<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-connect-ochaun-marshalls-flex-seal-your-ci-cd-pipeline/</loc>
		<lastmod>2020-06-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/kraken-ciso-nick-percoco-on-the-crypto-exchanges-productive-paranoia-and-the-future-of-protecting-home-networks-video/</loc>
		<lastmod>2020-06-03T18:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-is-bimi-and-how-can-marketers-use-it-for-email-campaigns/</loc>
		<lastmod>2020-06-03T18:51:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/labs-notes-monthly-recap-may-2020/</loc>
		<lastmod>2020-06-03T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/enemy-unseen-part-ii-why-dark-web-monitoring-is-essential/</loc>
		<lastmod>2020-06-03T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-is-automation-evolving-to-detect-and-mitigate-cyber-threats/</loc>
		<lastmod>2020-06-03T20:26:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-security-in-the-saas-age-rethinking-data-security/</loc>
		<lastmod>2020-06-03T21:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ensuring-device-security-in-federal-environments/</loc>
		<lastmod>2020-06-03T21:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/romanian-skimmer-gang-in-mexico-outed-by-krebsonsecurity-stole-1-2-billion/</loc>
		<lastmod>2020-06-03T22:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/reduce-agency-operating-expenditures-with-proven-security-automation/</loc>
		<lastmod>2020-06-03T22:48:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-ways-to-clean-up-our-digital-lives-avast/</loc>
		<lastmod>2020-06-03T22:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/vmware-vcenter-takeover-via-vcloud-director-cve-2020-3956-filed-by-citadelo-on-june-1st-2020/</loc>
		<lastmod>2020-06-04T00:07:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/dj-sampath-chats-about-the-covid-19-pandemic-and-business-email-compromise/</loc>
		<lastmod>2020-06-04T00:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/examining-the-open-source-python-application-cves-that-led-to-the-cisco-server-breach/</loc>
		<lastmod>2020-06-04T00:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-gives-governments-unexpected-digital-wake-up-call/</loc>
		<lastmod>2020-06-04T01:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/contrast-labs-mapping-risk-profiles-for-select-owasp-top-10-vulnerabilities-to-understand-their-appsec-risk/</loc>
		<lastmod>2020-06-04T05:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/protect-sensitive-data-reduce-risk-and-gain-regulatory-compliance-with-embedded-data-security/</loc>
		<lastmod>2020-06-04T05:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/emerging-from-the-tool-swamp-to-a-unified-appsec-platform/</loc>
		<lastmod>2020-06-04T05:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/whitepaper-self-supervised-learning-ai-for-complex-network-security/</loc>
		<lastmod>2020-06-04T06:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/moving-beyond-branch-routers-to-secure-sd-wan-fortinet/</loc>
		<lastmod>2020-06-04T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/moving-beyond-branch-routers-to-secure-sd-wan/</loc>
		<lastmod>2020-06-04T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/strengthening-your-pii-and-ip-data-security-in-the-cloud/</loc>
		<lastmod>2020-06-04T07:39:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-nhs-uk-healthcare-orgs-need-to-boost-their-security-in-age-of-covid-19/</loc>
		<lastmod>2020-06-04T07:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-couple-critical-zoom-chat-vulnerabilities-found-and-fixed/</loc>
		<lastmod>2020-06-04T09:57:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cyberthon-2020-helping-support-front-line-carers/</loc>
		<lastmod>2020-06-04T10:35:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/an-open-letter-from-mediaops/</loc>
		<lastmod>2020-06-04T10:38:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/canstockphoto8926261.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8926261]]></image:title>
			<image:caption><![CDATA[Hope]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-secure-is-google-chat/</loc>
		<lastmod>2020-06-04T11:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/healthcare-remained-the-most-breached-industry-in-q1-research-shows/</loc>
		<lastmod>2020-06-04T11:21:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/banking-trojan-metamorfo-hijacks-trusted-apps-to-run-malware/</loc>
		<lastmod>2020-06-04T11:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/phishers-use-fake-vpn-config-notification-to-target-office-365-details/</loc>
		<lastmod>2020-06-04T11:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/is-municipal-ransomware-something-to-lose-sleep-over/</loc>
		<lastmod>2020-06-04T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/before-the-election-states-need-to-test-their-cybersecurity-continuously/</loc>
		<lastmod>2020-06-04T12:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/after-the-pandemic-what-the-it-world-may-look-like/</loc>
		<lastmod>2020-06-05T06:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Human-Error-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[pandemic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-ransomware-isnt-going-away-anytime-soon/</loc>
		<lastmod>2020-06-05T07:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Rise-Fileless-Malware.jpg</image:loc>
			<image:caption><![CDATA[ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/dark-web-monitoring-detect-web-forgery-beyond-the-surface-web/</loc>
		<lastmod>2020-06-04T12:42:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fewer-security-incidents-affected-us-federal-government-in-2019/</loc>
		<lastmod>2020-06-04T12:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/half-of-enterprises-have-no-dedicated-staff-processes-or-policies-for-iot-security/</loc>
		<lastmod>2020-06-04T12:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/plugging-remote-desktop-security-holes/</loc>
		<lastmod>2020-06-04T13:27:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/six-step-guide-to-email-security-best-practice/</loc>
		<lastmod>2020-06-04T13:41:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19s-impact-on-human-behavior-threat-actors/</loc>
		<lastmod>2020-06-04T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/insight-6-2-2020-walking-their-path/</loc>
		<lastmod>2020-06-04T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ck-00-ctf-walkthrough-part-2/</loc>
		<lastmod>2020-06-04T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cyber-work-podcast-how-to-become-a-cyber-risk-specialist/</loc>
		<lastmod>2020-06-04T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-connect-mike-doyles-software-supply-chain-threat-detection/</loc>
		<lastmod>2020-06-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/securing-success-reporting-pam-wins-back-to-the-business/</loc>
		<lastmod>2020-06-04T16:07:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/respect-and-equal-protection-for-everyone/</loc>
		<lastmod>2020-06-04T16:39:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-joy-of-tech-flush-facebook/</loc>
		<lastmod>2020-06-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/tales-from-the-frontlines-increasingly-sophisticated-cat-and-mouse-games/</loc>
		<lastmod>2020-06-04T17:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/wp-2fa-1-3-2fa-setup-website-page-improved-2fa-policies/</loc>
		<lastmod>2020-06-04T17:05:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-safely-pursue-digital-transformation/</loc>
		<lastmod>2020-06-04T17:15:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/social-media-how-to-quickly-investigate-on-tiktok/</loc>
		<lastmod>2020-06-04T17:17:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-overcome-the-top-6-application-security-challenges/</loc>
		<lastmod>2020-06-04T17:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-infosec-devops-can-stop-certificate-outages-keyfactor/</loc>
		<lastmod>2020-06-04T17:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-connect-joe-schottmans-realigning-from-chaotic-evil/</loc>
		<lastmod>2020-06-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/6-issues-that-undermine-your-vulnerability-management-teams-ability-to-keep-systems-patched/</loc>
		<lastmod>2020-06-04T18:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-scammer-who-tried-to-launder-over-500000-through-business-email-compromise/</loc>
		<lastmod>2020-06-04T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cmmc-compliance-in-office-365/</loc>
		<lastmod>2020-06-04T20:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/cyber-warfare-growing-from-academic-background-to-current-events/</loc>
		<lastmod>2020-06-04T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-does-successful-vulnerability-discovery-look-like/</loc>
		<lastmod>2020-06-04T20:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/remote-code-execution-deserialization-vulnerability-blocked-by-contrast/</loc>
		<lastmod>2020-06-04T20:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/using-a-software-bill-of-materials-sbom-is-going-mainstream/</loc>
		<lastmod>2020-06-04T21:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/octopus-scanner-compromises-26-oss-projects-on-github/</loc>
		<lastmod>2020-06-04T21:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-stop-sophisticated-attacks-during-covid-with-behavioral-technologies/</loc>
		<lastmod>2020-06-04T21:55:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ensuring-cybersecurity-resilience-in-an-ultra-connected-world/</loc>
		<lastmod>2020-06-05T00:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/wordpress-security-updates-complete-guide/</loc>
		<lastmod>2020-06-05T01:19:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-block-ip-addresses-to-protect-your-wordpress-site/</loc>
		<lastmod>2020-06-05T01:34:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/following-in-gandcrabs-big-footsteps-sodinokibi-ransomware-is-storming-organizations/</loc>
		<lastmod>2020-06-05T06:51:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/telework-environment-meets-hospitals-high-performance-and-security-standards-fortinet/</loc>
		<lastmod>2020-06-05T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/telework-environment-meets-hospitals-high-performance-and-security-standards/</loc>
		<lastmod>2020-06-05T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-misconfigurations-a-leading-cause-of-cloud-data-breaches/</loc>
		<lastmod>2020-06-05T07:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/6-tips-for-remote-workers-to-avoid-cybercriminals/</loc>
		<lastmod>2020-06-08T07:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto77252211.jpg</image:loc>
			<image:title><![CDATA[canstockphoto77252211]]></image:title>
			<image:caption><![CDATA[prepare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/communicating-our-way-through-the-crisis-if-we-winter-this-one-out-we-can-summer-anywhere/</loc>
		<lastmod>2020-06-05T10:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/uk-ministry-of-defence-launches-its-first-specialized-cyber-regiment/</loc>
		<lastmod>2020-06-05T11:26:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/breaking-the-solidity-compiler-with-a-fuzzer/</loc>
		<lastmod>2020-06-05T11:50:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/iso-27001-understanding-the-needs-and-expectations-of-interested-parties/</loc>
		<lastmod>2020-06-05T12:37:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/high-profile-data-thefts-shine-spotlight-on-dark-web/</loc>
		<lastmod>2020-06-05T12:44:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Malware-Marap-AdvisorsBot.jpg</image:loc>
