loc>
		<lastmod>2020-05-12T18:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/7-hot-takes-on-cyber-incident-response-planning/</loc>
		<lastmod>2020-05-12T19:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tips-for-the-tech-challenged-mature-demographic-avast/</loc>
		<lastmod>2020-05-12T19:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/public-health-and-misinformation-during-covid-19/</loc>
		<lastmod>2020-05-12T20:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/mayhem-moves-to-production-with-the-department-of-defense/</loc>
		<lastmod>2020-05-12T20:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-best-practices-for-public-clouds/</loc>
		<lastmod>2020-05-12T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-protect-applications-from-cloud-based-attacks/</loc>
		<lastmod>2020-05-12T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/enabling-developer-friendly-security-in-kubernetes-for-gitops/</loc>
		<lastmod>2020-05-12T21:07:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/microsoft-patch-tuesday-may-2020-edition/</loc>
		<lastmod>2020-05-12T21:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/yall-should-be-using-critical-thinking-in-the-workplace/</loc>
		<lastmod>2020-05-12T21:22:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/one-tool-to-rule-them-all/</loc>
		<lastmod>2020-05-12T21:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/remembering-wannacry-avast/</loc>
		<lastmod>2020-05-12T21:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/youtube-account-recovery-phishing/</loc>
		<lastmod>2020-05-12T23:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/vert-threat-alert-may-2020-patch-tuesday-analysis/</loc>
		<lastmod>2020-05-12T23:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/may-2020-patch-tuesday-111-vulns-16-critical-sharepoint-vs-code-adobe-patches/</loc>
		<lastmod>2020-05-13T01:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-secure-your-organization-and-its-rapidly-expanding-remote-workforce/</loc>
		<lastmod>2020-05-13T05:20:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/i-cybok-an-introduction-to-the-cyber-security-body-of-knowledge-project/</loc>
		<lastmod>2020-05-13T06:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/waste-management-inc-adopts-fortinets-secure-sd-wan-all-in-one-solution/</loc>
		<lastmod>2020-05-13T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/analyzing-encrypted-rdp-connections/</loc>
		<lastmod>2020-05-13T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/wordpress-two-factor-authentication-2fa-what-is-it-using-it-on-your-site/</loc>
		<lastmod>2020-05-13T10:02:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-time-is-now-cyberark-acquires-idaptive/</loc>
		<lastmod>2020-05-13T10:49:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/my-take-covid-19-cements-the-leadership-role-cisos-must-take-to-secure-company-networks/</loc>
		<lastmod>2020-05-13T11:27:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/data-breach-at-u-s-marshals-service-exposes-personal-data-of-387000-prisoners/</loc>
		<lastmod>2020-05-13T12:03:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/managedmethods-named-a-finalist-in-two-categories-of-the-edtech-awards-2020/</loc>
		<lastmod>2020-05-13T12:30:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/law-firm-used-by-celebrities-affected-by-revil-ransomware-and-data-breach/</loc>
		<lastmod>2020-05-13T12:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/imperva-cloud-waf-customers-can-easily-integrate-advanced-bot-protection-for-increased-security/</loc>
		<lastmod>2020-05-13T12:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/coronavirus-concerns-security-teams-scattered-enterprises-vulnerable/</loc>
		<lastmod>2020-05-14T06:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/canstockphoto80700416.jpg</image:loc>
			<image:title><![CDATA[canstockphoto80700416]]></image:title>
			<image:caption><![CDATA[security teams]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/u-s-government-lists-cves-most-exploited-by-foreign-cyber-adversaries/</loc>
		<lastmod>2020-05-13T13:44:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/protecting-remote-connectivity-in-todays-new-normal/</loc>
		<lastmod>2020-05-13T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/abcs-of-ueba-o-is-for-outlier/</loc>
		<lastmod>2020-05-13T14:14:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ciso-survival-guide-balancing-digital-transformation-and-security/</loc>
		<lastmod>2020-05-13T14:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/for-it-leaders-transformation-demands-require-focus/</loc>
		<lastmod>2020-05-14T07:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17731168.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17731168]]></image:title>
			<image:caption><![CDATA[IT leaders]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tech-and-social-media-companies-risk-losing-32-2-billion-following-a-major-data-breach/</loc>
		<lastmod>2020-05-13T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-forgerocks-devops-deployment-model-speeds-time-to-market/</loc>
		<lastmod>2020-05-13T14:50:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/researchers-spot-24000-android-apps-leaking-user-data/</loc>
		<lastmod>2020-05-13T14:54:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/survey-nearly-two-thirds-of-orgs-have-experienced-covid-19-related-attacks/</loc>
		<lastmod>2020-05-13T14:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-language-no-problem-new-ecosystems-in-nexus-lifecycle-and-nexus-firewall/</loc>
		<lastmod>2020-05-13T14:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/5-key-takeaways-from-the-2020-open-source-security-and-risk-analysis-report/</loc>
		<lastmod>2020-05-13T15:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/survey-sees-accelerated-shift-toward-zero-trust-architectures/</loc>
		<lastmod>2020-05-13T15:55:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/canstockphoto46761310.jpg</image:loc>
			<image:title><![CDATA[zero trust]]></image:title>
			<image:caption><![CDATA[ZTNA]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-track-1-live-stream-recorded/</loc>
		<lastmod>2020-05-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-get-security-clearance-and-win-more-contracts/</loc>
		<lastmod>2020-05-13T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/kwampirs-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-05-13T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-is-a-stress-test-for-the-insurance-industry-data-is-your-best-defense/</loc>
		<lastmod>2020-05-13T16:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tripwire-survey-94-of-cybersecurity-professionals-more-concerned-about-security-in-wake-of-covid-19/</loc>
		<lastmod>2020-05-13T16:47:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/code-protection-leaders-join-forces-to-arm-app-developers-with-cutting-edge-countermeasures-against-ever-evolving-cyberattacks/</loc>
		<lastmod>2020-05-13T16:52:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bitglass-adds-south-asia-anz-local-edge-data-centers/</loc>
		<lastmod>2020-05-13T16:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bitglass-security-spotlight-pharmaceutical-giant-is-the-latest-victim-of-ransomware-attack/</loc>
		<lastmod>2020-05-13T16:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/solidity-top-10-common-issues/</loc>
		<lastmod>2020-05-13T16:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-track-2-live-stream-recorded/</loc>
		<lastmod>2020-05-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/gds-soc-leader-tracey-webb-on-putting-the-fear-of-god-in-remote-workers-and-leaning-into-a-new-normal-video/</loc>
		<lastmod>2020-05-13T18:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/5-reasons-to-stop-using-cvss-scores-to-measure-risk/</loc>
		<lastmod>2020-05-13T18:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/feature-release-20-2/</loc>
		<lastmod>2020-05-13T18:35:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/itar-compliance-with-end-to-end-encryption/</loc>
		<lastmod>2020-05-13T18:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/machine-learning-cant-protect-you-from-fileless-attacks/</loc>
		<lastmod>2020-05-13T18:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cissp-is-at-most-equivalent-to-a-2-year-associates-degree/</loc>
		<lastmod>2020-05-13T19:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/sonarsource-acquires-rips-technologies-and-accelerates-in-the-application-security-market/</loc>
		<lastmod>2020-05-13T19:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/global-ransomware-and-cyberattacks-on-healthcare-spike-during-pandemic/</loc>
		<lastmod>2020-05-13T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/luke-kingmas-lou-patrick-mackays-futurism-cartoons-plastic-free-zone/</loc>
		<lastmod>2020-05-13T21:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/yes-shoppers-are-going-digital-during-covid-but-is-your-user-experience-keeping-up/</loc>
		<lastmod>2020-05-13T21:22:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-in-nexus-repository-3-23-nexus-intelligence-via-npm-audit/</loc>
		<lastmod>2020-05-13T21:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/system-integrity-monitoring-best-practices-podcast/</loc>
		<lastmod>2020-05-13T22:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/leading-security-publications-laud-zeronorths-compelling-value-for-vulnerability-management/</loc>
		<lastmod>2020-05-13T22:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/disc-sans-ics-virtual-conference-highlights/</loc>
		<lastmod>2020-05-14T00:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/critical-gap-in-developer-security-training-puts-applications-at-risk/</loc>
		<lastmod>2020-05-14T01:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/iec-62443-how-to-achieve-the-highest-levels-of-industrial-security/</loc>
		<lastmod>2020-05-14T02:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/secure-updating-is-key-to-protecting-billion-of-devices-published-on-page-31-of-components-in-electronics-magazine/</loc>
		<lastmod>2020-05-14T02:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/coronavirus-lessons-to-help-fight-cybercrime/</loc>
		<lastmod>2020-05-14T03:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/high-security-cryptographic-key-management-for-the-hybrid-cloud-user/</loc>
		<lastmod>2020-05-14T06:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fedramp-compliance-a-quickstart-guide/</loc>
		<lastmod>2020-05-14T06:08:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fortinet-continues-to-redefine-security/</loc>
		<lastmod>2020-05-14T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/eyes-only-revisited/</loc>
		<lastmod>2020-05-14T08:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fake-covid-19-cryptocurrency-emerges-promising-to-gain-value-with-each-death/</loc>
		<lastmod>2020-05-14T08:32:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-u-s-electronic-warfare-platform/</loc>
		<lastmod>2020-05-14T09:04:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/attack-against-pc-thunderbolt-port/</loc>
		<lastmod>2020-05-14T09:23:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/security-covid-19-is-changing-how-america-works/</loc>
		<lastmod>2020-05-15T07:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto26421253.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26421253]]></image:title>
			<image:caption><![CDATA[Netsurion]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/mandrake-owning-android-devices-since-2016/</loc>
		<lastmod>2020-05-14T10:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/google-chat-cipa-compliance-in-remote-learning/</loc>
		<lastmod>2020-05-14T11:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cyberattack-against-uk-supercomputer-archer-forces-operators-to-disable-access-for-scientists/</loc>
		<lastmod>2020-05-14T12:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/announcement-loginradius-china-ciam-for-businesses-to-benefit-from-its-lucrative-market/</loc>
		<lastmod>2020-05-14T12:32:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cissp-vs-masters-degree-please-take-a-neutral-corner/</loc>
		<lastmod>2020-05-14T12:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cloud-opportunities-drive-security-as-a-service-adoption/</loc>
		<lastmod>2020-05-14T13:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/apt-attack-targets-central-asian-companies-avast/</loc>
		<lastmod>2020-05-14T13:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/data-classification-protecting-sacred-data-in-the-cloud/</loc>
		<lastmod>2020-05-15T07:30:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Simplifying-Security-Cloud.jpg</image:loc>
			<image:title><![CDATA[Simplifying-Security-Cloud]]></image:title>
			<image:caption><![CDATA[data classification]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/avoiding-healthcare-vendor-compliance-nightmares-with-third-party-remote-access-best-practices/</loc>
		<lastmod>2020-05-14T14:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/insight-5-14-2020-hugs/</loc>
		<lastmod>2020-05-14T14:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-phishing-update-threat-actors-on-twitter-want-you-to-pay-for-your-stolen-passwords/</loc>
		<lastmod>2020-05-14T14:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/debunking-cybersecurity-jargon-part-two-what-is-a-deep-content-inspection-engine/</loc>
		<lastmod>2020-05-14T14:46:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/announcing-the-forgerock-university-achievement-awards/</loc>
		<lastmod>2020-05-14T14:50:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/devsecops-leadership-forum-500-innovators-learning-from-shared-experiences/</loc>
		<lastmod>2020-05-14T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/untangle-ng-firewall-crowned-winner-of-k-12-higher-education-security-solution-by-edtech-digest/</loc>
		<lastmod>2020-05-14T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/kaspersky-research-finds-new-spying-trojan-targets-diplomatic-entities-in-europe-via-spoofed-visa-application/</loc>
		<lastmod>2020-05-14T15:21:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/venafi-to-acquire-jetstack-to-accelerate-and-secure-digital-transformation/</loc>
		<lastmod>2020-05-14T15:53:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-stephen-hilts-how-we-reverse-engineered-multiple-industrial-radio-remote-control-systems/</loc>
		<lastmod>2020-05-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-video-how-does-mixmodes-ai-evolve-over-time-with-a-customers-environment/</loc>
		<lastmod>2020-05-14T16:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-common-cold/</loc>
		<lastmod>2020-05-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/meet-us-at-the-fs-isac-virtual-summit-may-19-20/</loc>