			<image:caption><![CDATA[dark web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/zero-day-vulnerability-the-unknown-threats-to-your-data/</loc>
		<lastmod>2020-06-05T13:02:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/12-enterprise-encryption-key-management-best-practices/</loc>
		<lastmod>2020-06-05T13:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/hackers-use-vpn-impersonation-in-phishing-emails-to-steal-office-365-credentials/</loc>
		<lastmod>2020-06-05T14:43:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/securing-success-reporting-pam-wins-back-to-the-business-2/</loc>
		<lastmod>2020-06-05T14:48:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/garry-on-lockdown-episode-1-avast/</loc>
		<lastmod>2020-06-05T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/scam-spotter-makes-defense-clear-and-simple-avast/</loc>
		<lastmod>2020-06-05T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/did-you-try-turning-it-off-and-on/</loc>
		<lastmod>2020-06-05T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/80-of-hacking-related-breaches-leverage-compromised-credentials/</loc>
		<lastmod>2020-06-05T15:13:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-pandemic-takes-toll-on-cybersecurity/</loc>
		<lastmod>2020-06-08T06:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/canstockphoto4458949.jpg</image:loc>
			<image:title><![CDATA[canstockphoto4458949]]></image:title>
			<image:caption><![CDATA[COVID-19]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/innovation-driven-by-operational-experience-and-engineering-insight-deters-nxns-attacks/</loc>
		<lastmod>2020-06-05T15:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-isps-should-keep-smart-homes-malware-free/</loc>
		<lastmod>2020-06-05T15:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/building-sustainable-ciso-succession-paths/</loc>
		<lastmod>2020-06-05T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/curtis-mayfield-and-the-history-behind-move-on-up/</loc>
		<lastmod>2020-06-05T15:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-protect-sonia-tosons-darla-phams-kelly-dodsons-and-marquis-montgomerys-diversity-in-stem-panel/</loc>
		<lastmod>2020-06-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-joy-of-tech-how-do-i-quit-thee/</loc>
		<lastmod>2020-06-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/whos-ddosing-anti-racism-groups/</loc>
		<lastmod>2020-06-05T17:06:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/banksy-flower-power-philippe-agnifili-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[banksy-flower-power--philippe-agnifili--cc-by-nd]]></image:title>
			<image:caption><![CDATA[racism]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-protect-alyssa-millers-look-theres-a-threat-model-in-my-devops/</loc>
		<lastmod>2020-06-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-signs-its-time-to-hire-balbix-for-vulnerability-management/</loc>
		<lastmod>2020-06-05T18:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/webinars-ci-cd-security-testing-shift-left-code-quality-in-ma/</loc>
		<lastmod>2020-06-05T19:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/hyperbeard-fined-150k-for-allegedly-collecting-childrens-data-illegally/</loc>
		<lastmod>2020-06-05T19:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-stalkerware-threat-avast/</loc>
		<lastmod>2020-06-05T20:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-capital-one-data-breach-a-year-later-a-look-at-what-went-wrong-and-practical-guidance-to-avoid-a-breach-of-your-own/</loc>
		<lastmod>2020-06-05T21:19:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-prevent-vpn-phishing-attacks/</loc>
		<lastmod>2020-06-05T22:05:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/whats-the-difference-between-openroaming-and-passpoint/</loc>
		<lastmod>2020-06-05T22:24:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/smart-teams-use-atlassian-and-sontaype-to-plan-development-work/</loc>
		<lastmod>2020-06-05T22:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/my-first-100-days/</loc>
		<lastmod>2020-06-05T23:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/its-time-to-stop-waiting-for-application-security-to-find-you/</loc>
		<lastmod>2020-06-06T02:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/evasion-tactics-in-hybrid-credit-card-skimmers/</loc>
		<lastmod>2020-06-06T02:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/d-day-operation-overlord-june-6-1944-2/</loc>
		<lastmod>2020-06-06T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/reintroduce-application-security-to-your-team/</loc>
		<lastmod>2020-06-06T15:35:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/revils-lessons-its-time-law-firms-quit-taking-cybersecurity-for-granted/</loc>
		<lastmod>2020-06-06T18:43:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/sql-injection-attack-a-major-application-security-threat/</loc>
		<lastmod>2020-06-07T12:45:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-protect-stefan-bekkers-and-ryan-basdens-serverless-password-cracking-or-how-i-learned-to-stop-worrying-love-aws/</loc>
		<lastmod>2020-06-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/owners-of-ddos-for-hire-service-vdos-get-6-months-community-service/</loc>
		<lastmod>2020-06-07T16:02:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-wrong-times-table/</loc>
		<lastmod>2020-06-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-protect-oscar-salazars-expose-yourself-without-insecurity-cloud-breach-patterns/</loc>
		<lastmod>2020-06-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/robert-m-lees-jeff-haas-little-bobby-comics-week-280/</loc>
		<lastmod>2020-06-07T22:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/minneapolis-police-website-hacked-zoom-encryption-ebay-port-scanning/</loc>
		<lastmod>2020-06-08T04:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-tips-for-selecting-a-penetration-testing-company-in-2020/</loc>
		<lastmod>2020-06-08T05:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/final-version-of-nist-sp-1800-23-guides-identification-of-threats-to-ot-assets/</loc>
		<lastmod>2020-06-08T05:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/three-new-ways-tripwire-enterprise-can-help-monitor-ephemeral-assets-in-dynamic-cloud-environments/</loc>
		<lastmod>2020-06-08T05:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/learning-more-about-cross-site-scripting/</loc>
		<lastmod>2020-06-08T06:52:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cisos-on-cisos-securing-operational-technology-in-a-dynamic-landscape-fortinet/</loc>
		<lastmod>2020-06-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cisos-on-cisos-securing-operational-technology-in-a-dynamic-landscape/</loc>
		<lastmod>2020-06-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/using-aws-session-manager-with-enhanced-ssh-and-scp-capability/</loc>
		<lastmod>2020-06-08T09:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/tales-from-the-front-lines-attackers-target-apis-with-get-based-atos/</loc>
		<lastmod>2020-06-08T11:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/protecting-health-data-privacy-in-the-return-to-work/</loc>
		<lastmod>2020-06-09T06:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Employee-Security-Risk.jpg</image:loc>
			<image:title><![CDATA[Employee-Security-Risk]]></image:title>
			<image:caption><![CDATA[health data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/access-governance-helps-ensure-network-security-compliance/</loc>
		<lastmod>2020-06-09T07:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Small-Business-Cyberattacks.jpg</image:loc>
			<image:title><![CDATA[Small-Business-Cyberattacks]]></image:title>
			<image:caption><![CDATA[access]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/zorab-ransomware-disguised-as-stop-djvu-ransomware-decryptor/</loc>
		<lastmod>2020-06-08T13:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-need-for-comprehensive-dlp-in-the-remote-workforce/</loc>
		<lastmod>2020-06-08T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/rethink-identity-governance-with-ai-driven-analytics/</loc>
		<lastmod>2020-06-08T14:50:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/capture-the-flag-ctf-walkthrough-my-file-server-1/</loc>
		<lastmod>2020-06-08T15:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-awareness-training-and-cyber-insurance-prevention-treatment-or-both/</loc>
		<lastmod>2020-06-08T15:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-state-of-pki-iot-security-keyfactor/</loc>
		<lastmod>2020-06-08T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-protect-chlo-messdaghis-the-hacker-hippocampus-meet-your-brain-on-games/</loc>
		<lastmod>2020-06-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/customer-corner-hubspot-security-leader-on-banding-together-through-covid-crisis/</loc>
		<lastmod>2020-06-08T16:27:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-cyber-security-software-testing-is-cool/</loc>
		<lastmod>2020-06-08T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-publish-docker-images-on-a-private-nexus-repository-using-jib-maven-plugin/</loc>
		<lastmod>2020-06-08T16:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-eventual-consistency/</loc>
		<lastmod>2020-06-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-protect-carlota-sages-low-tech-insecure/</loc>
		<lastmod>2020-06-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/open-source-sucks-says-ballsy-infosec-firm/</loc>
		<lastmod>2020-06-08T18:01:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/sauce-alexas-fotos-pixabay.jpg</image:loc>
			<image:title><![CDATA[sauce--alexas-fotos--pixabay]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/qa-cyberthreats-and-digital-trends-during-covid-19/</loc>
		<lastmod>2020-06-08T18:22:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/digital-transformation-highlights-the-need-for-devsecops/</loc>
		<lastmod>2020-06-08T18:22:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/web-scraping-quantifying-the-revenue-impact-to-your-business/</loc>
		<lastmod>2020-06-08T18:22:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/five-things-every-cmo-needs-to-know-about-magecart/</loc>
		<lastmod>2020-06-08T18:22:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/browser-extensions-for-grocery-delivery-timeslots-bring-new-risks-to-consumers/</loc>
		<lastmod>2020-06-08T18:22:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-latest-e-commerce-battle-mothers-day-shoppers-vs-malicious-pop-ups/</loc>
		<lastmod>2020-06-08T18:22:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/a-top-israeli-startup-perimeterx-employees-say-why/</loc>
		<lastmod>2020-06-08T18:22:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-new-battleground-is-digital/</loc>
		<lastmod>2020-06-08T18:22:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/protecting-your-online-food-and-grocery-business/</loc>
		<lastmod>2020-06-08T18:22:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/e-gift-card-bot-attacks-and-their-impact-on-e-commerce-businesses/</loc>
		<lastmod>2020-06-08T18:22:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-nist-wants-you-to-remove-complexity-from-your-password-policies/</loc>
		<lastmod>2020-06-08T18:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ask-the-expert-managing-risk-through-digital-transformation-part-1/</loc>
		<lastmod>2020-06-08T19:17:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/illumio-and-bishop-fox-release-first-of-its-kind-test-report-quantifying-the-efficacy-of-micro-segmentation/</loc>
		<lastmod>2020-06-08T19:23:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/open-source-libraries-uncovering-the-risks-that-lurk-beneath-the-surface/</loc>
		<lastmod>2020-06-08T19:27:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mitigating-kubernetes-vulnerabilities-with-the-least-privilege-principle/</loc>
		<lastmod>2020-06-08T19:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/pinpoint-and-act-upon-bad-reputation-ips/</loc>
		<lastmod>2020-06-08T20:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/smart-teams-use-atlassian-and-sonatype-to-plan-development-work/</loc>
		<lastmod>2020-06-08T20:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-are-some-lesser-known-cybersecurity-best-practices-that-can-help-individuals-and-businesses/</loc>
		<lastmod>2020-06-08T20:43:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/newsbites-drilldown-for-the-week-ending-5-june-2020/</loc>
		<lastmod>2020-06-08T20:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/must-have-free-resources-for-malware-analysis/</loc>
		<lastmod>2020-06-08T20:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/beware-of-atm-and-gas-pump-skimmers-avast/</loc>
		<lastmod>2020-06-08T21:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-adventures-of-microservice-catastrophe-avoided/</loc>
		<lastmod>2020-06-29T06:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/ms-01-13-dh-b.jpg</image:loc>
			<image:caption><![CDATA[Catastrophe Avoided]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/enabling-802-1x-authentication-on-office-365/</loc>
		<lastmod>2020-06-08T23:47:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-issue-digicert-certificates-to-devices/</loc>
		<lastmod>2020-06-09T00:05:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-issue-sectigo-certificates/</loc>
		<lastmod>2020-06-09T00:18:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-word-about-the-current-unrest-from-hyperproofs-ceo/</loc>
		<lastmod>2020-06-09T00:49:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/must-have-free-resources-for-open-source-intelligence-osint/</loc>
		<lastmod>2020-06-09T01:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-expertops-can-help-you-address-the-infosec-skills-gap/</loc>
		<lastmod>2020-06-09T03:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-to-do-after-a-breach/</loc>
		<lastmod>2020-06-09T06:47:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/4-challenges-of-stand-alone-siem-platforms/</loc>
		<lastmod>2020-06-09T06:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/building-a-managed-sd-wan-service-with-the-right-solution-fortinet/</loc>
		<lastmod>2020-06-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/building-a-managed-sd-wan-service-with-the-right-solution/</loc>
		<lastmod>2020-06-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/perimeterx-spring-2020-product-release-new-integrations-and-capabilities/</loc>
		<lastmod>2020-06-09T07:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/4-best-practices-for-securing-your-open-source-components/</loc>
		<lastmod>2020-06-09T08:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/study-shows-cyber-security-disconnects/</loc>
		<lastmod>2020-06-09T09:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ursnif-gozi-delivery-excel-macro-4-0-utilization-uptick-ocr-bypass/</loc>
		<lastmod>2020-06-09T09:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-breach-canadas-fitness-depot-blames-isp-for-security-incident/</loc>
		<lastmod>2020-06-09T09:52:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/maze-team-hits-us-nuclear-missile-contractor-with-ransomware/</loc>
		<lastmod>2020-06-09T11:03:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/preventing-data-exfiltration-definition-examples-and-best-practices/</loc>
		<lastmod>2020-06-09T11:19:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/back-to-basics-us-data-privacy-and-the-pci-dss/</loc>
		<lastmod>2020-06-09T11:21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ai-surveillance-in-a-post-pandemic-world/</loc>
		<lastmod>2020-06-10T06:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Security-Awareness-Officer-Role.jpg</image:loc>
			<image:title><![CDATA[camera]]></image:title>
			<image:caption><![CDATA[AI surveillance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/smart-mesh-topology-boosts-capacity-and-performance/</loc>
		<lastmod>2020-06-09T11:45:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-check-if-a-mutex-is-locked-in-go/</loc>
		<lastmod>2020-06-09T11:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-remote-access-genie-is-out-of-the-bottle-protect-your-ot-systems/</loc>
		<lastmod>2020-06-09T11:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mss-edr-mdr-whats-the-difference-and-which-do-you-need/</loc>
		<lastmod>2020-06-10T07:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Business-Security-Cyber-Hygiene.jpg</image:loc>
			<image:title><![CDATA[Business-Security-Cyber-Hygiene]]></image:title>
			<image:caption><![CDATA[MDR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/eus-law-enforcement-agency-launches-center-for-financial-and-economic-crime/</loc>
		<lastmod>2020-06-09T12:27:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/vast-majority-of-australian-companies-believe-their-cybersecurity-is-failing/</loc>
		<lastmod>2020-06-09T12:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/debunking-cybersecurity-jargon-part-three-what-is-an-information-governance-server/</loc>
		<lastmod>2020-06-09T12:52:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/partnering-to-win-respond-software-joins-with-iis-to-enhance-security-and-bring-added-value-to-enterprise-customers/</loc>
		<lastmod>2020-06-09T13:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/1-3-million-wordpress-websites-targeted-by-attackers-looking-for-old-vulnerabilities/</loc>
		<lastmod>2020-06-09T13:35:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/no-excuses-why-brands-must-manage-pii-better/</loc>
		<lastmod>2020-06-09T14:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-is-breeding-more-cyberattacks-heres-how-to-contain-them/</loc>
		<lastmod>2020-06-09T13:59:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/preparing-for-the-first-cloud-act-bilateral-data-access-agreement/</loc>
		<lastmod>2020-06-09T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-threat-of-compromised-passwords/</loc>
		<lastmod>2020-06-09T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ask-the-expert-managing-risk-through-digital-transformation-part-2/</loc>
		<lastmod>2020-06-09T14:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ensuring-remote-access-availability-security/</loc>
		<lastmod>2020-06-09T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-forallsecure-is-a-2020-rsa-innovation-sandbox-finalist-3/</loc>
		<lastmod>2020-06-09T16:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cis-benchmarks-boost-security-integrity-and-compliance/</loc>
		<lastmod>2020-06-09T15:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/its-the-end-of-libor-are-you-prepared-to-conquer-your-data-challenges/</loc>
		<lastmod>2020-06-09T15:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-detect-shane-pedens-conquering-the-cloud-defense-in-depth-strategies-for-amazon-web-services/</loc>
		<lastmod>2020-06-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ask-the-expert-managing-risk-through-digital-transformation-part-3/</loc>
		<lastmod>2020-06-09T16:12:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/magellan-healthcare-attack-a-harsh-reminder-for-the-need-to-be-hipaa-compliant/</loc>
		<lastmod>2020-06-09T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-hair-growth-rate/</loc>
		<lastmod>2020-06-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/florence-ala-hit-by-ransomware-12-days-after-being-alerted-by-krebsonsecurity/</loc>
		<lastmod>2020-06-09T17:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/u-s-utilities-targeted-with-flowcloud-malware-by-lookback-attackers/</loc>
		<lastmod>2020-06-09T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/perimeterx-spring-release-brings-the-benefit-of-cloud-native-architecture-to-enterprises-at-all-phases-of-digital-transformation/</loc>
		<lastmod>2020-06-09T17:37:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/evolution-from-idaas-to-the-saas-delivered-iam/</loc>
		<lastmod>2020-06-09T17:48:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ibm-jumps-on-blm-bus-drops-failing-facial-biz/</loc>
		<lastmod>2020-06-09T17:48:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/facial-recognition-ibm-research-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[facial-recognition--ibm-research--cc-by-nd]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-forallsecure-is-a-2020-rsa-innovation-sandbox-finalist/</loc>
		<lastmod>2020-06-09T17:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/web-scammers-are-using-the-covid-19-crisis-to-attack-your-customers-with-magecart-and-other-client-side-exploits/</loc>
		<lastmod>2020-06-09T17:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-get-compliance-audit-training-in-the-new-virtual-workplace/</loc>
		<lastmod>2020-06-09T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/new-in-nexus-repository-3-24-storage-optimization-at-scale-and-nuget-v3-hosted/</loc>
		<lastmod>2020-06-09T18:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/prioritize-security-alerts-with-5-simple-metrics/</loc>
		<lastmod>2020-06-09T18:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/advanced-endpoint-protection-in-the-new-covid-19-world/</loc>
		<lastmod>2020-06-09T18:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/group-policies-going-rogue/</loc>
		<lastmod>2020-06-09T18:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/verizon-dbir-2020-credential-theft-phishing-cloud-attacks/</loc>
		<lastmod>2020-06-09T20:36:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/health-life-sciences-guide-how-to-stay-secure-in-the-cloud-while-driving-innovation-discovery/</loc>
		<lastmod>2020-06-09T20:39:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-is-an-ssl-certificate-and-how-it-works-keyfactor/</loc>
		<lastmod>2020-06-09T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/scaling-pki-remotely-keyfactor/</loc>
		<lastmod>2020-06-09T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/vert-threat-alert-june-2020-patch-tuesday-analysis/</loc>
		<lastmod>2020-06-09T21:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/digital-forensics-and-incident-response-is-it-the-career-for-you/</loc>
		<lastmod>2020-06-09T21:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/do-you-need-a-masters-degree-in-cybersecurity/</loc>
		<lastmod>2020-06-09T21:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/scammers-using-seo-to-lure-victims-avast/</loc>
		<lastmod>2020-06-09T22:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/marc-tobias-on-apple-inc-s-siri-promises/</loc>
		<lastmod>2020-06-09T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mental-health-awareness-month-highlights-struggles-of-working-from-home-during-pandemic/</loc>
		<lastmod>2020-06-09T23:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/aligning-mitre-attck-with-advanced-analytics/</loc>
		<lastmod>2020-06-10T01:05:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/microsoft-patch-tuesday-june-2020-edition/</loc>
		<lastmod>2020-06-10T02:43:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cyber-security-continues-to-evolve-and-the-skills-gap-remains-a-big-challenge/</loc>
		<lastmod>2020-06-10T09:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-is-a-website-defacement/</loc>
		<lastmod>2020-06-10T10:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/want-to-protect-privacy-get-off-social-media-indiana-federal-court-says/</loc>