		<lastmod>2020-05-14T17:46:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/was-this-huaweis-failed-attempt-at-a-linux-backdoor/</loc>
		<lastmod>2020-05-14T17:47:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/anon-gerd-altmann-pixabay.jpg</image:loc>
			<image:title><![CDATA[anon--gerd-altmann--pixabay]]></image:title>
			<image:caption><![CDATA[Huawei Linux]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-mitre-attck-framework-lateral-movement/</loc>
		<lastmod>2020-05-14T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/webinar-recap-using-the-keyfactor-secrets-engine-for-hashicorp-vault/</loc>
		<lastmod>2020-05-14T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fake-zoom-phishing-campaign-targets-employees-for-their-office-365-credentials/</loc>
		<lastmod>2020-05-14T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/understanding-cyber-resilience-the-4-stages-of-a-breach/</loc>
		<lastmod>2020-05-14T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-top-10-most-targeted-security-vulnerabilities-despite-patches-having-been-available-for-years/</loc>
		<lastmod>2020-05-14T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-samuel-hollifields-analysis-and-defense-of-automotive-networks/</loc>
		<lastmod>2020-05-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/7-ways-k-12-teachers-can-help-close-the-cybersecurity-skills-gap/</loc>
		<lastmod>2020-05-14T18:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hack-the-box-htb-machines-walkthrough-series-registry/</loc>
		<lastmod>2020-05-14T18:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/when-a-cli-falls-for-an-attacker/</loc>
		<lastmod>2020-05-14T19:21:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/beware-of-counterfeits/</loc>
		<lastmod>2020-05-14T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/us-government-exposes-north-korean-malware/</loc>
		<lastmod>2020-05-14T21:02:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tools-and-techniques-for-updating-enterprise-firmware/</loc>
		<lastmod>2020-05-14T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/check-point-security-researchers-prc-military-apt-groups-five-year-plan-targeting-australia-others/</loc>
		<lastmod>2020-05-14T21:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-were-partnering-with-twilio-sendgrid-for-security-and-deliverability/</loc>
		<lastmod>2020-05-14T23:19:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/consumer-trust-is-the-currency-of-business-now-more-than-ever/</loc>
		<lastmod>2020-05-14T23:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-covid-19-is-forcing-increased-digital-outreach/</loc>
		<lastmod>2020-05-15T04:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/post-quantum-tv/</loc>
		<lastmod>2020-05-15T06:15:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/financial-services-organization-chooses-fortinet-secure-sd-wan-to-meet-business-needs/</loc>
		<lastmod>2020-05-15T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/11-details-your-e-mail-scan-may-have-missed-and-how-our-antispam-sdk-can-help-you-track-them/</loc>
		<lastmod>2020-05-15T09:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-dramatically-changing-role-of-the-ciso/</loc>
		<lastmod>2020-05-18T06:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Leadership-Security.jpg</image:loc>
			<image:caption><![CDATA[CISO role]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tales-from-the-front-lines-attackers-on-lockdown-focus-on-apis/</loc>
		<lastmod>2020-05-15T11:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bug-hunting-with-crytic/</loc>
		<lastmod>2020-05-15T11:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/in-new-normal-digital-transformation-accelerates-in-industrial-networks/</loc>
		<lastmod>2020-05-18T07:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/IoT-Security-Approach.jpg</image:loc>
			<image:title><![CDATA[IoT]]></image:title>
			<image:caption><![CDATA[digital transformation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/safeguard-your-business-with-a-cyber-risk-management-program/</loc>
		<lastmod>2020-05-15T13:09:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/uk-power-grid-network-middleman-struck-by-digital-attack/</loc>
		<lastmod>2020-05-15T13:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/recorded-webinar-why-taking-a-risk-based-approach-to-your-cybersecurity-is-required-in-todays-changing-landscape/</loc>
		<lastmod>2020-05-15T13:33:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/during-a-pandemic-no-one-wants-to-swipe-their-finger/</loc>
		<lastmod>2020-05-15T13:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-is-siem-the-roadmap-to-a-better-soc/</loc>
		<lastmod>2020-05-15T14:06:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/7-common-vpn-problems-the-not-so-good-the-bad-and-the-ugly-2/</loc>
		<lastmod>2020-05-15T14:30:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-definitive-cyber-security-statistics-guide-for-2020/</loc>
		<lastmod>2020-05-15T14:53:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/toolbox-security-feature-navigating-security-and-compliance-landscape-in-the-age-of-covid-19/</loc>
		<lastmod>2020-05-15T15:49:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-tony-ruccs-negotiating-with-ransomware-attackers/</loc>
		<lastmod>2020-05-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-automate-certificate-management-and-provisioning/</loc>
		<lastmod>2020-05-15T16:07:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/interserve-hit-by-data-breach-100000-employee-records-stolen/</loc>
		<lastmod>2020-05-15T16:12:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-hospitals-are-dealing-with-the-cybersecurity-challenge-of-covid-19/</loc>
		<lastmod>2020-05-15T16:26:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/webinars-fuzz-testing-devops-with-red-hat-and-iso-sae-21434/</loc>
		<lastmod>2020-05-15T16:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/securing-remote-work-part-4-ztna/</loc>
		<lastmod>2020-05-15T16:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/webinar-bad-as-you-want-to-be-adversary-emulation-basics/</loc>
		<lastmod>2020-05-15T16:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-joy-of-tech-covid-themed-commercials-burnout/</loc>
		<lastmod>2020-05-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/report-more-unknown-devices-on-corporate-networks/</loc>
		<lastmod>2020-05-15T17:53:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto16040110.jpg</image:loc>
			<image:title><![CDATA[canstockphoto16040110]]></image:title>
			<image:caption><![CDATA[corporate networks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-hardik-parekhs-navigating-devops-security-journey-with-owasp-samm-v2-0/</loc>
		<lastmod>2020-05-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/quick-tip-4-dshell/</loc>
		<lastmod>2020-05-15T18:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/thunderbolt-flaw-exposes-pcs-in-physical-access-hacking-avast/</loc>
		<lastmod>2020-05-15T18:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tanya-janca-is-big-fan-of-sca-video/</loc>
		<lastmod>2020-05-15T18:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-zero-trust-can-help-build-not-block-the-enterprise-digital-transformation/</loc>
		<lastmod>2020-05-15T19:22:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/increasing-success-with-a-development-methodology-agnostic-approach-to-critical-path-activities-and-constraints/</loc>
		<lastmod>2020-05-15T19:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/preventing-man-in-the-middle-mitm-attacks-the-ultimate-guide/</loc>
		<lastmod>2020-05-15T20:12:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/raf-schoenmaekers-confirmation-bias/</loc>
		<lastmod>2020-05-15T20:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-enjoy-virtual-graduations-uninterrupted-avast/</loc>
		<lastmod>2020-05-15T20:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/solo-studio-for-video-lectures/</loc>
		<lastmod>2020-05-15T21:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fcpx-and-the-solo-studio/</loc>
		<lastmod>2020-05-15T21:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/may-device-threat-report/</loc>
		<lastmod>2020-05-15T22:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/trust-and-transparency-in-the-hardware-supply-chain/</loc>
		<lastmod>2020-05-15T23:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/wordpress-malware-collects-sensitive-woocommerce-data/</loc>
		<lastmod>2020-05-16T02:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/3-ways-to-use-group-tabs-in-avast-secure-browser-avast/</loc>
		<lastmod>2020-05-16T03:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/u-s-secret-service-massive-fraud-against-state-unemployment-insurance-programs/</loc>
		<lastmod>2020-05-16T04:34:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-rising-threat-of-business-email-compromise/</loc>
		<lastmod>2020-05-16T09:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/attach-your-r-code-to-charts-you-tweet-for-reproducible-r-tweets/</loc>
		<lastmod>2020-05-16T13:38:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-robin-wildes-its-3am-do-you-know-where-your-backup-is/</loc>
		<lastmod>2020-05-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-alive-or-not/</loc>
		<lastmod>2020-05-16T17:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-travis-goodspeeds-and-ryan-speers-a-tourists-guide-to-the-arm-cortex-m3/</loc>
		<lastmod>2020-05-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-could-artificial-intelligence-help-in-avoiding-data-breaches/</loc>
		<lastmod>2020-05-16T22:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-outdated-software-on-83-of-medical-devices-increase-security-risk/</loc>
		<lastmod>2020-05-16T22:53:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/another-california-data-privacy-law/</loc>
		<lastmod>2020-05-17T11:10:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/state-government-technology-response-to-covid-19/</loc>
		<lastmod>2020-05-17T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/singaporean-startup-responsible-cyber-gears-up-for-growth-with-new-acquisition/</loc>
		<lastmod>2020-05-18T10:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-joe-grays-social-engineering-your-metrics-using-data-science-to-provide-value-in-reporting/</loc>
		<lastmod>2020-05-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/robert-m-lees-jeff-haas-little-bobby-comics-week-277/</loc>
		<lastmod>2020-05-17T17:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-alyssa-millers-reality-lost-deepfakes-changing-the-face-of-attacks/</loc>
		<lastmod>2020-05-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/complete-guide-to-wordpress-salts-and-security-keys/</loc>
		<lastmod>2020-05-18T01:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/thunderbolt-flaws-wordpress-plugin-vulnerabilities-patriot-act-vote/</loc>
		<lastmod>2020-05-18T04:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/understanding-single-sign-on-as-a-means-of-identity-access-management/</loc>
		<lastmod>2020-05-18T04:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-use-and-abuse-of-dotnet-files-and-the-value-of-fortiresponder-automation-in-the-threat-analysis-process/</loc>
		<lastmod>2020-05-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/as-ot-systems-become-more-connected-ot-security-becomes-more-challenging/</loc>
		<lastmod>2020-05-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/are-encryption-keys-more-important-than-your-data/</loc>
		<lastmod>2020-05-18T07:09:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-opsec-is-for-everyone-not-just-for-people-with-something-to-hide-part-iii/</loc>
		<lastmod>2020-05-18T07:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/value-and-uncertainty-in-pandemic-metrics/</loc>
		<lastmod>2020-05-18T10:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-covid-19-has-impacted-cybersecurity-teams/</loc>
		<lastmod>2020-05-19T06:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto3025211.jpg</image:loc>
			<image:title><![CDATA[canstockphoto3025211]]></image:title>
			<image:caption><![CDATA[COVID-19 cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/u-s-secret-service-exposes-unemployment-benefits-scam-by-overseas-fraud-ring/</loc>
		<lastmod>2020-05-18T10:39:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/iot-and-vendors-how-to-stay-safe/</loc>
		<lastmod>2020-05-19T07:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Securing-IoT-Time.jpg</image:loc>
			<image:title><![CDATA[IoT]]></image:title>
			<image:caption><![CDATA[IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ramsey-malware/</loc>
		<lastmod>2020-05-18T11:15:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/protecting-organization-from-cyber-threats-business-at-risk-during-covid-19/</loc>
		<lastmod>2020-05-18T11:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/a-look-at-trumps-executive-order-to-secure-the-bulk-power-system/</loc>
		<lastmod>2020-05-18T11:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/android-malware-in-covid-19-clothes-steals-sms-and-contacts/</loc>
		<lastmod>2020-05-18T11:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/grc-and-security-finding-balance-in-the-new-normal/</loc>
		<lastmod>2020-05-18T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-i-joined-attackiq-compelling-mission-amazing-team/</loc>
		<lastmod>2020-05-18T12:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/red-canary-integrates-managed-detection-and-response-to-microsoft-defender-advanced-threat-protection-atp/</loc>
		<lastmod>2020-05-18T12:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/edison-mail-bug-exposed-users-email-accounts-to-complete-strangers/</loc>
		<lastmod>2020-05-18T12:03:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/seczetta-and-securience-announce-first-partnership-to-bring-third-party-identity-and-lifecycle-management-to-emea/</loc>
		<lastmod>2020-05-18T12:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/game-theory-why-system-security-is-like-poker-not-chess-3/</loc>
		<lastmod>2020-05-18T13:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/infosec-professionals-are-more-worried-about-corporate-security-than-their-own-home-security/</loc>
		<lastmod>2020-05-18T12:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cyber-crime-against-children-spikes-amid-stay-at-home-orders/</loc>
		<lastmod>2020-05-18T13:36:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cloud-compliance-a-top-challenge-for-organizations/</loc>
		<lastmod>2020-05-18T13:42:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/11-plus-supercomputers-hacked-with-cryptominers-by-china/</loc>
		<lastmod>2020-05-18T14:16:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/crypto-hpc-julian-herzog-cc-by.jpg</image:loc>
			<image:title><![CDATA[crypto-hpc--julian-herzog--cc-by]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bitglass-and-crowdstrike-for-agentless-atp-in-the-cloud/</loc>