		<lastmod>2020-06-11T06:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Facebooks-Privacy-Breach.jpg</image:loc>
			<image:caption><![CDATA[privacy social media]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-security-and-wfh-myths-and-misconceptions/</loc>
		<lastmod>2020-06-11T07:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Container-Security-Whitesource.jpg</image:loc>
			<image:caption><![CDATA[wfh]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/strong-customer-authentication-how-will-it-affect-merchants/</loc>
		<lastmod>2020-06-10T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/employment-scams-are-on-the-rise-heres-what-to-look-out-for/</loc>
		<lastmod>2020-06-10T12:15:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/recommendations-for-managing-a-bad-bot-problem/</loc>
		<lastmod>2020-06-10T12:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/clients-often-hold-ceos-personally-responsible-for-ransomware-attacks-research-shows/</loc>
		<lastmod>2020-06-10T13:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/iso-27001-whats-the-difference-between-a-risk-owner-and-an-asset-owner/</loc>
		<lastmod>2020-06-10T13:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/weve-soared-and-soared-and-now-weve-reached-the-cloud/</loc>
		<lastmod>2020-06-10T13:46:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/nintendo-confirms-additional-140000-accounts-compromised-in-april-data-breach/</loc>
		<lastmod>2020-06-10T14:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-is-threat-intelligence/</loc>
		<lastmod>2020-06-10T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/honda-car-and-motorcycle-production-halted-after-cyberattack/</loc>
		<lastmod>2020-06-10T14:41:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-most-organizations-are-failing-at-securing-third-party-remote-access/</loc>
		<lastmod>2020-06-10T15:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-mitre-attck-framework-command-and-control/</loc>
		<lastmod>2020-06-10T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ragnar-locker-partnered-with-maze-ransomware-cartel/</loc>
		<lastmod>2020-06-10T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-adobe-connect-way/</loc>
		<lastmod>2020-06-10T15:57:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-detect-rory-mccunes-compromising-containers-and-clusters/</loc>
		<lastmod>2020-06-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bringing-your-retail-application-security-strategy-up-to-par/</loc>
		<lastmod>2020-06-10T16:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-eight-podcasts-episodes-and-webinars-on-closing-the-skills-gap-and-starting-a-cybersecurity-career/</loc>
		<lastmod>2020-06-10T16:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/paradise-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-06-10T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-pinouts/</loc>
		<lastmod>2020-06-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/</loc>
		<lastmod>2020-06-10T17:19:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/whats-the-best-approach-to-sso-and-consumer-session-management-for-your-businesses/</loc>
		<lastmod>2020-06-10T17:54:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/can-kubernetes-keep-a-secret/</loc>
		<lastmod>2020-06-10T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-detect-eldon-stegalls-manuals-for-herding-clouds-free-tools-for-improved-security/</loc>
		<lastmod>2020-06-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-does-it-take-to-be-an-effective-developer-manager/</loc>
		<lastmod>2020-06-10T18:02:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-hackers-live-with-their-moms/</loc>
		<lastmod>2020-06-10T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mitigating-credential-stuffing-attacks-in-the-financial-sector/</loc>
		<lastmod>2020-06-10T19:46:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/our-founding-chairman/</loc>
		<lastmod>2020-06-10T20:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-are-vdi-security-and-endpoint-security-the-same/</loc>
		<lastmod>2020-06-10T20:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-is-nist-sp-800-30/</loc>
		<lastmod>2020-06-10T20:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-is-threat-intelligence-2/</loc>
		<lastmod>2020-06-10T22:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/week-one-featuring-research-from-forrester-its-never-too-early-in-development-for-application-security/</loc>
		<lastmod>2020-06-10T23:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/westech-international-hacked-by-maze-ransomware/</loc>
		<lastmod>2020-06-11T00:23:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cybersecurity-risks-have-changed-due-to-covid-19-has-your-strategy-changed-with-them/</loc>
		<lastmod>2020-06-11T02:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/authentication-vs-authorization-defined-whats-the-difference-infographic/</loc>
		<lastmod>2020-06-11T05:14:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/machine-learning-deep-learning-and-neural-networks-oh-my/</loc>
		<lastmod>2020-06-11T05:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/intelligence-led-threat-protection-for-saas-mobile-workforce/</loc>
		<lastmod>2020-06-11T06:24:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ways-to-detect-application-security-vulnerabilities-sooner-to-reduce-costs-and-risk/</loc>
		<lastmod>2020-06-11T06:39:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/evolution-of-cyber-threats-in-ot-environments-fortinet/</loc>
		<lastmod>2020-06-11T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/deep-analysis-of-a-qbot-campaign-part-i/</loc>
		<lastmod>2020-06-11T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/evolution-of-cyber-threats-in-ot-environments/</loc>
		<lastmod>2020-06-11T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fortiguard-labs-discovers-privilege-escalation-vulnerability-in-windows-10-platform/</loc>
		<lastmod>2020-06-11T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/solving-a-mailing-list-gap-spam-problem/</loc>
		<lastmod>2020-06-11T07:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/perimeterx-human-challenge-better-user-experience-improved-bot-protection/</loc>
		<lastmod>2020-06-11T09:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/smbs-overwhelmingly-believe-they-are-ready-to-deal-with-cybersecurity-incidents/</loc>
		<lastmod>2020-06-11T10:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/survey-from-pci-pal-shows-significant-consequences-for-businesses-that-demonstrate-poor-data-security-practices-during-the-pandemic/</loc>
		<lastmod>2020-06-11T10:50:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/que-son-los-desvios-en-configuraciones-o-configuration-drift/</loc>
		<lastmod>2020-06-11T10:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/another-intel-speculative-execution-vulnerability/</loc>
		<lastmod>2020-06-11T11:40:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ecdsa-handle-with-care/</loc>
		<lastmod>2020-06-11T11:50:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/behind-the-data-analyzing-the-soc-findings-from-rsa-conference-2020/</loc>
		<lastmod>2020-06-11T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/increased-use-of-mobile-banking-apps-may-lead-to-cyber-attacks-fbi-warns/</loc>
		<lastmod>2020-06-11T12:39:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/armis-recognized-as-a-leader-in-connected-medical-device-security-evaluation/</loc>
		<lastmod>2020-06-11T12:42:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/eye-on-the-end-user-application-layer-security/</loc>
		<lastmod>2020-06-12T07:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto19812164.jpg</image:loc>
			<image:title><![CDATA[canstockphoto19812164]]></image:title>
			<image:caption><![CDATA[application layer security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/its-all-about-the-data/</loc>
		<lastmod>2020-06-11T13:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/credential-vulnerabilities-most-likely-breach-culprit-verizon-dbir/</loc>
		<lastmod>2020-06-11T13:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-wordpress-security-process-test-harden-monitor-improve/</loc>
		<lastmod>2020-06-11T13:49:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/nist-adopt-a-secure-software-development-framework-ssdf-to-mitigate-risk-of-software-vulnerabilities/</loc>
		<lastmod>2020-06-11T13:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/australian-beverage-manufacturer-shutdown-it-systems-after-cyberattack/</loc>
		<lastmod>2020-06-11T14:18:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-to-consider-when-evaluating-ddos-mitigation-services/</loc>
		<lastmod>2020-06-11T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/qa-with-heather-paunet-about-untangle-and-education/</loc>
		<lastmod>2020-06-11T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/capture-the-flag-a-walkthrough-of-evm-1/</loc>
		<lastmod>2020-06-11T15:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/will-cvss-v3-change-everything-understanding-the-new-glossary/</loc>
		<lastmod>2020-06-11T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/3-ways-to-get-the-most-out-of-your-security-automation-budget/</loc>
		<lastmod>2020-06-11T15:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-detect-jeremy-brooks-and-stuart-lanes-automated-web-application-api-discovery-other-things-that-sound-simple/</loc>
		<lastmod>2020-06-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/apis-the-next-frontier-in-cyber-crime/</loc>
		<lastmod>2020-06-11T16:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/imperva-takes-on-its-largest-recorded-account-takeover-attack-on-a-single-company/</loc>
		<lastmod>2020-06-11T16:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/danile-storis-perspective/</loc>
		<lastmod>2020-06-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/detecting-gnutls-cve-2020-13777-using-zeek/</loc>
		<lastmod>2020-06-11T17:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/is-zoom-the-next-huawei-puppet-of-chinese-say-critics/</loc>
		<lastmod>2020-06-11T17:47:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/boycottzoom-steve-cadman-cc-by-sa.jpg</image:loc>
			<image:caption><![CDATA[Zoom Chinese]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/babylon-health-app-leaked-patients-video-consultations/</loc>
		<lastmod>2020-06-11T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/trickbot-using-fake-black-lives-matter-voting-campaign-for-distribution/</loc>
		<lastmod>2020-06-11T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cybersecai-connected-qa-with-avast-cto-michal-pechoucek-avast/</loc>
		<lastmod>2020-06-11T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-detect-jake-williams-threat-hunting-for-cybersecurity-merger-and-acquisition-due-diligence/</loc>
		<lastmod>2020-06-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bad-bots-what-they-are-and-how-to-fight-them/</loc>
		<lastmod>2020-06-11T18:24:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/managing-cybersecurity-risks-up-and-down-the-supply-chain-part-2/</loc>
		<lastmod>2020-06-11T18:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/authentication-token-obtain-and-replace-ator-burp-plugin-to-handle-complex-login-sequences/</loc>
		<lastmod>2020-06-11T18:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/protecting-consumer-identities-is-a-team-effort/</loc>
		<lastmod>2020-06-11T18:43:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-leakage-on-social-media-credit-card-info-confidential-docs/</loc>
		<lastmod>2020-06-11T18:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/helpsystems-adds-new-mftaas-solution-and-enhances-secure-file-collaboration/</loc>
		<lastmod>2020-06-11T18:52:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/analyzing-siem-data-with-integrity-monitoring/</loc>
		<lastmod>2020-06-11T18:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-posture-questions-and-answers/</loc>
		<lastmod>2020-06-11T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-state-of-k-12-cyber-safety-security-2019-recap-through-a-remote-learning-lens/</loc>
		<lastmod>2020-06-11T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/smartphones-and-increasing-mobile-threats-avast/</loc>
		<lastmod>2020-06-11T21:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/new-scanner-reveals-the-vulnerabilities-present-on-any-website/</loc>
		<lastmod>2020-06-11T21:36:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/browser-isolation-as-a-key-part-of-a-blueprint-for-sase-success/</loc>
		<lastmod>2020-06-11T21:36:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/chrome-insecure-downloads-and-your-cybersecurity/</loc>
		<lastmod>2020-06-11T21:36:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/attacks-on-rdp-surge-along-with-uptick-in-remote-access/</loc>
		<lastmod>2020-06-11T21:36:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/semper-paratus-always-be-ready/</loc>
		<lastmod>2020-06-11T21:36:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-look-at-the-new-normal-of-enterprise-cybersecurity/</loc>
		<lastmod>2020-06-11T22:03:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/second-half-of-2020-cybersecurity-trends/</loc>
		<lastmod>2020-06-11T22:03:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/just-what-is-a-ransomware-attack-and-can-you-prevent-one/</loc>
		<lastmod>2020-06-11T22:03:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/what-are-the-ramifications-of-a-data-security-breach/</loc>
		<lastmod>2020-06-11T22:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/using-ai-and-ml-to-improve-threat-detection-and-response/</loc>
		<lastmod>2020-06-11T22:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/update-on-the-california-consumer-protection-act-ccpa/</loc>
		<lastmod>2020-06-11T22:03:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/dont-let-hackers-do-more-harm-during-the-coronavirus-threat/</loc>
		<lastmod>2020-06-11T22:03:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/stop-threats-with-aria-sds-and-sumologics-new-integration/</loc>
		<lastmod>2020-06-11T22:03:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/our-takeaways-from-the-2020-rsa-security-conference/</loc>
		<lastmod>2020-06-11T22:03:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/reap-the-benefits-of-iot-without-compromising-scada-security/</loc>
		<lastmod>2020-06-11T22:03:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-ways-phishing-attacks-manipulate-mobile-devices-outside-email/</loc>
		<lastmod>2020-06-11T22:06:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/after-the-pandemic-what-the-it-world-may-look-like-2/</loc>
		<lastmod>2020-06-11T22:10:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-last-1717-days/</loc>
		<lastmod>2020-06-12T04:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fast-secure-2020-digital-edition/</loc>
		<lastmod>2020-06-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/financial-institution-minimizes-saas-latency-with-fortigate-ngfws/</loc>
		<lastmod>2020-06-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fast-secure-americas-2020-digital-edition/</loc>
		<lastmod>2020-06-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-role-of-preparation-and-process-in-incident-response/</loc>
		<lastmod>2020-06-12T10:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/information-security-being-aware-is-the-new-trend/</loc>
		<lastmod>2020-06-12T10:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/upgradeable-contracts-made-safer-with-crytic/</loc>
		<lastmod>2020-06-12T11:50:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-is-cyber-risk-management/</loc>
		<lastmod>2020-06-12T11:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/snake-ransomware-affected-enel-groups-internal-network/</loc>
		<lastmod>2020-06-12T12:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/privacy-and-morality-datas-double-edged-sword/</loc>
		<lastmod>2020-06-15T06:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Facial-Recognition-Surveillance.jpg</image:loc>
			<image:caption><![CDATA[data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/6-steps-to-securing-production-file-data-in-the-cloud/</loc>
		<lastmod>2020-06-15T07:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Gigamon-ICEBRG.jpg</image:loc>
			<image:title><![CDATA[Gigamon-ICEBRG]]></image:title>
			<image:caption><![CDATA[data cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/automating-compliance-for-better-vendor-risk-management/</loc>
		<lastmod>2020-06-12T13:42:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/despite-resolution-not-to-give-in-to-hackers-ransom-demands-some-cities-are-still-paying-up-after-attacks/</loc>
		<lastmod>2020-06-12T14:04:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/enhancing-siem-data-with-file-integrity-monitoring/</loc>
		<lastmod>2020-06-12T14:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-soar-can-take-your-security-budget-further-in-turbulent-times/</loc>
		<lastmod>2020-06-12T15:22:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsidesatl-2020-closing-remarks/</loc>
		<lastmod>2020-06-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-dynamic-entropy/</loc>
		<lastmod>2020-06-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-develop-efficient-and-advanced-triage-and-investigation-capabilities/</loc>
		<lastmod>2020-06-12T17:37:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-halifax-2020-quarantine-edition-tanya-jancas-purple-is-the-new-black/</loc>
		<lastmod>2020-06-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/seven-reasons-why-businesses-get-hacked/</loc>
		<lastmod>2020-06-12T18:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-we-discovered-a-vulnerability-in-mappress-pro-cve-2020-12675/</loc>
		<lastmod>2020-06-12T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/this-is-a-test-2/</loc>
		<lastmod>2020-06-12T19:38:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/new-malware-makes-air-gapped-data-center-networks-less-bulletproof/</loc>
		<lastmod>2020-06-12T19:44:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/graham-cluley-threatened-with-legal-action-by-information-security-company/</loc>
		<lastmod>2020-06-12T19:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/callstranger-is-exactly-the-type-of-vulnerability-isps-fear/</loc>
		<lastmod>2020-06-12T20:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/frost-sullivan-advanced-cyber-threats-drive-increased-demand-for-managed-detection-and-response-mdr-solutions/</loc>
		<lastmod>2020-06-12T20:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fbi-warns-of-growing-mobile-banking-app-threats/</loc>
		<lastmod>2020-06-12T21:03:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-is-the-gibberish-hack/</loc>
		<lastmod>2020-06-12T21:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/identity-gateways-%e2%9d%a4%ef%b8%8f-web-isolation/</loc>
		<lastmod>2020-06-12T21:33:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/webinars-dos-attacks-in-node-js-sast-in-devsecops/</loc>
		<lastmod>2020-06-12T21:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/workflow-automation-publishing-artifacts-to-nexus-repository-using-jenkins-pipelines/</loc>
		<lastmod>2020-06-12T21:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/certificate-automation-for-f5-big-ip-keyfactor/</loc>
		<lastmod>2020-06-12T22:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/phishing-attack-targets-coronavirus-task-force-avast/</loc>
		<lastmod>2020-06-13T00:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/beware-the-waf-in-waap-clothing/</loc>
		<lastmod>2020-06-13T10:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-halifax-2020-quarantine-edition-eric-conrads-threat-hunting-via-dns/</loc>
		<lastmod>2020-06-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-new-ciso/</loc>
		<lastmod>2020-06-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-halifax-2020-quarantine-edition-mike-williamsons-applying-langsec-principles-with-graphql/</loc>
		<lastmod>2020-06-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/privnotes-com-is-phishing-bitcoin-from-users-of-private-messaging-service-privnote-com/</loc>
		<lastmod>2020-06-14T04:01:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-halifax-2020-quarantine-edition-david-shipley-s-the-dirty-dozen/</loc>
		<lastmod>2020-06-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-large-number-formats/</loc>
		<lastmod>2020-06-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-halifax-2020-quarantine-edition-naomi-peoris-ctf-for-beginners/</loc>
		<lastmod>2020-06-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ios-flaws-the-project-zero-vulnerability-enumeration/</loc>
		<lastmod>2020-06-14T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/zooms-commitment-to-user-security-depends-on-whether-you-pay-it-or-not/</loc>
		<lastmod>2020-06-14T20:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/3-ways-to-prepare-your-data-for-a-cyber-black-friday/</loc>
		<lastmod>2020-06-14T20:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-tips-to-stay-private-and-secure-during-a-protest/</loc>
		<lastmod>2020-06-15T04:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-importance-of-implementing-an-information-security-policy-that-everyone-understands/</loc>
		<lastmod>2020-06-15T04:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/building-on-the-iam-benefits-of-sso-with-mfa-and-privileged-access-management/</loc>
		<lastmod>2020-06-15T04:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/new-malware-hides-inside-rogue-virtual-machines/</loc>
		<lastmod>2020-06-15T05:25:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/global-malicious-spam-campaign-using-black-lives-matter-as-a-lure/</loc>
		<lastmod>2020-06-15T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/secure-telework-addressing-the-needs-of-your-remote-super-users/</loc>
		<lastmod>2020-06-15T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/is-security-slowing-down-your-devops-cadence/</loc>
		<lastmod>2020-06-15T07:01:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/80-of-organizations-experienced-a-cloud-data-breach-in-the-last-18-months/</loc>
		<lastmod>2020-06-15T07:16:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/overcome-the-impostor-syndrome%e2%80%af/</loc>
		<lastmod>2020-06-15T09:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/14-essential-bug-bounty-programs-of-2019/</loc>
		<lastmod>2020-06-15T09:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cybersecurity-lessons-from-the-pandemic-data-part-1/</loc>
		<lastmod>2020-06-15T10:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fraudsters-set-up-shop-on-the-dark-web-promoting-how-to-guides-on-filing-for-unemployment-benefits/</loc>
		<lastmod>2020-06-15T10:02:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/its-time-to-step-up-linux-server-and-container-workload-security/</loc>
		<lastmod>2020-06-15T10:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/examining-the-us-cyber-budget/</loc>
		<lastmod>2020-06-15T11:06:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-is-forcing-hard-cybersecurity-choices/</loc>
		<lastmod>2020-06-15T12:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/think-bad-do-good-ep-2-how-to-achieve-cybersecurity-effectiveness/</loc>