		<lastmod>2020-05-18T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-new-dibbs-password-format-explained/</loc>
		<lastmod>2020-05-18T14:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/media-giant-bbc-credits-digital-identity-strategy-as-one-key-to-success-during-pandemic/</loc>
		<lastmod>2020-05-18T14:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-is-network-insight/</loc>
		<lastmod>2020-05-18T14:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/shifting-strategies/</loc>
		<lastmod>2020-05-18T15:18:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-github-security-isnt-enough/</loc>
		<lastmod>2020-05-18T15:22:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/this-service-helps-malware-authors-fix-flaws-in-their-code/</loc>
		<lastmod>2020-05-18T15:31:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hackers-threaten-to-release-stolen-documents-from-law-firm-implicating-donald-trump/</loc>
		<lastmod>2020-05-18T15:33:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-phillip-wylies-the-pentester-blueprint-a-guide-to-becoming-a-pentester/</loc>
		<lastmod>2020-05-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-and-the-cmmc-timeline/</loc>
		<lastmod>2020-05-18T16:01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/firefox-to-fully-drop-flash-support-by-the-end-of-2020/</loc>
		<lastmod>2020-05-18T16:55:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/detect-and-track-threats-through-ueba-and-insights-investigate/</loc>
		<lastmod>2020-05-18T17:01:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/raf-schoenmaekers-sugar-coated/</loc>
		<lastmod>2020-05-18T17:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-does-a-managed-services-partner-free-up-your-staff/</loc>
		<lastmod>2020-05-18T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/upgrading-from-edr-to-mdr-is-critical-but-easier-than-you-think/</loc>
		<lastmod>2020-05-18T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hackers-steal-10m-in-wonderfully-done-fraud-from-norways-state-investment-fund/</loc>
		<lastmod>2020-05-18T17:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/do-you-know-the-true-cost-of-your-vulnerability-discovery-program/</loc>
		<lastmod>2020-05-18T17:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-ayman-elsawahs-why-we-break-things-the-neuroscience-of-hackers/</loc>
		<lastmod>2020-05-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hack-the-box-htb-machines-walkthrough-series-mango/</loc>
		<lastmod>2020-05-18T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/critical-security-concerns-facing-the-energy-utility-industry/</loc>
		<lastmod>2020-05-18T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/game-theory-why-system-security-is-like-poker-not-chess/</loc>
		<lastmod>2020-05-18T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/talking-security-at-ieee-symposium-avast/</loc>
		<lastmod>2020-05-18T18:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/united-states-secret-service-new-criminal-nigerian-scam-related-to-unemployment-in-us-due-to-pandemic/</loc>
		<lastmod>2020-05-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/glitch-in-illinois-pua-system-blamed-for-exposing-ssns-private-data/</loc>
		<lastmod>2020-05-18T20:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-is-ftp-why-use-it-to-clean-hacked-websites/</loc>
		<lastmod>2020-05-18T20:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-great-re-opening/</loc>
		<lastmod>2020-05-18T21:16:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-encrypt-gmail/</loc>
		<lastmod>2020-05-18T21:31:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/nanocore-rat-malware-of-the-month-may-2020/</loc>
		<lastmod>2020-05-18T22:01:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/newsbites-drilldown-for-the-week-ending-15-may-2020/</loc>
		<lastmod>2020-05-18T22:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/whats-missing-from-standard-zero-trust-architectures/</loc>
		<lastmod>2020-05-18T23:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-business-case-for-compliance-even-now/</loc>
		<lastmod>2020-05-18T23:34:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bletchley-park-codebreaker-obituary-ann-mitchell/</loc>
		<lastmod>2020-05-19T00:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/college-students-beware/</loc>
		<lastmod>2020-05-19T02:19:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-adventures-of-microservice-coles-dilemma/</loc>
		<lastmod>2020-06-22T06:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/ms-01-12-dh.jpg</image:loc>
			<image:caption><![CDATA[Cole's Dilemma]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/podcast-episode-7-the-perimeter-really-is-gone-cis-controls-and-covid-19-with-tony-sager/</loc>
		<lastmod>2020-05-19T04:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/harnessing-the-potential-of-5g-with-secure-sd-wan/</loc>
		<lastmod>2020-05-19T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/growing-need-of-cybersecurity-professionals-an-statistical-analysis/</loc>
		<lastmod>2020-05-19T08:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/dark-nexus-iot-botnet-analyzing-and-detecting-its-network-activity/</loc>
		<lastmod>2020-05-19T08:57:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/passwords-are-and-have-always-been-an-achilles-heel-in-cybersecurity/</loc>
		<lastmod>2020-05-19T10:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/pandemic-serves-up-security-woes-for-election/</loc>
		<lastmod>2020-05-20T06:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/canstockphoto8778116.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8778116]]></image:title>
			<image:caption><![CDATA[elections]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/uem-improving-device-security-for-remote-workers/</loc>
		<lastmod>2020-05-20T07:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Risk-Cloud-Security.jpg</image:loc>
			<image:caption><![CDATA[Exabeam]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-cybersecurity-processes-most-vulnerable-to-human-error/</loc>
		<lastmod>2020-05-19T10:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/getting-through-this-together/</loc>
		<lastmod>2020-05-19T10:53:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/my-first-pen-testing-onsite-social-engineering-engagement/</loc>
		<lastmod>2020-05-19T11:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/do-you-know-where-all-your-firewalls-are/</loc>
		<lastmod>2020-05-19T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/around-9-million-easyjet-customers-details-stolen-in-hacking-incident/</loc>
		<lastmod>2020-05-19T12:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/introducing-cloud-app-isolation/</loc>
		<lastmod>2020-05-19T12:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/announcing-our-state-of-software-security-open-source-edition-report/</loc>
		<lastmod>2020-05-19T13:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/uncovering-vulnerabilities-in-cryptographic-libraries-mayhem-matrixssl-and-wolfssl-cve-2019-13470/</loc>
		<lastmod>2020-05-19T14:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-gitops-raises-the-stakes-for-application-security/</loc>
		<lastmod>2020-05-19T13:51:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/40-of-it-professionals-believe-that-public-clouds-are-more-secure-than-on-premise-environments/</loc>
		<lastmod>2020-05-19T13:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fico-survey-shows-21-of-people-reuse-five-or-fewer-passwords-on-multiple-services/</loc>
		<lastmod>2020-05-19T13:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/integrating-infrastructure-as-code-into-a-continuous-delivery-pipeline/</loc>
		<lastmod>2020-05-19T13:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/when-bandwidth-doesnt-last/</loc>
		<lastmod>2020-05-19T14:18:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/using-sarif-to-extend-analysis-of-sast-tools/</loc>
		<lastmod>2020-05-19T14:27:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/65-of-european-consumers-worry-about-online-fraud-do-you-shop-online-safely/</loc>
		<lastmod>2020-05-19T14:46:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-related-cyber-security-adjustments/</loc>
		<lastmod>2020-05-19T14:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-clearswift-report-highlights-areas-of-cybersecurity-improvement-for-uk-public-sector/</loc>
		<lastmod>2020-05-19T15:12:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-travis-palmers-password-cracking-beyond-15-characters-and-under-500/</loc>
		<lastmod>2020-05-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/expand-your-mssp-portfolio-with-360-protection-across-mobile-email-and-web/</loc>
		<lastmod>2020-05-19T16:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cybersecurity-budgeting-and-spending-trends-2020-how-does-yours-compare/</loc>
		<lastmod>2020-05-19T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/critical-security-concerns-facing-government/</loc>
		<lastmod>2020-05-19T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/aqua-security-raises-30-million-in-series-d-funding-to-fuel-the-expansion-of-its-cloud-native-security-platform/</loc>
		<lastmod>2020-05-20T13:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/digicert-names-jason-sabin-as-cto/</loc>
		<lastmod>2020-05-19T16:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ukraine-nabs-suspect-in-773m-password-megabreach/</loc>
		<lastmod>2020-05-19T16:46:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cybersecurity-guidelines-for-u-s-high-risk-chemical-facilities-are-a-decade-old/</loc>
		<lastmod>2020-05-19T16:55:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/reassessing-data-privacy-guidance-during-coronavirus-covid19-pandemic/</loc>
		<lastmod>2020-05-19T16:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-mount-st-helens/</loc>
		<lastmod>2020-05-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-top-10-routinely-exploited-vulnerabilities/</loc>
		<lastmod>2020-05-19T17:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/adding-mdr-services-to-edr-is-an-easy-way-to-improve-security-outcomes/</loc>
		<lastmod>2020-05-19T17:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fake-cloud-now-there-are-two-hands-in-your-pocket/</loc>
		<lastmod>2020-05-19T17:42:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fbi-warns-that-prolock-ransomware-decryptor-corrupts-encrypted-files/</loc>
		<lastmod>2020-05-19T17:56:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/appsec-the-developer-way-transforming-security-from-a-dirty-word-to-a-common-practice/</loc>
		<lastmod>2020-05-19T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-importance-of-c-suite-and-boards-engaging-in-third-party-cyber-risk-management/</loc>
		<lastmod>2020-05-19T17:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/beware-of-phone-phishing/</loc>
		<lastmod>2020-05-19T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/accessing-your-pki-automation-maturity/</loc>
		<lastmod>2020-05-19T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-adam-comptons-a-hillbillys-guide-to-staying-anonymous-online-2/</loc>
		<lastmod>2020-05-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-phishing-update-file-sharing-services-abused-to-steal-credentials/</loc>
		<lastmod>2020-05-19T18:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/infographic-key-findings-from-the-2020-ossra-report/</loc>
		<lastmod>2020-05-19T19:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/secure-code-warrior-answers-the-call-from-zoom-video-communications/</loc>
		<lastmod>2020-05-19T21:19:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/evaluating-waf-solutions-know-the-key-considerations-for-replacing-legacy-waf/</loc>
		<lastmod>2020-05-19T21:42:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/latest-security-trends-from-verizons-annual-breach-report-avast/</loc>
		<lastmod>2020-05-19T21:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/remote-work-requires-security-strategy-adjustment/</loc>
		<lastmod>2020-05-19T22:01:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/securing-work-at-home-apps/</loc>
		<lastmod>2020-05-19T22:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/mining-r-4-0-0-changelog-for-nuggets-of-gold-1-stopifnot/</loc>
		<lastmod>2020-05-19T22:31:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/uncovering-vulnerabilities-in-cryptographic-libraries-mayhem-matrixssl-and-wolfssl/</loc>
		<lastmod>2020-05-19T23:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/becoming-an-all-around-defender-building-an-enterprise-grade-home-lab/</loc>
		<lastmod>2020-05-20T02:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/meet-pci-requirements-consistently-and-efficiently/</loc>
		<lastmod>2020-05-20T02:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/using-security-services-to-help-customers-strengthen-network-defenses/</loc>
		<lastmod>2020-05-20T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/areas-of-focus-for-healthcare-organizations-when-securing-digital-transformation/</loc>
		<lastmod>2020-05-20T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-can-i-check-if-i-am-gdpr-compliant/</loc>
		<lastmod>2020-05-20T07:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/attacks-targeting-ics-ot-assets-grew-2000-since-2018-report-reveals/</loc>
		<lastmod>2020-05-20T07:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/winning-with-cyber-threat-intelligence-taking-a-more-personal-view/</loc>
		<lastmod>2020-05-20T07:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cyberattack-on-easyjet-will-put-consumer-confidence-to-the-ultimate-test-warns-pci-pal/</loc>
		<lastmod>2020-05-20T08:25:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/information-of-9-million-passengers-compromised-in-easyjet-data-breach/</loc>
		<lastmod>2020-05-20T10:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/criminals-and-the-normalization-of-masks/</loc>
		<lastmod>2020-05-20T11:26:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/verizon-dbir-2020-cloud-apps-stolen-credentials-and-errors/</loc>
		<lastmod>2020-05-20T11:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/healthcare-cyberattacks-increasing-during-covid-19/</loc>
		<lastmod>2020-05-21T06:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/canstockphoto12642178.jpg</image:loc>
			<image:title><![CDATA[canstockphoto12642178]]></image:title>
			<image:caption><![CDATA[healthcare COVID]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fraudsters-exploit-benefits-programs-in-new-round-of-global-attacks/</loc>
		<lastmod>2020-05-20T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/lay-the-foundations-of-digital-risk-management/</loc>
		<lastmod>2020-05-20T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/2020-verizon-data-breach-investigations-report-analysis-findings-and-attackiq-commentary/</loc>
		<lastmod>2020-05-20T12:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/brazils-natura-co-cosmetics-accidentally-exposes-personal-details-of-192-million-customers/</loc>
		<lastmod>2020-05-20T12:48:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/downtime-costs-up-to-50000-per-hour-for-smbs-struggling-with-cybersecurity-new-research-shows/</loc>
		<lastmod>2020-05-20T12:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/securesky-announces-partnership-with-threatquotient/</loc>
		<lastmod>2020-05-20T13:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/runsafe-security-appoints-veteran-security-experts-to-technical-advisory-board/</loc>
		<lastmod>2020-05-20T13:11:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/zero-trust-stay-safe-while-working-remotely/</loc>
		<lastmod>2020-05-21T07:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Data-Vicinity.jpg</image:loc>
			<image:title><![CDATA[Data-Vicinity]]></image:title>
			<image:caption><![CDATA[zero trust]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/varonis-announces-new-platform-update-featuring-remote-work-cybersecurity-capabilities/</loc>
		<lastmod>2020-05-20T13:27:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/active-directory-is-not-the-silver-bullet-for-iam-best-practices/</loc>
		<lastmod>2020-05-20T14:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/scammers-leverage-contact-tracing-measures-ftc-warns/</loc>
		<lastmod>2020-05-20T14:12:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cultural-approaches-to-transformations/</loc>
		<lastmod>2020-05-20T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/radware-threat-researchers-live-ddos-iot-botnets/</loc>
		<lastmod>2020-05-20T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bring-digital-identity-out-of-the-shadows-to-fuel-digital-transformation/</loc>
		<lastmod>2020-05-20T14:50:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-mitre-attck-framework-collection/</loc>
		<lastmod>2020-05-20T14:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-you-need-to-know-about-reverse-proxy/</loc>
		<lastmod>2020-05-20T14:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covve-contacts-app-data-breach-exposes-23-million-emails-addresses-and-other-private-details/</loc>
		<lastmod>2020-05-20T15:23:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/u-s-treasurys-fincen-warns-of-medical-scams-exploiting-covid-19/</loc>
		<lastmod>2020-05-20T15:31:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-2020-sans-automation-and-integration-survey-results-are-in-2/</loc>
		<lastmod>2020-05-20T15:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-2020-sans-automation-and-integration-survey-results-are-in/</loc>
		<lastmod>2020-05-20T15:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/outsourcing-cybersecurity-what-services-to-outsource-what-to-keep-in-house/</loc>
		<lastmod>2020-05-20T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/critical-security-concerns-for-the-financial-services-industry/</loc>
		<lastmod>2020-05-20T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-xavier-ashes-the-long-con-surviving-25-years-in-infosec/</loc>
		<lastmod>2020-05-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-is-incident-response-a-5-step-plan-to-resolve-security-events/</loc>
		<lastmod>2020-05-20T16:05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-redux-6-foot-zone/</loc>
		<lastmod>2020-05-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/deepfakes-how-to-defend-yourself-from-attack/</loc>
		<lastmod>2020-05-20T17:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-talk-to-senior-executives-about-cybersecurity/</loc>
		<lastmod>2020-05-20T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/webinar-recap-re-think-your-pki-build-buy-or-bring-in-reinforcements/</loc>
		<lastmod>2020-05-20T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-knoxville-2020-james-harrells-can-you-hide-from-big-data/</loc>
		<lastmod>2020-05-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/illinois-court-upholds-unilateral-amendment-to-shutterfly-arbitration-provision/</loc>
		<lastmod>2020-05-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-gocgle-web-skimming-campaign/</loc>
		<lastmod>2020-05-20T18:20:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/digital-identity-its-just-business-as-usual/</loc>
		<lastmod>2020-05-20T18:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bart-gellman-on-snowden/</loc>
		<lastmod>2020-05-20T19:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/are-you-ready-for-api-security/</loc>
		<lastmod>2020-05-20T19:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/knots-landed-conways-knot-problem-solved/</loc>
		<lastmod>2020-05-20T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/abcs-of-ueba-p-is-for-privilege/</loc>
		<lastmod>2020-05-20T20:07:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/43-of-data-breaches-connected-to-application-vulnerabilities-assessing-the-appsec-implications/</loc>
		<lastmod>2020-05-20T20:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-data-breach-survival-guide-avast-essential-guide/</loc>
		<lastmod>2020-05-21T00:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/smart-life-for-your-customers-while-wfh-avast/</loc>
		<lastmod>2020-05-21T00:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/steam-phishing-campaign-uses-csgo-skin-gambling-lure/</loc>
		<lastmod>2020-05-21T01:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/announcing-tufin-orchestration-suite-r20-1/</loc>
		<lastmod>2020-05-21T01:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/trust-and-transparency-in-the-hardware-supply-chain-2/</loc>
		<lastmod>2020-05-21T02:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/offense-and-defense-a-tale-of-two-sides-windows-os-credential-dumping-2/</loc>
		<lastmod>2020-05-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/offense-and-defense-a-tale-of-two-sides-windows-os-credential-dumping/</loc>
		<lastmod>2020-05-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/texas-court-backs-phishing-attack-insurance-claim/</loc>
		<lastmod>2020-05-26T06:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Phishing-Exploits-Gullibility.jpg</image:loc>
			<image:caption><![CDATA[phishing attack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cyberstress-how-technology-is-changing-our-brains/</loc>
		<lastmod>2020-05-26T07:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto32934910.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32934910]]></image:title>
			<image:caption><![CDATA[remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/home-chef-confirms-data-breach-incident-affecting-8-million-customers/</loc>
		<lastmod>2020-05-21T11:03:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-you-need-google-chat-monitoring/</loc>
		<lastmod>2020-05-21T11:09:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/reinventing-vulnerability-disclosure-using-zero-knowledge-proofs/</loc>
		<lastmod>2020-05-21T11:50:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/survey-nearly-half-of-americans-refusing-or-unlikely-to-opt-in-to-covid-19-contact-tracing-apps/</loc>
		<lastmod>2020-05-21T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/preparing-for-the-risk-challenges-of-an-uncertain-tomorrow/</loc>
		<lastmod>2020-05-21T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/facebook-fined-9-million-in-canada-over-false-privacy-claims/</loc>
		<lastmod>2020-05-21T12:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/streaming-applications-how-to-secure-your-customer-data/</loc>
		<lastmod>2020-05-21T12:34:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-attackers-think-about-your-cybersecurity-isolation-strategy/</loc>
		<lastmod>2020-05-21T12:37:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/scattered-canary-behind-hundreds-of-fraudulent-unemployment-claims/</loc>
		<lastmod>2020-05-21T12:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hack-the-box-htb-machines-walkthrough-series-traverxec/</loc>
		<lastmod>2020-05-21T13:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/best-entry-level-cybersecurity-jobs-for-veterans-with-security-clearance/</loc>
		<lastmod>2020-05-21T13:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/reporting-cyber-threats-executives-at-risk/</loc>
		<lastmod>2020-05-21T13:47:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/is-your-mercedes-leaking/</loc>
		<lastmod>2020-05-21T13:56:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hackers-stole-220gb-of-data-in-toll-group-ransomware-attack/</loc>
		<lastmod>2020-05-21T14:15:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-five-hidden-risks-of-a-remote-workforce/</loc>
		<lastmod>2020-05-21T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-link-between-iot-botnets-and-the-isps-unpreparedness/</loc>
		<lastmod>2020-05-21T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/94-of-it-professionals-worry-more-about-security-after-the-coronavirus-outbreak/</loc>
		<lastmod>2020-05-21T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/realigning-priorities-and-building-a-bridge-between-security-and-development/</loc>
		<lastmod>2020-05-21T15:03:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/iranian-chafer-apt-targeted-air-transportation-and-government-in-kuwait-and-saudi-arabia/</loc>
		<lastmod>2020-05-21T15:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-bryce-kunz-opening-remarks-rumblings-ruminations-and-rants/</loc>
		<lastmod>2020-05-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/women-cisos-to-watch/</loc>
		<lastmod>2020-05-21T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/getting-your-security-program-to-shift-left-operationalizing-security-controls-via-devsecops/</loc>
		<lastmod>2020-05-21T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/leading-indicators-that-you-have-a-vendor-who-is-compromised/</loc>
		<lastmod>2020-05-21T16:44:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/can-devsecops-cover-holes-created-by-digital-transformation/</loc>
		<lastmod>2020-05-21T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/business-case-studies-for-cisos/</loc>
		<lastmod>2020-05-21T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-x/</loc>
		<lastmod>2020-05-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/guest-essay-what-everyone-should-know-about-the-pros-and-cons-of-online-fingerprinting/</loc>
		<lastmod>2020-05-21T17:04:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-create-a-bimi-compatible-logo-using-svg-images/</loc>
		<lastmod>2020-05-21T17:23:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-and-the-new-normal-for-e-commerce/</loc>
		<lastmod>2020-05-21T17:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/one-thing-all-cybersecurity-teams-should-have-during-covid-19/</loc>
		<lastmod>2020-05-21T17:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/whistleblower-says-apple-built-secret-dossier-on-you-via-siri/</loc>
		<lastmod>2020-05-21T17:38:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/tim-cook-valuewalk-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[tim-cook--valuewalk--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Apple Siri]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-bsidesslc-2020-siddharth-coontoors-wheres-my-dough-a-look-a-web-skimming-attackson/</loc>
		<lastmod>2020-05-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/edgeverve-completes-first-bsimm-assessment-in-india/</loc>
		<lastmod>2020-05-21T18:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-cis-benchmarks-are-critical-for-security-and-compliance/</loc>
		<lastmod>2020-05-21T20:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-attacker-playbook-hasnt-changed/</loc>
		<lastmod>2020-05-21T20:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/remote-working-challenges-avast/</loc>
		<lastmod>2020-05-21T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/a-message-to-the-young-innovators-of-tomorrow/</loc>
		<lastmod>2020-05-21T21:33:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/native-interactive-login-aids-privileged-session-management/</loc>
		<lastmod>2020-05-21T23:22:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/blockfi-hacked-following-sim-swap-attack-but-says-no-funds-lost/</loc>
		<lastmod>2020-05-22T00:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fortinet-provides-secure-office-in-a-box-for-secure-covid-19-testing-at-remote-sites/</loc>
		<lastmod>2020-05-22T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fortinets-commitment-to-healthcare-enables-scalable-covid-19-testing-and-care-solution/</loc>
		<lastmod>2020-05-22T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fortinets-commitment-to-healthcare-enables-scalable-covid-19-testing-and-care-solution-2/</loc>
		<lastmod>2020-05-22T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fortinet-provides-secure-office-in-a-box-for-secure-covid-19-testing-at-remote-sites-2/</loc>
		<lastmod>2020-05-22T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/creating-a-sense-of-occasion-engagement-and-togetherness-virtually/</loc>
		<lastmod>2020-05-22T07:15:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bank-of-america-notifies-sba-loan-applicants-of-potential-data-leak/</loc>
		<lastmod>2020-05-22T10:43:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/emerging-talent-winternship-2020-highlights/</loc>
		<lastmod>2020-05-22T11:50:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/purple-teaming-chronicles-part-1/</loc>
		<lastmod>2020-05-22T12:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-internet-didnt-break-now-what/</loc>
		<lastmod>2020-05-22T13:14:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-cmmc-abs-plan-to-train-the-assessors/</loc>
		<lastmod>2020-05-22T13:16:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/milkmanvictory-ransomware-created-for-purpose-of-attacking-scammers/</loc>
		<lastmod>2020-05-22T13:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/military-active-duty-personnel-are-76-more-likely-to-report-identify-theft-ftc-reports/</loc>
		<lastmod>2020-05-22T13:35:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/home-security-vendor-sued-after-technician-spied-on-customers-in-intimate-moments/</loc>
		<lastmod>2020-05-22T14:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/mom-you-cant-post-pictures-of-my-child-because-gdpr/</loc>
		<lastmod>2020-05-22T15:08:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/granny-mentrea-pixabay.jpg</image:loc>
			<image:title><![CDATA[granny--mentrea--pixabay]]></image:title>
			<image:caption><![CDATA[pictures]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/easyjet-data-breach-exposes-9m-customers-avast/</loc>
		<lastmod>2020-05-22T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-survey-highlights-need-for-api-visibility/</loc>