		<lastmod>2020-06-15T12:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19s-impact-on-data-privacy/</loc>
		<lastmod>2020-06-16T06:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/DevSecOps-Security-Priority.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-Security-Priority]]></image:title>
			<image:caption><![CDATA[data privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-updated-dos-and-donts-of-password-security/</loc>
		<lastmod>2020-06-15T13:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/black-lives-matter-related-spam-used-to-deploy-malware/</loc>
		<lastmod>2020-06-15T13:35:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-security-in-the-saas-age-focus-on-what-you-control/</loc>
		<lastmod>2020-06-15T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/using-zero-trust-to-ease-compliance/</loc>
		<lastmod>2020-06-16T07:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/canstockphoto46761310.jpg</image:loc>
			<image:title><![CDATA[zero trust]]></image:title>
			<image:caption><![CDATA[ZTNA]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/south-africas-postbank-is-replacing-12-million-bank-cards-after-major-security-breach/</loc>
		<lastmod>2020-06-15T14:06:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/latest-version-of-codesonar-improves-on-functional-safety-misra-support-c-parsing-and-visualization/</loc>
		<lastmod>2020-06-15T14:22:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/financial-fraud-reports-in-the-us-jumped-by-104-in-2020-q1/</loc>
		<lastmod>2020-06-15T14:26:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/do-we-still-need-pride-in-2020/</loc>
		<lastmod>2020-06-15T14:50:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-fix-are-you-sure-you-want-to-do-this-error-in-wordpress-site/</loc>
		<lastmod>2020-06-15T14:50:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-protest-battles-grow-online/</loc>
		<lastmod>2020-06-15T14:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ddos-attacks-are-getting-bigger-more-complex-research-shows/</loc>
		<lastmod>2020-06-15T14:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/sick-and-tired-of-struggling-with-application-security/</loc>
		<lastmod>2020-06-15T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/build-better-code-using-sonatypes-integrations-with-atlassian/</loc>
		<lastmod>2020-06-15T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/how-emerging-cyber-threats-outwit-existing-endpoint-security/</loc>
		<lastmod>2020-06-15T15:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-halifax-2020-quarantine-edition-anna-manleys-how-hackers-go-to-jail/</loc>
		<lastmod>2020-06-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/behind-the-scenes-why-organizations-fail-to-secure-third-party-remote-access/</loc>
		<lastmod>2020-06-15T16:51:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/seczetta-increases-momentum-in-q1-with-record-sales-new-partnerships-and-enhanced-customer-centric-product-capabilities/</loc>
		<lastmod>2020-06-15T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/robert-m-lees-jeff-haas-little-bobby-comics-week-281/</loc>
		<lastmod>2020-06-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/confederate-names-erase-history-removing-them-is-a-restoration-project/</loc>
		<lastmod>2020-06-15T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/third-party-risk-zerodayslive-video/</loc>
		<lastmod>2020-06-15T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ariel-weintraub-discusses-the-coming-revolution-in-security-operations-how-data-science-and-automation-enables-inclusiveness/</loc>
		<lastmod>2020-06-15T17:38:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/extortionists-preying-on-site-owners-with-fake-website-hacking-scam/</loc>
		<lastmod>2020-06-15T17:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/john-strands-i-had-my-mom-break-into-prison-then-we-had-pie/</loc>
		<lastmod>2020-06-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/twitter-nukes-32000-more-state-trolls-mostly-from-china/</loc>
		<lastmod>2020-06-15T18:19:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/i-love-policemen-twitter-transparency.jpg</image:loc>
			<image:title><![CDATA[i-love-policemen--twitter-transparency]]></image:title>
			<image:caption><![CDATA[Twitter China]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-advanced-license-compliance-functionality-you-didnt-know-your-sca-tool-needed/</loc>
		<lastmod>2020-06-15T18:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/inline-ddos-mitigation-could-the-massive-amazon-aws-attack-have-been-avoided/</loc>
		<lastmod>2020-06-15T18:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-picture-your-enterprise-security-posture/</loc>
		<lastmod>2020-06-15T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/dc-8-capture-the-flag-ctf-walkthrough/</loc>
		<lastmod>2020-06-15T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-stay-cyber-secure-at-home-with-a-secure-home-network/</loc>
		<lastmod>2020-06-15T18:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/devops-speed-and-security-can-co-exist-keyfactor/</loc>
		<lastmod>2020-06-15T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/beyond-the-hype-putting-mdr-service-providers-to-the-test-with-forrester/</loc>
		<lastmod>2020-06-15T20:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/table-test/</loc>
		<lastmod>2020-06-15T20:38:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/2nd-generation-privacy-technology-for-sustainability/</loc>
		<lastmod>2020-06-15T21:15:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-online-trust-doesnt-have-to-come-at-the-expense-of-the-user-experience/</loc>
		<lastmod>2020-06-15T23:24:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/denial-of-service-dos-attacks-web-based-application-security-part-7/</loc>
		<lastmod>2020-06-16T00:09:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/threat-hunting-and-mdr-clearly-required-but-is-it-tenet-8/</loc>
		<lastmod>2020-06-16T02:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-best-small-business-software-for-mac-users-avast/</loc>
		<lastmod>2020-06-16T03:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/podcast-episode-8-industrial-cybersecurity-from-hvac-systems-to-conveyor-belts/</loc>
		<lastmod>2020-06-16T03:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-light-shines-even-brighter-updates-to-corelights-encrypted-traffic-collection/</loc>
		<lastmod>2020-06-16T05:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/chocolate-and-peanut-butter-zeek-and-suricata/</loc>
		<lastmod>2020-06-16T06:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/strategies-for-securing-ot-environments-in-the-energy-and-utilities-sector/</loc>
		<lastmod>2020-06-16T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-things-to-know-about-imperva-rasp/</loc>
		<lastmod>2020-06-16T07:01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-iot-supply-chain-risk-why-everyone-should-pay-attention-to-ripple20-vulnerabilities/</loc>
		<lastmod>2020-06-16T07:12:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-tips-for-staying-safe-on-public-wi-fi-networks/</loc>
		<lastmod>2020-06-16T08:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/new-video-how-is-mixmode-different-from-todays-network-security-tools/</loc>
		<lastmod>2020-06-16T08:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/winning-at-vulnerability-management-8-best-practices/</loc>
		<lastmod>2020-06-17T07:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Roger-Clark-Silk-Road.jpg</image:loc>
			<image:title><![CDATA[Roger-Clark-Silk-Road]]></image:title>
			<image:caption><![CDATA[vulnerability management]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/vulnerabilityremediation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/prweb-1touch-io-secures-14-million-series-a-round-for-its-network-based-data-discovery-privacy-and-security-platform/</loc>
		<lastmod>2020-06-16T11:22:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-have-we-learned-about-gdpr-over-the-last-two-years/</loc>
		<lastmod>2020-06-16T11:25:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/credit-card-skimming-malware-hit-websites-as-coronavirus-lockdown-forced-retailers-to-close-high-street-stores/</loc>
		<lastmod>2020-06-16T11:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/rsa-archer-summit-a-virtual-experience/</loc>
		<lastmod>2020-06-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-changing-face-of-insider-threats/</loc>
		<lastmod>2020-06-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/australian-cyber-security-centre-acsc-attacker-trends-useful-information-from-the-government/</loc>
		<lastmod>2020-06-16T12:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/salt-security-closes-20-million-series-a-funding-round-led-by-tenaya-capital/</loc>
		<lastmod>2020-06-16T12:48:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cybersecurity-in-the-summer-of-uncertainty/</loc>
		<lastmod>2020-06-16T13:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cybersecurity-in-the-summer-of-uncertainty-2/</loc>
		<lastmod>2020-06-16T13:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/sextortionists-using-social-engineering-tactics-to-collect-victims-data/</loc>
		<lastmod>2020-06-16T13:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cyberthon-2020-valuable-discussions-for-a-worthy-cause/</loc>
		<lastmod>2020-06-16T13:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/zeronorth-bolsters-leadership-team-with-senior-technology-talent/</loc>
		<lastmod>2020-06-17T12:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/navigating-human-privacy-during-the-pandemic-key-discussions-to-follow/</loc>
		<lastmod>2020-06-16T13:38:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cmmc-compliance-only-for-employees-handling-cui/</loc>
		<lastmod>2020-06-16T13:38:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/making-the-most-of-sps-secure-consumer-go-to-market-best-practices/</loc>
		<lastmod>2020-06-16T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fostering-a-connected-culture-while-were-apart/</loc>
		<lastmod>2020-06-16T13:44:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/stuck-between-a-data-breach-and-a-ransom/</loc>
		<lastmod>2020-06-17T06:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Ransomware-Strains.jpg</image:loc>
			<image:title><![CDATA[Ransomware]]></image:title>
			<image:caption><![CDATA[ransom]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/maze-note.png</image:loc>
			<image:caption><![CDATA[maze ransomware ransom demanding message]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/sodinokibi-note.png</image:loc>
			<image:caption><![CDATA[sodinokibi ransomware ransom note]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/skybox-security-announces-claire-darling-as-chief-marketing-officer/</loc>
		<lastmod>2020-06-16T13:56:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-thrive-in-a-remote-first-business-world/</loc>
		<lastmod>2020-06-16T13:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/if-security-is-slowing-down-your-websites-performance-youre-doing-it-wrong/</loc>
		<lastmod>2020-06-16T13:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-any-instagram-account-could-be-hacked-in-less-than-10-minutes/</loc>
		<lastmod>2020-06-16T14:35:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/new-soc-research-reveals-security-teams-overconfident-in-detecting-cyberthreats-not-focused-on-threat-dwell-time/</loc>
		<lastmod>2020-06-16T14:49:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-fuzzing-is-your-friend-for-devsecops/</loc>
		<lastmod>2020-06-16T14:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/introducing-the-sans-blueprint-podcast/</loc>