		<lastmod>2020-05-22T15:32:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-erkang-zhengs-cloud-based-contextual-analysis-as-code/</loc>
		<lastmod>2020-05-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/are-your-vendors-compromising-your-compliance/</loc>
		<lastmod>2020-05-22T16:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/as-hackers-sell-8-million-user-records-home-chef-confirms-data-breach/</loc>
		<lastmod>2020-05-22T16:03:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/signal-introduces-pins-slowly-moves-to-end-reliance-on-phone-numbers-as-security-measure/</loc>
		<lastmod>2020-05-22T16:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/devsecops-delivered-nexus-iq-google-chrome-extension/</loc>
		<lastmod>2020-05-22T16:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-joy-of-tech-faceid/</loc>
		<lastmod>2020-05-22T17:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-rene-kolgas-rendering-ransomware-detection-and-edr-products-blind/</loc>
		<lastmod>2020-05-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/data-breaches-and-security-incidents-surged-to-record-high-in-2019-verizon-report-shows/</loc>
		<lastmod>2020-05-22T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/train-test-and-certify-from-home/</loc>
		<lastmod>2020-05-22T19:44:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/iceberg-networks-at-servicenow-knowledge-2020/</loc>
		<lastmod>2020-05-22T20:12:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/understanding-stopping-malicious-redirects/</loc>
		<lastmod>2020-05-22T20:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/webinar-managing-tech-due-diligence-from-a-social-distance/</loc>
		<lastmod>2020-05-22T20:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/6-challenges-new-cisos-face-in-assessing-breach-risk/</loc>
		<lastmod>2020-05-22T21:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/seven-security-misconfigurations-in-java-web-xml-files/</loc>
		<lastmod>2020-05-22T22:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/state-government-technology-response-to-covid-19-2/</loc>
		<lastmod>2020-05-23T06:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/riding-the-state-unemployment-fraud-wave/</loc>
		<lastmod>2020-05-23T13:40:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/types-of-encryption-5-encryption-algorithms-how-to-choose-the-right-one/</loc>
		<lastmod>2020-05-23T14:53:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-david-frenchs-a-chain-is-no-stronger-than-its-weakest-lnk/</loc>
		<lastmod>2020-05-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/zak-weinersmiths-saturday-morning-breakfast-cereal-social/</loc>
		<lastmod>2020-05-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-jason-bertmans-wifi-pineapple-active-detection-via-a-raspberry-pi-zero/</loc>
		<lastmod>2020-05-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-imperva-advanced-mesh-topology-keeps-canadian-data-in-country/</loc>
		<lastmod>2020-05-24T08:40:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/is-covid-19-making-the-internet-sick/</loc>
		<lastmod>2020-05-24T12:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-eddie-glenns-how-to-use-code-signing-to-protect-your-critical-software/</loc>
		<lastmod>2020-05-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/robert-m-lees-jeff-haas-little-bobby-comics-week-278/</loc>
		<lastmod>2020-05-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-waylon-granges-badge-talk/</loc>
		<lastmod>2020-05-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/apples-law-enforcement-backdoor-dispute-signal-pins-easyjet-data-breach/</loc>
		<lastmod>2020-05-25T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/biometric-technology-in-our-everyday-life/</loc>
		<lastmod>2020-05-25T05:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/addressing-the-skills-gap-through-fortinets-cybersecurity-awareness-training-2/</loc>
		<lastmod>2020-05-25T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/addressing-the-skills-gap-through-fortinets-cybersecurity-awareness-training/</loc>
		<lastmod>2020-05-25T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/memorial-day-2020/</loc>
		<lastmod>2020-05-25T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/growing-threat-of-destructive-attacks-is-one-of-the-top-cyber-risks-organizations-face/</loc>
		<lastmod>2020-05-25T08:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/passwords-in-the-age-of-iot/</loc>
		<lastmod>2020-05-25T11:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-should-you-teach-cybersecurity-to-your-kids/</loc>
		<lastmod>2020-05-25T14:13:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-covid-19-themed-malware-campaign-spreading-through-emails/</loc>
		<lastmod>2020-05-25T14:21:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-much-can-i-make-in-cybersecurity/</loc>
		<lastmod>2020-05-25T14:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/observing-a-privacy-milestone-expert-thoughts-on-gdprs-2nd-anniversary/</loc>
		<lastmod>2020-05-25T16:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/u-s-elections-effectively-balancing-access-and-security/</loc>
		<lastmod>2020-05-25T16:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/avasts-tetiana-pasko-honored-by-crn-women-of-the-channel-avast/</loc>
		<lastmod>2020-05-25T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/better-business-days-to-follow-our-channel-partners-confirm-it/</loc>
		<lastmod>2020-05-25T18:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/companies-overwhelmingly-expect-security-risks-from-work-from-home-employees-survey-shows/</loc>
		<lastmod>2020-05-25T18:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/rswitch-1-7-0-has-been-released/</loc>
		<lastmod>2020-05-25T19:20:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/accuracy-in-appsec-is-critical-to-reducing-false-positives/</loc>
		<lastmod>2020-05-26T05:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/moving-sd-wan-from-a-stand-alone-appliance-to-a-feature-in-a-security-platform/</loc>
		<lastmod>2020-05-26T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/moving-sd-wan-from-a-stand-alone-appliance-to-a-feature-in-a-security-platform-2/</loc>
		<lastmod>2020-05-26T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/21st-century-remote/</loc>
		<lastmod>2020-05-26T07:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/security-in-kubernetes-environment/</loc>
		<lastmod>2020-05-26T08:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/climbing-the-vulnerability-management-mountain-reaching-the-summit-vm-maturity-level-5/</loc>
		<lastmod>2020-05-26T08:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-protect-the-future-of-it/</loc>
		<lastmod>2020-05-26T08:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/doj-continues-to-target-chinas-thousand-talents-program-in-u-s/</loc>
		<lastmod>2020-05-27T06:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Huawei-Indicted-China.jpg</image:loc>
			<image:title><![CDATA[China Spy Pleads Guilty]]></image:title>
			<image:caption><![CDATA[Thousand Talents Program]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/enable-secure-dynamic-network-access-with-sase/</loc>
		<lastmod>2020-05-27T07:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Evolution-Network-Security.jpg</image:loc>
			<image:title><![CDATA[Sophos]]></image:title>
			<image:caption><![CDATA[SASE]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/securing-data-in-cloud-email-and-messaging-applications/</loc>
		<lastmod>2020-05-26T10:21:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/as-uk-data-breach-reports-drop-britains-privacy-watchdog-reveals-surge-in-other-cyber-incidents/</loc>
		<lastmod>2020-05-26T10:46:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/evaluating-client-side-web-security-questions-to-ask-your-vendor/</loc>
		<lastmod>2020-05-26T10:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/my-first-onsite-social-engineering-engagement-pretenders-assemble/</loc>
		<lastmod>2020-05-26T11:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/updated-anarchygrabber-steals-passwords-spreads-to-discord-friends/</loc>
		<lastmod>2020-05-26T11:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bluetooth-vulnerability-bias/</loc>
		<lastmod>2020-05-26T11:54:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/iec-61850-meets-iec-62351-securing-goose-power-grid-weaknesses/</loc>
		<lastmod>2020-05-26T11:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/there-may-be-trouble-ahead/</loc>
		<lastmod>2020-05-26T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/unc0ver-hackers-find-new-zero-day-bug-to-jailbreak-ios-13-5/</loc>
		<lastmod>2020-05-26T12:43:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/akamai-tool-detects-suspicious-javascript-code/</loc>
		<lastmod>2020-05-26T12:58:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/FreeTool.jpg</image:loc>
			<image:title><![CDATA[FreeTool]]></image:title>
			<image:caption><![CDATA[Akamai JavaScript]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/extortion-campaign-targeting-online-shops-threatens-to-sell-customer-database-unless-ransom-is-paid/</loc>
		<lastmod>2020-05-26T12:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/whats-the-cost-of-not-implementing-a-vendor-management-platform/</loc>
		<lastmod>2020-05-26T13:39:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/global-saas-leader-chooses-firemon-to-automate-network-security-heres-why/</loc>
		<lastmod>2020-05-26T13:46:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/gartner-5-things-you-must-absolutely-get-right-for-secure-iaas-and-paas/</loc>
		<lastmod>2020-05-26T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-owasp-zap-hud/</loc>
		<lastmod>2020-05-26T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-tech-silverfort-helps-companies-carry-out-smarter-human-and-machine-authentications/</loc>
		<lastmod>2020-05-26T14:09:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/price-of-access-to-corporate-networks-on-the-dark-web-went-up-in-2020/</loc>
		<lastmod>2020-05-26T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/uncovering-memory-defects-in-cereal-cve-2020-11104-cve-2020-11105-3/</loc>
		<lastmod>2020-05-26T16:31:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/exabeam-extends-security-reach-to-multiple-cloud-services/</loc>
		<lastmod>2020-05-26T15:49:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Risk-Cloud-Security.jpg</image:loc>
			<image:caption><![CDATA[Exabeam]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/Exabeam-AA-Dashboard-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-will-pearces-it-is-the-year-200-we-are-robots/</loc>
		<lastmod>2020-05-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-avast-video-series-garry-on-lockdown-avast/</loc>
		<lastmod>2020-05-26T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-threat-intelligence-is-central-to-effective-vulnerability-prioritization/</loc>
		<lastmod>2020-05-26T16:35:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/is-ebay-port-scanning-your-pc-probably/</loc>
		<lastmod>2020-05-26T16:51:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/ebay-kazuhisa-otsubo-cc-by.jpg</image:loc>
			<image:title><![CDATA[ebay--kazuhisa-otsubo--cc-by]]></image:title>
			<image:caption><![CDATA[eBay]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/certifications-compared-linux-vs-rhcsa-rhce/</loc>
		<lastmod>2020-05-26T16:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/recruiting-externally-vs-training-internally-5-tips-to-improve-your-cybersecurity-talent-pipeline-in-2020/</loc>
		<lastmod>2020-05-26T16:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/6-tips-for-getting-a-salary-increase-in-cybersecurity/</loc>
		<lastmod>2020-05-26T16:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-great-attractor/</loc>
		<lastmod>2020-05-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/gdpr-2-years-on/</loc>
		<lastmod>2020-05-26T17:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/drop-the-knife-and-back-away-from-the-appsec-budget/</loc>
		<lastmod>2020-05-26T17:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/is-covid-19-changing-facial-recognition-for-good/</loc>
		<lastmod>2020-05-26T17:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/querying-detailed-whole-program-representations-with-100mil-loc-on-commodity-hardware/</loc>
		<lastmod>2020-05-26T17:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-adam-fishers-bola-idor-ma-bfla-welcome-to-the-owasp-api-top-10/</loc>
		<lastmod>2020-05-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/critical-security-considerations-for-a-cloud-based-contact-centre/</loc>
		<lastmod>2020-05-26T18:25:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-the-role-of-the-modern-security-analyst-is-changing/</loc>
		<lastmod>2020-05-26T18:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/verizon-data-breach-investigations-report-finds-an-increase-in-web-application-breaches/</loc>
		<lastmod>2020-05-26T18:36:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/aes-encryption-a-closer-look-at-advanced-encryption-standards/</loc>
		<lastmod>2020-05-26T18:37:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/white-house-press-secretary-accidentally-reveals-trumps-private-banking-info/</loc>
		<lastmod>2020-05-26T18:47:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/understanding-the-role-of-dfars-in-cmmc/</loc>
		<lastmod>2020-05-26T19:06:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/contrast-security-further-expands-industrys-broadest-iast-language-support-with-the-addition-of-python/</loc>
		<lastmod>2020-05-26T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-3-reasons-cvss-scores-change-over-time/</loc>
		<lastmod>2020-05-26T19:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/record-0-second-sla-pps-mitigation/</loc>
		<lastmod>2020-05-26T20:42:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/newsbites-drilldown-for-the-week-ending-22-may-2020/</loc>
		<lastmod>2020-05-26T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cyberthreats-during-the-pandemic-are-on-the-rise/</loc>
		<lastmod>2020-05-26T21:32:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/report-atm-skimmer-gang-had-protection-from-mexican-attorney-generals-office/</loc>
		<lastmod>2020-05-26T21:45:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/sucuri-presents-sucuri-sit-down-and-sucuri-sync-up-podcast-series/</loc>
		<lastmod>2020-05-27T03:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/devsecops-in-safety-critical-avionics-software-and-the-role-of-static-analysis/</loc>
		<lastmod>2020-05-27T04:02:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/protecting-fleet-data-from-security-threats/</loc>
		<lastmod>2020-05-27T06:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/benchmarking-performance-with-the-security-compute-rating/</loc>
		<lastmod>2020-05-27T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fortinet-survey-uncovers-critical-insights-for-addressing-the-growing-skills-gap-fortinet/</loc>
		<lastmod>2020-05-27T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/benchmarking-performance-with-the-security-compute-rating-2/</loc>
		<lastmod>2020-05-27T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fortinet-survey-uncovers-critical-insights-for-addressing-the-growing-skills-gap-fortinet-2/</loc>
		<lastmod>2020-05-27T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/doctor-i-think-you-are-on-mute/</loc>
		<lastmod>2020-05-27T07:18:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/python-and-go-top-the-chart-of-2019s-most-popular-hacking-tools/</loc>
		<lastmod>2020-05-27T09:22:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/planning-a-secure-transition-from-wfh-to-the-office/</loc>
		<lastmod>2020-05-28T06:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Security-Professionals.jpg</image:loc>
			<image:title><![CDATA[Security-Professionals]]></image:title>
			<image:caption><![CDATA[remote work security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-mitre-attck-framework-exfiltration/</loc>
		<lastmod>2020-05-27T10:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-the-coronavirus-lockdown-is-changing-the-vpn-landscape/</loc>
		<lastmod>2020-05-28T07:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Mission-Based-PAM.jpg</image:loc>
			<image:title><![CDATA[Mission-Based-PAM]]></image:title>
			<image:caption><![CDATA[VPNs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/websites-conducting-port-scans/</loc>
		<lastmod>2020-05-27T11:45:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/verifying-windows-binaries-without-windows/</loc>
		<lastmod>2020-05-27T11:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tech-rules-lets-celebrate-techstrong-con/</loc>
		<lastmod>2020-05-27T12:36:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/Screen-Shot-2020-05-05-at-7.26.48-AM.png</image:loc>
			<image:title><![CDATA[Screen Shot 2020-05-05 at 7.26.48 AM]]></image:title>
			<image:caption><![CDATA[TechStrong Con]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-is-digital-risk-protection/</loc>
		<lastmod>2020-05-27T12:43:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/airbonne-international-discloses-data-breach-affecting-thousands-of-californians/</loc>
		<lastmod>2020-05-27T12:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/fbi-officials-arrest-another-alleged-fin7-gang-member/</loc>
		<lastmod>2020-05-27T13:05:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-build-hands-on-cybersecurity-skills-on-a-budget/</loc>
		<lastmod>2020-05-27T13:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/overview-of-phishing-techniques-fake-invoice-bills/</loc>
		<lastmod>2020-05-27T13:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/funicorn-ransomware-masquerading-as-covid-19-contact-tracing-app/</loc>
		<lastmod>2020-05-27T13:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/26-million-livejournal-users-warned-that-their-passwords-have-been-breached/</loc>
		<lastmod>2020-05-27T13:41:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/insight-5-27-2020-samson/</loc>
		<lastmod>2020-05-27T14:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-you-should-be-securing-access-to-web-applications/</loc>
		<lastmod>2020-05-27T14:30:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/manual-application-vulnerability-management-delays-innovation-while-increasing-business-risk/</loc>
		<lastmod>2020-05-27T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/network-vulnerability-it-may-not-mean-what-you-think-it-means/</loc>
		<lastmod>2020-05-27T15:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-manage-the-pen-testing-skills-shortage/</loc>
		<lastmod>2020-05-27T15:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/open-vs-proprietary-protocols/</loc>
		<lastmod>2020-05-27T15:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-carrie-roberts-darin-roberts-cameron-roberts-the-domain-password-audit-tool/</loc>
		<lastmod>2020-05-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hacker-charged-in-germany-for-stealing-and-leaking-private-data-of-public-figures-and-politicians/</loc>
		<lastmod>2020-05-27T16:26:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/from-evolution-to-revolution/</loc>
		<lastmod>2020-05-27T16:53:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/there-will-always-be-successful-attacks-which-is-why-there-must-be-mdr/</loc>
		<lastmod>2020-05-27T16:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/menlo-security-and-vmware-partner-to-secure-workers-home/</loc>
		<lastmod>2020-05-27T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-joy-of-tech-facebook-grabs-giphy/</loc>
		<lastmod>2020-05-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cloud-security-5-serious-emerging-cloud-computing-threats-to-avoid/</loc>
		<lastmod>2020-05-27T17:09:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/secure-your-iot-devices-hackers-are-coming-for-them/</loc>
		<lastmod>2020-05-27T17:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-chriss-hansens-from-mattress-salesman-to-infosec-soldier/</loc>
		<lastmod>2020-05-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-security-teams-are-automating-according-to-a-new-sans-survey/</loc>
		<lastmod>2020-05-27T18:26:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-what-does-unemployment-have-to-do-with-load-balancing/</loc>
		<lastmod>2020-05-27T18:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tackling-cybercrime-in-a-distributed-workforce-environment/</loc>
		<lastmod>2020-05-27T18:46:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bug-hunting-stories-schneider-electric-the-andover-continuum-web-client/</loc>
		<lastmod>2020-05-27T19:21:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/uncovering-memory-defects-in-cereal-cve-2020-11104-cve-2020-11105/</loc>
		<lastmod>2020-05-27T19:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/rsa-conference-2021-moves-to-may/</loc>
		<lastmod>2020-05-27T20:07:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/wtf-is-devsecops/</loc>
		<lastmod>2020-05-27T20:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/frequency-speed-and-accuracy-are-a-match-made-in-appsec-heaven/</loc>
		<lastmod>2020-05-27T20:55:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/3-questions-your-board-has-about-cybersecurity/</loc>
		<lastmod>2020-05-27T20:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/modern-cyber-defense-books/</loc>
		<lastmod>2020-05-27T21:04:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cracking-the-code-to-a-successful-remediation-plan/</loc>
		<lastmod>2020-05-27T21:55:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/6-mistakes-to-avoid-when-choosing-a-managed-services-provider/</loc>
		<lastmod>2020-05-27T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/new-release-of-securecloud-adds-compliance-reports-for-cis-benchmarks/</loc>
		<lastmod>2020-05-27T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-political-candidates-are-abusing-tracking-technologies-avast/</loc>
		<lastmod>2020-05-27T22:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/findings-from-the-2020-verizon-data-breach-investigations-report/</loc>
		<lastmod>2020-05-27T23:01:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/business-continuity-requires-infrastructure-continuity-in-times-of-remote-working/</loc>
		<lastmod>2020-05-28T05:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-growing-need-for-4g-and-5g-radio-access-network-ran-security/</loc>
		<lastmod>2020-05-28T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-growing-need-for-4g-and-5g-radio-access-network-ran-security-2/</loc>
		<lastmod>2020-05-28T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-business-benefits-of-containers/</loc>
		<lastmod>2020-05-28T08:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/another-day-another-significant-data-breach-what-we-know-about-the-easyjet-cyber-attack/</loc>
		<lastmod>2020-05-28T10:06:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/self-supervised-learning-the-third-wave-in-cybersecurity-ai/</loc>
		<lastmod>2020-05-28T10:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/84-of-businesses-are-likely-to-expand-wfh-ability-despite-security-risks-is-remote-work-becoming-the-new-normal/</loc>
		<lastmod>2020-05-28T11:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/law-firm-phishing-still-top-cause-of-data-security-incidents/</loc>
		<lastmod>2020-05-28T11:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/snake-ransomware-slithers-into-the-light/</loc>
		<lastmod>2020-05-29T06:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/canstockphoto1950064.jpg</image:loc>
			<image:title><![CDATA[canstockphoto1950064]]></image:title>
			<image:caption><![CDATA[Snake]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/snake-ransom-demanding-message.jpg</image:loc>
			<image:caption><![CDATA[snake ransom demanding message]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cloud-security-tips-for-distributed-companies/</loc>
		<lastmod>2020-05-29T08:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Point-Solution-Mindset.jpg</image:loc>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/time-to-talk-governance-managing-access-in-the-new-workplace/</loc>
		<lastmod>2020-05-28T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-the-next-major-hack-is-just-around-the-bend/</loc>
		<lastmod>2020-05-28T13:08:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/threat-actors-impersonate-brands-on-social-media-for-malicious-purposes/</loc>
		<lastmod>2020-05-28T13:23:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/scanning-an-application-in-docker-using-acusensor-for-java/</loc>
		<lastmod>2020-05-28T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-is-directory-listing-dangerous/</loc>
		<lastmod>2020-05-28T13:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-is-the-beast-attack/</loc>
		<lastmod>2020-05-28T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-are-google-hacks/</loc>
		<lastmod>2020-05-28T13:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-use-the-acunetix-business-logic-recorder/</loc>
		<lastmod>2020-05-28T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/acunetix-update-introduces-business-logic-recorder-cvss-3-1-scoring-and-support-for-citrix-waf-and-the-azure-devops-services-issue-tracker/</loc>
		<lastmod>2020-05-28T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/most-common-security-vulnerabilities-acunetix-web-application-vulnerability-report-2020/</loc>
		<lastmod>2020-05-28T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/even-the-mightiest-fall-an-sql-injection-in-sophos-xg-firewall/</loc>
		<lastmod>2020-05-28T13:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/the-challenges-for-security-teams-the-bangladesh-e-gov-cirt/</loc>
		<lastmod>2020-05-28T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/department-of-homeland-security-cybersecurity-top-10-vulnerabilities-still-being-exploited/</loc>
		<lastmod>2020-05-28T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ghosting-bots-the-story-of-hoaxcalls-failures/</loc>
		<lastmod>2020-05-28T14:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bitglass-and-the-rise-of-the-remote-workforce/</loc>
		<lastmod>2020-05-28T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hackerone-celebrates-100-million-in-bounties-paid/</loc>
		<lastmod>2020-05-28T14:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/hungry-for-automated-security-controls-try-these-recipes/</loc>
		<lastmod>2020-05-28T14:46:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cloud-based-firewalls-are-key-to-protecting-employees-while-working-remotely/</loc>
		<lastmod>2020-05-28T15:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/rangeforce-and-first-step-mea-roll-out-cloud-platform-for-cybersecurity-training-in-middle-east/</loc>
		<lastmod>2020-05-28T15:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/microsoft-warns-of-ponyfinal-ransomware-attacks/</loc>
		<lastmod>2020-05-28T15:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-a-modern-data-platform-can-power-a-future-ready-digital-business/</loc>
		<lastmod>2020-05-28T15:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/legacy-sast-and-the-fallacy-of-100-code-coverage/</loc>
		<lastmod>2020-05-28T15:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/advanced-endpoint-security-in-the-new-covid-19-world/</loc>
		<lastmod>2020-05-28T15:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-carlota-sages-how-me-the-money-getting-business-buy-in/</loc>
		<lastmod>2020-05-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/uk-ad-campaign-seeks-to-deter-cybercrime/</loc>
		<lastmod>2020-05-28T16:19:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-9-types-of-security-vulnerabilities/</loc>
		<lastmod>2020-05-28T16:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-confidence-interval/</loc>
		<lastmod>2020-05-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/working-from-home-the-new-threat-frontier/</loc>
		<lastmod>2020-05-28T17:05:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/secure-your-wordpress-login-with-these-easy-to-use-plugins/</loc>
		<lastmod>2020-05-28T17:27:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ck-00-ctf-walkthrough-part-1/</loc>
		<lastmod>2020-05-28T17:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/should-you-phish-test-your-remote-workforce/</loc>
		<lastmod>2020-05-28T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/managing-atos-when-online-engagement-is-at-a-peak-video-blog/</loc>
		<lastmod>2020-05-28T17:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-sase-can-stop-cyberattackers-in-their-tracks/</loc>
		<lastmod>2020-05-28T17:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Public-Private-Cybercriminals.jpg</image:loc>
			<image:title><![CDATA[Public-Private-Cybercriminals]]></image:title>
			<image:caption><![CDATA[Public-Private Partnership Takes Down Cybercriminals]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-dale-rowes-how-can-i-get-started-in-cybersecurity/</loc>
		<lastmod>2020-05-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/alert-logic-threat-research-team-identifies-new-vulnerability-cve-2020-12675-in-mappress-plugin-for-wordpress/</loc>
		<lastmod>2020-05-28T18:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/operationalize-threat-intelligence-with-security-validation-to-improve-cyber-defenses-by-lynn-harrington/</loc>
		<lastmod>2020-05-28T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/phantomlance-a-story-of-statecraft-software-espionage-security-mismanagement-and-apt32/</loc>
		<lastmod>2020-05-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-friday-15-all-about-pam-in-15-minutes/</loc>