		<lastmod>2020-06-16T14:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-covid-19-is-testing-telcos-mettle/</loc>
		<lastmod>2020-06-16T14:59:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-fuzzing-is-your-friend-for-devsecops-3/</loc>
		<lastmod>2020-06-16T16:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/distributed-offices-pose-our-next-great-challenge/</loc>
		<lastmod>2020-06-16T15:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-6-security-best-practices-for-agile-development-environments/</loc>
		<lastmod>2020-06-16T15:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cyber-work-episode-recap-how-is-the-open-exchange-of-information-affecting-cybersecurity/</loc>
		<lastmod>2020-06-16T15:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-rhett-greenhagens-keynote-01-attacking-the-data-before-the-decision/</loc>
		<lastmod>2020-06-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/newsbites-drilldown-for-the-week-ending-12-june-2020/</loc>
		<lastmod>2020-06-16T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/observability-made-easy-with-synthetic-monitoring/</loc>
		<lastmod>2020-06-16T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bad-actors-target-unsecure-databases-an-average-of-18-times-per-day-new-research-shows/</loc>
		<lastmod>2020-06-16T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/abuse-of-https-on-nearly-three-fourths-of-all-phishing-sites/</loc>
		<lastmod>2020-06-16T16:45:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-secure-cloud-based-collaboration-emails-and-messaging-apps/</loc>
		<lastmod>2020-06-16T16:57:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/daniel-storis-security-expert/</loc>
		<lastmod>2020-06-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/crystalbit-apple-double-dll-hijack-from-fraudulent-software-bundle-downloads-to-an-evasive-miner-raging-campaign/</loc>
		<lastmod>2020-06-16T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-dark-web-primer-avast/</loc>
		<lastmod>2020-06-16T17:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/avast-launches-breachguard-for-data-monitoring-avast/</loc>
		<lastmod>2020-06-16T17:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-allan-liskas-track-b-00-turn-down-for-raas-separating-hype-from-reality-in-the-ransomware-as-a-service-market/</loc>
		<lastmod>2020-06-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/times-up/</loc>
		<lastmod>2020-06-16T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fcc-follies-the-20-year-chinese-communist-monitoring-fail/</loc>
		<lastmod>2020-06-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/youve-heard-of-social-distancing-now-try-risk-distancing/</loc>
		<lastmod>2020-06-16T19:38:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/apple-arm-mac-rumors/</loc>
		<lastmod>2020-06-16T19:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/acunetix-releases-business-logic-recorder/</loc>
		<lastmod>2020-06-16T20:02:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/building-operational-agility-in-healthcare-focus-on-your-non-employees/</loc>
		<lastmod>2020-06-16T20:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-4-most-important-components-of-security-posture-part-2-people/</loc>
		<lastmod>2020-06-16T20:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/get-the-e-book/</loc>
		<lastmod>2020-06-16T20:40:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/8-best-practices-for-secure-remote-work-access/</loc>
		<lastmod>2020-06-16T21:29:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/google-chrome-to-join-apples-safari-in-one-year-certificate-validity/</loc>
		<lastmod>2020-06-16T21:38:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-cisos-perspective-on-data-governance-the-ccpa-and-the-future-of-privacy/</loc>
		<lastmod>2020-06-16T22:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/experience-technology-how-we-clean-infected-websites-at-sucuri/</loc>
		<lastmod>2020-06-17T00:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/digital-transformation-moves-application-security-to-the-top-ciso-cso-priority/</loc>
		<lastmod>2020-06-17T01:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/who-invented-the-roland-808/</loc>
		<lastmod>2020-06-17T02:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/multiple-critical-vulnerabilities-in-adobe-illustrator-and-after-effects-products/</loc>
		<lastmod>2020-06-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fortinet-makes-cybersecurity-exams-for-nse-certifications-available-online/</loc>
		<lastmod>2020-06-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/extended-tax-season-in-the-us-spurs-additional-concerns-for-identity-theft-and-tax-related-fraud/</loc>
		<lastmod>2020-06-17T08:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-breach-bundle-of-dating-apps-leaking-sensitive-information-discovered/</loc>
		<lastmod>2020-06-17T09:20:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/waltham-forest-council-selects-pci-pal-to-secure-cardholder-not-present-payment-transactions/</loc>
		<lastmod>2020-06-17T09:36:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/spanning-release-notes-g-suite-backup-with-integrated-dark-web-monitoring/</loc>
		<lastmod>2020-06-17T10:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/new-tech-cequence-securitys-new-api-sentinel-helps-identify-mitigate-api-exposures/</loc>
		<lastmod>2020-06-17T10:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-loginradius-future-proofs-consumer-data-privacy-and-security/</loc>
		<lastmod>2020-06-17T11:11:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/code-test-3/</loc>
		<lastmod>2020-06-17T11:31:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/passwordless-authentication-will-remote-work-accelerate-the-journey/</loc>
		<lastmod>2020-06-17T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/announcing-cequence-api-sentinel/</loc>
		<lastmod>2020-06-17T12:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-lessons-learned-from-patching-during-a-pandemic/</loc>
		<lastmod>2020-06-18T06:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Equifax2.jpg</image:loc>
			<image:title><![CDATA[Equifax2]]></image:title>
			<image:caption><![CDATA[patching]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/employees-reasons-for-not-using-secure-communications/</loc>
		<lastmod>2020-06-18T07:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Phishing-GDPR-Rights.jpg</image:loc>
			<image:title><![CDATA[Phishing-GDPR-Rights]]></image:title>
			<image:caption><![CDATA[employees]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/online-certification-opportunities-4-vendors-who-offer-online-certification-exams/</loc>
		<lastmod>2020-06-17T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bazarbackdoor-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-06-17T13:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cyber-crime-increases-as-networks-grow-more-vulnerable-in-the-wake-of-covid-19/</loc>
		<lastmod>2020-06-17T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/key-elements-of-third-party-remote-access-audit-controls/</loc>
		<lastmod>2020-06-17T14:30:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/k-pop-fans-are-the-new-anonymous/</loc>
		<lastmod>2020-06-17T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/online-voting-platform-in-three-u-s-states-vulnerable-to-multiple-types-of-attacks/</loc>
		<lastmod>2020-06-17T15:03:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/custom-node-module-management-using-private-npm-registry-configured-in-nexus-repository/</loc>
		<lastmod>2020-06-17T15:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-convergence-of-privacy-security-addressing-the-new-challenges-of-the-work-from-home-world/</loc>
		<lastmod>2020-06-17T15:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/orca-security-extends-side-scanning-to-additional-cloud-services/</loc>
		<lastmod>2020-06-17T16:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Security-Response-Cloud.jpg</image:loc>
			<image:caption><![CDATA[Qualys cloud]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Orca-Dashboard_main-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-david-dillards-track-b-02-practical-crypto-review-for-developers/</loc>
		<lastmod>2020-06-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-mitre-attck-framework-what-you-need-to-know/</loc>
		<lastmod>2020-06-17T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/odd-protest-themed-spam-messages-targeted-atlanta-police-foundation/</loc>
		<lastmod>2020-06-17T16:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/tcg-addresses-the-rise-in-cybersecurity-threats-with-critical-new-features-to-its-tpm-2-0-specification/</loc>
		<lastmod>2020-06-17T16:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-importance-of-secure-development-training-for-new-hires/</loc>
		<lastmod>2020-06-17T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-millennium-problems/</loc>
		<lastmod>2020-06-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/phishermen-up-their-game/</loc>
		<lastmod>2020-06-17T17:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/half-of-security-professionals-had-no-contingency-plan-in-place-for-covid-19/</loc>
		<lastmod>2020-06-17T17:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-david-switzers-track-b-03-rf-for-red-team/</loc>
		<lastmod>2020-06-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/staying-ahead-of-encrypted-attacks-avast/</loc>
		<lastmod>2020-06-17T18:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/become-a-vulnerability-management-guru-in-10-days/</loc>
		<lastmod>2020-06-17T18:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/breaking-down-cis-controls/</loc>
		<lastmod>2020-06-17T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/business-that-compromise-user-data-could-lose-customer-loyalty-for-years/</loc>
		<lastmod>2020-06-17T19:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/akamai-discloses-details-of-massive-ddos-attack/</loc>
		<lastmod>2020-06-17T19:54:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Defense.jpg</image:loc>
			<image:title><![CDATA[Defense]]></image:title>
			<image:caption><![CDATA[Akamai]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/psd2-new-authentication-standards-dont-have-to-mean-more-friction/</loc>
		<lastmod>2020-06-17T20:47:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/when-to-use-symmetric-vs-asymmetric-encryption-keyfactor/</loc>
		<lastmod>2020-06-17T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/advocating-for-change/</loc>
		<lastmod>2020-06-17T21:33:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/week-two-featuring-research-from-forrester-what-happens-when-application-security-becomes-continuous/</loc>
		<lastmod>2020-06-17T21:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/treck-tcp-ip-library-flaws-discovered-patches-issued/</loc>
		<lastmod>2020-06-17T22:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/every-second-of-every-day-1-7mb-of-data-is-created-for-every-person-heres-how-we-can-get-control-of-it/</loc>
		<lastmod>2020-06-17T22:17:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/health-life-sciences-guide-how-to-stay-secure-in-the-cloud-while-driving-innovation-discovery-2/</loc>
		<lastmod>2020-06-17T23:18:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/when-security-takes-a-backseat-to-productivity/</loc>
		<lastmod>2020-06-17T23:37:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/facebook-helped-develop-a-tails-exploit/</loc>
		<lastmod>2020-06-18T00:03:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-analysis-of-the-democracy-live-online-voting-system/</loc>