		<lastmod>2020-05-28T19:55:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-is-vulnerability-management/</loc>
		<lastmod>2020-05-28T20:06:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/secure-development-without-sacrificing-innovation-and-speed/</loc>
		<lastmod>2020-05-28T20:45:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/netwalker-ransomware-what-you-need-to-know/</loc>
		<lastmod>2020-05-28T21:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/ponyfinal-ransomware-delivered-by-extended-human-operated-attacks/</loc>
		<lastmod>2020-05-28T21:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/meet-the-victims-of-online-scams/</loc>
		<lastmod>2020-05-28T22:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/google-chat-security-safety-for-k-12-remote-learning/</loc>
		<lastmod>2020-05-28T23:28:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-is-ebay-port-scanning-my-computer-avast/</loc>
		<lastmod>2020-05-28T23:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/video-recap-of-avasts-cybersecai-2019-the-event-of-the-year/</loc>
		<lastmod>2020-05-28T23:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/is-covid-19-making-the-internet-sick-2/</loc>
		<lastmod>2020-05-28T23:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/is-all-fim-software-equal/</loc>
		<lastmod>2020-05-29T01:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-implement-cross-site-scripting-prevention/</loc>
		<lastmod>2020-05-29T01:39:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/wordpress-file-permissions-complete-beginners-guide/</loc>
		<lastmod>2020-05-29T01:41:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/is-wordpress-secure-as-a-website-building-platform/</loc>
		<lastmod>2020-05-29T01:53:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/episode-100-with-rachel-tobac-and-kathleen-smith/</loc>
		<lastmod>2020-05-29T04:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/a-complete-guide-to-website-blacklist-removal/</loc>
		<lastmod>2020-05-29T04:35:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/top-5-shared-hosting-security-risks-and-how-to-prevent-them/</loc>
		<lastmod>2020-05-29T04:49:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-to-fix-error-preventing-possible-attempt-to-enumerate-users-2-easy-ways/</loc>
		<lastmod>2020-05-29T04:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/government-healthcare-entity-expands-secure-covid-19-testing-sites-with-fortinet/</loc>
		<lastmod>2020-05-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/managed-services-provider-enables-secure-telephony-for-healthcare-with-fortinet/</loc>
		<lastmod>2020-05-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/government-healthcare-entity-expands-secure-covid-19-testing-sites-with-fortinet-2/</loc>
		<lastmod>2020-05-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/managed-services-provider-enables-secure-telephony-for-healthcare-with-fortinet-2/</loc>
		<lastmod>2020-05-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/48-of-uk-public-believes-cybercriminals-will-abuse-nhs-covid-19-tracing-app/</loc>
		<lastmod>2020-05-29T08:43:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/russian-sandworm-hackers-attacking-exim-email-servers-says-nsa/</loc>
		<lastmod>2020-05-29T09:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/is-your-corporate-access-data-for-sale-on-the-dark-web/</loc>
		<lastmod>2020-06-01T06:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/dmv-for-sale-brian-cantoni-cc-by.jpg</image:loc>
			<image:title><![CDATA[dmv-for-sale--brian-cantoni--cc-by]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/loginradius-launches-consent-management-to-support-the-eus-gdpr-compliance/</loc>
		<lastmod>2020-05-29T10:45:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/enemy-unseen-part-i-how-the-dark-web-is-shaping-cybercrime/</loc>
		<lastmod>2020-05-29T10:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/executives-bypass-security-protocols-for-fear-it-admins-might-peek-into-their-private-lives/</loc>
		<lastmod>2020-05-29T10:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/facebook-announces-messenger-security-features-that-dont-compromise-privacy/</loc>
		<lastmod>2020-05-29T11:37:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/detecting-bad-openssl-usage/</loc>
		<lastmod>2020-05-29T11:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bigfooty-com-leaks-70-million-records-from-sports-fan-members/</loc>
		<lastmod>2020-05-29T11:57:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/japanese-telecoms-giant-ntt-suffers-data-breach-takes-four-days-to-learn-of-intrusion/</loc>
		<lastmod>2020-05-29T12:02:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/sandworm-team-exploiting-vulnerability-in-exim-mail-transfer-agent/</loc>
		<lastmod>2020-05-29T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-most-surprising-cybersecurity-weaknesses-every-ceo-should-know-about-by-major-general-earl-matthews-usaf-ret/</loc>
		<lastmod>2020-05-29T14:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/5-ways-url-analysis-and-enrichment-benefits-managed-service-providers/</loc>
		<lastmod>2020-05-29T15:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/5-advantages-of-the-principle-of-least-privilege/</loc>
		<lastmod>2020-05-29T15:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/most-apps-use-vulnerable-open-source-libraries-veracode-research-shows/</loc>
		<lastmod>2020-05-29T15:03:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/my-take-technologists-privacy-advocates-point-to-flaws-in-the-apple-google-covid-19-tracing-app/</loc>
		<lastmod>2020-05-29T15:05:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/pablo-escobars-brother-says-facetime-flaw-revealed-his-address-sues-apple-for-a-publicity-stunt-and-2-6-billion/</loc>
		<lastmod>2020-05-29T15:19:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/financial-sector-business-leaders-targeted-by-cyberattacks-from-india/</loc>
		<lastmod>2020-05-29T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-jason-reverris-nibb13-minemeld-theres-gold-in-them-thar-hills/</loc>
		<lastmod>2020-05-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/accelerating-productivity-digital-value-streams-and-devsecops-during-covid-19/</loc>
		<lastmod>2020-05-29T16:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-forensically-examine-phishing-emails/</loc>
		<lastmod>2020-06-01T07:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Phishing-Evolving-Threat.jpg</image:loc>
			<image:title><![CDATA[Phishing-Evolving-Threat]]></image:title>
			<image:caption><![CDATA[phishing email]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/nsa-russia-hacking-u-s-firms-via-old-exim-flaw/</loc>
		<lastmod>2020-05-29T16:46:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/sandworm-alexander-semenov-cc-by.jpg</image:loc>
			<image:title><![CDATA[sandworm--alexander-semenov--cc-by]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/webinars-vulnerability-reports-application-security-for-devops-and-ci-cd/</loc>
		<lastmod>2020-05-29T16:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-joy-of-tech-how-to-get-people-to-wear-masks/</loc>
		<lastmod>2020-05-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/changemakers-data-ethics-and-how-to-save-the-web/</loc>
		<lastmod>2020-05-29T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cip/</loc>
		<lastmod>2020-05-29T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cmmc-compliance-with-gmail/</loc>
		<lastmod>2020-05-29T17:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/delphix-partner-spotlight-on-experior-tecnologia/</loc>
		<lastmod>2020-05-29T17:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-julia-knechts-and-jacob-lords-jumpstarting-your-appsec-program/</loc>
		<lastmod>2020-05-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/git-it-right-how-hackers-exploit-git-misconfigurations-what-to-do-about-it/</loc>
		<lastmod>2020-05-29T18:10:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/covid-19-lures-new-traps-for-old-scams/</loc>
		<lastmod>2020-05-29T18:17:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/techstrong-con-speaker-focus-chenxi-wang-rain-capital/</loc>
		<lastmod>2020-05-29T18:28:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/canstockphoto2765570.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2765570]]></image:title>
			<image:caption><![CDATA[TechStrong Con]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/bag.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-4-most-important-components-of-security-posture-part-1-asset-inventory/</loc>
		<lastmod>2020-05-29T18:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/why-manual-penetration-testing-and-automation-are-important-aspects-of-an-appsec-program/</loc>
		<lastmod>2020-05-29T19:55:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/announcing-devseccon24-2020-you-can-join-in-from-home/</loc>
		<lastmod>2020-05-29T19:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/not-so-safe-and-secure-ftc-settles-over-smart-lock-representations/</loc>
		<lastmod>2020-05-29T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/career-choice-tip-cybercrime-is-mostly-boring/</loc>
		<lastmod>2020-05-29T20:23:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/mark-orlando-instructor-spotlight/</loc>
		<lastmod>2020-05-29T21:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/assessing-an-emails-legitimacy/</loc>
		<lastmod>2020-05-29T23:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/who-needs-to-comply-with-pci-dss/</loc>
		<lastmod>2020-05-30T00:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/livejournal-hack-exposes-26m-old-credentials-avast/</loc>
		<lastmod>2020-05-30T00:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/should-you-trust-contact-tracing-apps-avast/</loc>
		<lastmod>2020-05-30T00:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/spiderfoot-and-the-dangers-of-doxing/</loc>
		<lastmod>2020-05-30T03:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/nsa-announces-sandworm-actors-exploiting-exim-mta-vulnerability-cve-2019-10149/</loc>
		<lastmod>2020-05-30T04:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/top-5-network-security-challenges-in-2020-and-beyond/</loc>
		<lastmod>2020-05-30T13:39:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-bart-lenaerts-ssh-keys-security-asset-or-liability/</loc>
		<lastmod>2020-05-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/xkcd-mbmbam/</loc>
		<lastmod>2020-05-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesslc-2020-bryce-kunz-closing-remarks-rumblings-ruminations-and-rants/</loc>
		<lastmod>2020-05-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/spacex-launch-america/</loc>
		<lastmod>2020-05-30T19:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/security-compliance-reports-with-scan/</loc>
		<lastmod>2020-05-30T19:47:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/saltstack-20-breaches-within-four-days/</loc>
		<lastmod>2020-05-31T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/octopus-malware-compromises-26-oss-projects-on-github/</loc>
		<lastmod>2020-05-31T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsides-2020-chris-moberlys-google-cloud-post-exploitation-tactics-techniques/</loc>
		<lastmod>2020-05-31T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/daniel-storis-skype-for-linux/</loc>
		<lastmod>2020-05-31T17:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bsidesatl-2020-andy-greens-opening-remarks/</loc>
		<lastmod>2020-05-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-is-boolean/</loc>
		<lastmod>2020-05-31T21:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tripwire-patch-priority-index-for-may-2020/</loc>
		<lastmod>2020-06-01T03:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/first-amendment-rights-and-twitter-encryption-backdoors/</loc>
		<lastmod>2020-06-01T04:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-cybersecurity-implications-of-5g-technology/</loc>
		<lastmod>2020-06-01T06:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fortinet-addresses-the-security-demands-of-todays-dynamic-cloud-environments/</loc>
		<lastmod>2020-06-01T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/researcher-reports-zero-day-sign-in-with-apple-bug-that-could-allow-full-account-takeover/</loc>
		<lastmod>2020-06-01T09:26:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/outsourcing-supply-chains-and-national-security/</loc>
		<lastmod>2020-06-01T10:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/qa-nists-new-enterprise-risk-management-guidelines-push-cyber-risks-to-board-level/</loc>
		<lastmod>2020-06-01T10:38:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/pci-dss-requirements-and-common-control-failures/</loc>
		<lastmod>2020-06-01T12:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/passenger-railroad-service-says-data-breach-might-have-affected-pii/</loc>
		<lastmod>2020-06-01T14:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/runsafe-security-launches-integration-with-yocto-project/</loc>
		<lastmod>2020-06-03T13:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/zooms-new-model-is-making-heads-hurt/</loc>
		<lastmod>2020-06-01T15:20:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/zoom-tj-lentz-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[Zoom, by T.J. Lentz (cc:by-sa)]]></image:title>
			<image:caption><![CDATA[Zoom]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-choose-the-right-cloud-access-security-broker/</loc>
		<lastmod>2020-06-01T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/assessing-security-protocols-during-remote-work/</loc>
		<lastmod>2020-06-02T06:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Privacy-Employees-Weakest.jpg</image:loc>
			<image:title><![CDATA[Privacy-Employees-Weakest]]></image:title>
			<image:caption><![CDATA[security remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/iot-and-vendors-how-to-stay-safe-2/</loc>
		<lastmod>2020-06-01T15:34:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-connect-yvette-johnsons-we-all-have-choices/</loc>
		<lastmod>2020-06-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/is-your-company-ready-for-soar/</loc>
		<lastmod>2020-06-02T07:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Behavioral-Biometrics-Signature.jpg</image:loc>
			<image:caption><![CDATA[SOAR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/robert-m-lees-jeff-haas-little-bobby-comics-week-279/</loc>
		<lastmod>2020-06-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/wi-fi-onboarding-captive-portal-best-practices/</loc>
		<lastmod>2020-06-01T17:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/matrix-3-ctf-walkthrough/</loc>
		<lastmod>2020-06-01T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/five-key-lessons-from-the-2020-u-s-cyberspace-solarium-commission-report/</loc>
		<lastmod>2020-06-01T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-connect-nir-yoshas-how-to-build-your-own-siem-with-open-source-tools-and-methodologies/</loc>
		<lastmod>2020-06-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-complete-guide-to-wireless-wi-fi-security/</loc>
		<lastmod>2020-06-01T18:02:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/sergeant-0-9-0-is-on-its-way-to-cran-mirrors/</loc>
		<lastmod>2020-06-01T18:06:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/best-tools-for-testing-wi-fi-mitm-attacks/</loc>
		<lastmod>2020-06-01T18:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cooking-up-better-security-incident-communications/</loc>
		<lastmod>2020-06-01T18:39:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cyber-security-roundup-for-june-2020/</loc>
		<lastmod>2020-06-01T19:51:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/newsbites-drilldown-for-the-week-ending-29-may-2020/</loc>
		<lastmod>2020-06-01T19:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/technology-is-critical-for-a-successful-soc-but-so-are-people/</loc>
		<lastmod>2020-06-01T19:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/three-ways-to-protect-your-it-network-avast/</loc>
		<lastmod>2020-06-01T19:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/8-most-common-attack-vectors/</loc>
		<lastmod>2020-06-01T20:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/qa-with-tech-trailblazer-gaurav-banga/</loc>
		<lastmod>2020-06-01T20:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-developers-need-a-supplemental-source-to-nvd-vulnerability-data/</loc>
		<lastmod>2020-06-01T20:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-a-man-in-the-middle-attack/</loc>
		<lastmod>2020-06-01T21:43:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/devops-meets-the-sporting-goods-industry/</loc>
		<lastmod>2020-06-01T21:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/enabling-double-encryption-for-zscaler-with-securew2s-cloud-pki/</loc>
		<lastmod>2020-06-01T22:05:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/wearedelphix-andrew-yobs/</loc>
		<lastmod>2020-06-02T00:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/lack-of-emphasis-on-secure-teleworking-is-a-national-security-risk/</loc>
		<lastmod>2020-06-02T02:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-find-fix-wordpress-pharma-hack/</loc>
		<lastmod>2020-06-02T02:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cybersecurity-must-be-an-integral-part-of-any-pandemic-response-plan-from-now-on/</loc>
		<lastmod>2020-06-02T05:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/microsoft-leans-on-intel-to-power-azure-confidential-computing/</loc>
		<lastmod>2020-06-02T06:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ccpa-enforcement-begins-in-july-and-this-time-its-for-real/</loc>
		<lastmod>2020-06-02T07:06:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/explore-the-security-of-phones-in-the-workplace-and-smart-devices-with-these-5-tips/</loc>
		<lastmod>2020-06-02T08:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/pennon-water-services-keeps-its-customer-experience-flowing-thanks-to-vonage-and-pci-pal/</loc>
		<lastmod>2020-06-02T08:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/compliance-costs-are-eating-security-budgets/</loc>
		<lastmod>2020-06-02T08:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/identity-theft-fraud-exploding-in-2020/</loc>
		<lastmod>2020-06-03T06:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Security-Mistakes.jpg</image:loc>
			<image:title><![CDATA[danger]]></image:title>
			<image:caption><![CDATA[breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/challenges-of-a-new-ciso-the-first-year/</loc>
		<lastmod>2020-06-03T07:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Security-Leaders-Relevant.jpg</image:loc>
			<image:title><![CDATA[Security-Leaders-Relevant]]></image:title>
			<image:caption><![CDATA[new CISO]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-breach-at-independent-artist-marketplace-affects-5-million-users/</loc>
		<lastmod>2020-06-02T10:46:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-type-of-email-encryption-is-right-for-your-organization/</loc>
		<lastmod>2020-06-02T11:03:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/hybrid-ddos-protection-is-like-a-faulty-airbag/</loc>
		<lastmod>2020-06-02T11:18:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/amtrak-announces-data-breach-and-potential-leak-of-guest-rewards-account-information/</loc>
		<lastmod>2020-06-02T11:38:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/encryption-privacy-%e2%89%a0-security/</loc>
		<lastmod>2020-06-02T11:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/contact-tracing-de-mystifying-how-an-app-designed-to-track-people-can-ensure-user-privacy-and-security/</loc>
		<lastmod>2020-06-02T11:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-considerations-for-the-dynamic-workforce/</loc>
		<lastmod>2020-06-02T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/password-changing-after-a-breach/</loc>
		<lastmod>2020-06-02T12:27:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/create-wordpress-staging-environment-a-0-to-1-guide/</loc>
		<lastmod>2020-06-02T13:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/moving-fast-without-api-guardrails/</loc>
		<lastmod>2020-06-02T13:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/seczetta-strengthens-commitment-to-women-in-cybersecurity-signing-two-new-partnerships-with-wbenc-certified-women-owned-cybersecurity-companies/</loc>
		<lastmod>2020-06-02T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/pam-as-a-service-its-all-a-matter-of-trust/</loc>
		<lastmod>2020-06-02T13:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/social-media-platforms-latest-channels-used-to-leak-sensitive-data/</loc>
		<lastmod>2020-06-02T14:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/acknowledging-5-common-gaps-in-existing-security-infrastructure/</loc>
		<lastmod>2020-06-02T14:15:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-fast-feedback-is-critical-for-developer-success/</loc>
		<lastmod>2020-06-02T14:22:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/devops-assurance-with-owasp-samm/</loc>
		<lastmod>2020-06-02T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/salt-security-named-a-cool-vendor-in-api-strategy-by-gartner/</loc>
		<lastmod>2020-06-02T14:38:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/joomla-open-source-cms-affected-by-data-breach/</loc>
		<lastmod>2020-06-02T14:55:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-takeaways-from-bitdefenders-2019-hacked-off-report/</loc>
		<lastmod>2020-06-02T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-scan-email-headers-for-phishing-and-malicious-content/</loc>
		<lastmod>2020-06-02T14:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/abandoned-mobile-apps-are-a-security-problem-research-finds/</loc>
		<lastmod>2020-06-02T14:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-catalog-vendors-with-access-to-your-network/</loc>
		<lastmod>2020-06-02T15:12:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-3-technical-barriers-to-fuzzing-3/</loc>
		<lastmod>2020-06-02T16:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/five-step-ueba-to-detect-and-stop-insider-attacks/</loc>
		<lastmod>2020-06-02T15:53:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/managing-cybersecurity-risks-up-down-the-supply-chain/</loc>
		<lastmod>2020-06-02T15:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-connect-eddie-glenns-software-supply-chains-and-code-to-code-combat/</loc>
		<lastmod>2020-06-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-easily-modernize-access-to-your-peoplesoft-applications/</loc>
		<lastmod>2020-06-02T16:28:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-look-at-the-2020-network-and-application-threat-landscape/</loc>
		<lastmod>2020-06-02T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/black-duck-audits-not-just-for-ma/</loc>
		<lastmod>2020-06-02T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/experts-discuss-where-data-security-and-data-privacy-meet/</loc>
		<lastmod>2020-06-02T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-joy-of-tech-will-you-use-a-contact-tracing-app/</loc>
		<lastmod>2020-06-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-connect-nawwar-kabbanis-exploiting-oauth-2-0-and-openid-connect/</loc>
		<lastmod>2020-06-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/revil-ransomware-gang-starts-auctioning-victim-data/</loc>
		<lastmod>2020-06-02T18:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/we-stand-together-against-racism-black-lives-matter/</loc>
		<lastmod>2020-06-02T18:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/using-covid-19-to-create-meaningful-change-and-accelerate-your-career/</loc>
		<lastmod>2020-06-02T18:41:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-best-practices-for-tls-certificate-management-keyfactor/</loc>
		<lastmod>2020-06-02T18:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ursnif-gozi-delivery-old-school-excel-macro-4-0-utilization-uptick-and-the-ocr-heuristics-bypass/</loc>
		<lastmod>2020-06-02T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/looks-can-be-deceiving-context-and-the-new-normative-in-log-and-event-analysis/</loc>
		<lastmod>2020-06-02T19:08:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-5-endpoint-misconfigurations-that-open-security-gaps-whitepaper/</loc>
		<lastmod>2020-06-02T20:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-3-technical-barriers-to-fuzzing/</loc>
		<lastmod>2020-06-02T20:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-road-to-devsecops-addressing-the-challenges-of-open-source-software/</loc>
		<lastmod>2020-06-02T20:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/rooting/</loc>
		<lastmod>2020-06-02T21:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-signs-its-time-to-fire-your-vulnerability-management-solution/</loc>
		<lastmod>2020-06-02T23:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/small-and-mid-sized-businesses-are-under-cyber-attack/</loc>
		<lastmod>2020-06-02T23:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-5-steps-to-immerse-yourself-into-the-cybersecurity-field/</loc>
		<lastmod>2020-06-03T01:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/partners-ensure-business-continuity-for-ongoing-remote-work-initiatives/</loc>
		<lastmod>2020-06-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-related-cyber-attacks-explained-exploiting-fud-fortiguard-labs/</loc>
		<lastmod>2020-06-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/partners-ensure-business-continuity-for-ongoing-remote-work-initiatives-fortinet/</loc>
		<lastmod>2020-06-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/securing-connections-in-the-cloud-and-across-all-your-iot-devices-fortinet/</loc>
		<lastmod>2020-06-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/securing-connections-in-the-cloud-and-across-all-your-iot-devices/</loc>
		<lastmod>2020-06-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-related-cyber-attacks-explained-exploiting-fud/</loc>
		<lastmod>2020-06-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/healthcare-is-20-years-behind-banks-on-cybersecurity-in-canada-experts-say/</loc>
		<lastmod>2020-06-03T09:45:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-breach-litigation-waivers-be-careful-what-you-wish-for/</loc>
		<lastmod>2020-06-04T06:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Biometrics-Technology-Law.jpg</image:loc>
			<image:title><![CDATA[Biometrics-Technology-Law]]></image:title>
			<image:caption><![CDATA[litigation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/automation-helping-speed-vulnerability-response/</loc>
		<lastmod>2020-06-04T07:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17786197.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17786197]]></image:title>
			<image:caption><![CDATA[automation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-teams-unprepared-for-covid-19-cyberthreats-according-to-primary-research-study/</loc>
		<lastmod>2020-06-03T12:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/questions-to-ask-compromised-password-monitoring-vendors/</loc>
		<lastmod>2020-06-03T12:17:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/1touch-io-secures-14m-series-a-funding-round/</loc>
		<lastmod>2020-06-03T12:31:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/coincheck-cryptocurrency-exchange-targeted-by-hackers-customer-emails-exposed/</loc>
		<lastmod>2020-06-03T12:49:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-forgerock-consumer-identity-breach-report-the-battle-to-contain-unauthorized-access/</loc>
		<lastmod>2020-06-03T12:50:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/beware-the-security-threats-from-remote-working/</loc>
		<lastmod>2020-06-03T12:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/is-your-aws-data-secure-and-compliant-cloud-database-visibility-in-minutes/</loc>
		<lastmod>2020-06-03T13:12:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/podcast-webinar-recap-whats-new-in-ethical-hacking/</loc>
		<lastmod>2020-06-03T13:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mukashi-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-06-03T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-rise-of-phishing-attacks-p-s-iloveyou/</loc>
		<lastmod>2020-06-03T14:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-reduce-your-attack-surface-with-system-hardening/</loc>
		<lastmod>2020-06-03T14:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/mapeando-el-mitre-attck-framework-a-controles-cis/</loc>
		<lastmod>2020-06-03T14:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-vendor-management-software-is-like-homeowners-insurance/</loc>
		<lastmod>2020-06-03T15:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/yubikey-2-factor-authentication-for-windows-logins/</loc>
		<lastmod>2020-06-03T15:06:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/most-victims-choose-a-similar-or-weaker-password-after-a-data-breach-study-finds/</loc>
		<lastmod>2020-06-03T15:09:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-connect-nikolas-behars-from-0-to-red-team-what-does-the-red-team-do-and-when-why-do-i-need-one/</loc>
		<lastmod>2020-06-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/key-trends-and-developments-2020-verizon-data-breach-investigation/</loc>
		<lastmod>2020-06-03T16:40:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-carcinization/</loc>
		<lastmod>2020-06-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/understanding-cyber-resilience-breach-curves/</loc>
		<lastmod>2020-06-03T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bitglass-security-spotlight-wishbone-app-breached-affecting-more-than-40-million-users/</loc>
		<lastmod>2020-06-03T17:28:31+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->