		<lastmod>2020-06-18T00:07:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/no-one-elses-business-crucial-steps-in-achieving-effective-organizational-trusted-computing/</loc>
		<lastmod>2020-06-18T00:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/women-changemakers-in-cybersecurity-by/</loc>
		<lastmod>2020-06-18T01:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/janice-kennedy-of-mandiant-security-validation-recognized-as-one-of-crns-2020-women-of-the-channel-by-tracey-moon/</loc>
		<lastmod>2020-06-18T01:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/mandiant-security-validation-integrates-its-security-instrumentation-platform-with-mandiants-leading-threat-intelligence-through-threat-actor-assurance-module-taam-by-lynn-harrington/</loc>
		<lastmod>2020-06-18T01:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/security-effort-does-not-equal-security-effectiveness-3-stats-every-ceo-should-be-asking-their-cisos-about-now-by-major-general-earl-matthews-usaf-ret/</loc>
		<lastmod>2020-06-18T01:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-covid-19-pandemic-dominates-the-cybersecurity-world/</loc>
		<lastmod>2020-06-18T03:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cisos-on-cisos-a-discussion-on-zero-trust-network-access/</loc>
		<lastmod>2020-06-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-partner-opportunity-around-sd-wan-and-sd-branch-deployment/</loc>
		<lastmod>2020-06-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ciso-on-ciso-a-discussion-on-zero-trust-network-access/</loc>
		<lastmod>2020-06-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-discussion-on-zero-trust-network-access/</loc>
		<lastmod>2020-06-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/i-hear-the-secrets-that-you-keep/</loc>
		<lastmod>2020-06-18T07:06:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fbi-predicts-increased-use-of-mobile-banking-apps-will-increase-cyber-attacks/</loc>
		<lastmod>2020-06-18T07:30:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/dns-over-tls-and-dns-over-https/</loc>
		<lastmod>2020-06-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-training-matters-and-how-adversarial-ai-takes-advantage-of-it/</loc>
		<lastmod>2020-06-18T08:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/file-transfer-solutions-emerge-as-a-key-technology-for-the-age-of-collaboration/</loc>
		<lastmod>2020-06-18T09:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/who-needs-cellular-iot/</loc>
		<lastmod>2020-06-18T09:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/implementing-privacy-in-a-real-world-application/</loc>
		<lastmod>2020-06-18T09:16:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-cybersecurity-skills-gap-continues-with-socs-lacking-as-many-as-10-key-employees-in-2020/</loc>
		<lastmod>2020-06-18T09:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/apple-announced-open-source-password-management-initiative/</loc>
		<lastmod>2020-06-18T09:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/attack-analytics-multi-sensor-integrations-provide-unmatched-visibility/</loc>
		<lastmod>2020-06-18T09:42:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/delivery-hero-confirms-data-breach-after-customer-data-is-posted-on-a-dark-web-forum/</loc>
		<lastmod>2020-06-18T09:56:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/attackers-inside-your-code-a-special-webinar-by-reflectiz/</loc>
		<lastmod>2020-06-18T09:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/recent-cases-question-backdoor-encryption/</loc>
		<lastmod>2020-06-19T06:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Insider-Treasury-Secrets.jpg</image:loc>
			<image:caption><![CDATA[SMB]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-state-of-k-12-cyber-safety-security-the-great-remote-learning-edtech-migration/</loc>
		<lastmod>2020-06-18T11:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/protecting-against-business-email-compromise-bec-means-stopping-stolen-credentials-at-source/</loc>
		<lastmod>2020-06-18T11:04:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/4-ways-to-keep-company-data-secure-during-wfh/</loc>
		<lastmod>2020-06-19T07:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/canstockphoto54457272-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto54457272 (1)]]></image:title>
			<image:caption><![CDATA[data secure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/theft-of-cias-vault-seven-hacking-tools-due-to-its-own-lousy-security/</loc>
		<lastmod>2020-06-18T11:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-contact-tracing-for-healthcare-workers/</loc>
		<lastmod>2020-06-18T12:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/getting-5g-security-right-in-the-age-of-covid-19/</loc>
		<lastmod>2020-06-18T12:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mcafee-mvision-cloud-becomes-first-cloud-access-security-broker-to-receive-u-s-governments-fedramp-high-jab-p-ato-designation/</loc>
		<lastmod>2020-06-18T12:31:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mcafee-awarded-defense-innovation-unit-contract-to-deliver-secure-cloud-management/</loc>
		<lastmod>2020-06-18T12:33:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bitterapt-revisited-the-untold-evolution-of-an-android-espionage-tool/</loc>
		<lastmod>2020-06-18T12:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/copied-master-key-forces-south-african-bank-to-replace-12-million-cards/</loc>
		<lastmod>2020-06-18T12:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/amazon-web-services-mitigated-a-2-3-tbps-ddos-attack/</loc>
		<lastmod>2020-06-18T12:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/your-hacked-facebook-account-goes-for-75-on-the-dark-web/</loc>
		<lastmod>2020-06-18T13:12:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/tips-for-protecting-your-password-and-personal-data/</loc>
		<lastmod>2020-06-18T13:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/maxlinear-discloses-maze-ransomware-attack-that-compromised-employee-data/</loc>
		<lastmod>2020-06-18T13:16:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/uptycs-announces-30-million-in-funding-to-deliver-next-generation-security-analytics/</loc>
		<lastmod>2020-06-18T13:27:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-concerns-with-an-at-home-workforce/</loc>
		<lastmod>2020-06-18T13:33:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-ten-most-common-information-security-program-pitfalls/</loc>
		<lastmod>2020-06-18T14:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/abcs-of-ueba-q-is-for-qualitative-analysis/</loc>
		<lastmod>2020-06-18T14:21:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/akamai-registers-massive-1-44-terabit-per-second-ddos-attack/</loc>
		<lastmod>2020-06-18T14:22:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/report-smbs-more-likely-to-adopt-cyber-insurance-than-large-organizations/</loc>
		<lastmod>2020-06-18T14:24:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/palo-alto-networks-embeds-ml-models-in-firewalls/</loc>
		<lastmod>2020-06-18T14:26:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto138708.jpg</image:loc>
			<image:title><![CDATA[canstockphoto138708]]></image:title>
			<image:caption><![CDATA[ML firewalls]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/PAN-Diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/is-lyft-based-on-apartheids-lift-system/</loc>
		<lastmod>2020-06-18T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/gdpr-data-mapping-tutorial-tips-tricks-and-techniques/</loc>
		<lastmod>2020-06-18T14:47:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/netsurion-extends-siem-service-reach-to-remote-users/</loc>
		<lastmod>2020-06-18T14:53:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto26421253.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26421253]]></image:title>
			<image:caption><![CDATA[Netsurion]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Netsurion-Remote-workforce-vpn-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/paradigm-shift-mandiant-security-instrumentation-platform-and-threat-actor-assurance-module-enable-organizations-to-get-the-right-data-for-cyber-readiness-by-lynn-harrington/</loc>
		<lastmod>2020-06-18T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/its-time-to-organize-how-to-inventorize-your-mess-of-data/</loc>
		<lastmod>2020-06-18T15:17:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/shift-left-to-successfully-secure-your-apps/</loc>
		<lastmod>2020-06-18T15:42:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/pki-definitions-terms-you-need-to-know-keyfactor/</loc>
		<lastmod>2020-06-18T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/continuously-improve-ci-cd-with-nexus-lifecycle-and-bitbucket-code-insights/</loc>
		<lastmod>2020-06-18T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-julien-vehents-track-b-05-a-devsecops-approach-to-bringing-security-beyond-the-security-team/</loc>
		<lastmod>2020-06-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-importance-of-a-robust-reverse-proxy/</loc>
		<lastmod>2020-06-18T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/qa-perimeterx-spring-release-platform-and-integrations/</loc>
		<lastmod>2020-06-18T16:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-joy-of-tech-the-pushers/</loc>
		<lastmod>2020-06-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/put-your-risk-on-mute-using-pki-to-simplify-remote-workforce-security/</loc>
		<lastmod>2020-06-18T17:14:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/3-signs-your-business-needs-a-virtual-ciso-2/</loc>
		<lastmod>2020-06-18T17:49:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/3-signs-your-business-needs-a-virtual-ciso/</loc>
		<lastmod>2020-06-18T17:49:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-vanessa-fergusons-track-b-06-the-ethics-of-data-collection/</loc>
		<lastmod>2020-06-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/section-230-update-doj-sen-hawley-propose-limiting-online-platforms-protections/</loc>
		<lastmod>2020-06-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-secure-single-page-applications/</loc>
		<lastmod>2020-06-18T18:06:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/video-bad-as-you-want-to-be-adversary-emulation-basics/</loc>
		<lastmod>2020-06-18T18:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/an-introduction-to-installing-black-duck/</loc>
		<lastmod>2020-06-18T18:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/most-forbes-global-2000-companies-lack-basic-domain-security/</loc>
		<lastmod>2020-06-18T19:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/its-october-1-vulnhub-ctf-walkthrough/</loc>
		<lastmod>2020-06-18T20:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/microsoft-certification-update-mcsa-mcse-certifications-retired/</loc>
		<lastmod>2020-06-18T20:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/webinar-ciso-underrepresented/</loc>
		<lastmod>2020-06-18T21:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fema-it-specialist-charged-in-id-theft-tax-refund-fraud-conspiracy/</loc>
		<lastmod>2020-06-18T22:07:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/its-time-to-update-your-drupal-now/</loc>
		<lastmod>2020-06-18T22:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bad-news-for-google-google-play-chrome-extensions-steal-more-user-data/</loc>
		<lastmod>2020-06-18T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/leveraging-fortinets-dynamic-cloud-security-offerings-to-secure-vpn-connections/</loc>
		<lastmod>2020-06-19T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cyber-readiness-institute-small-businesses-to-become-hot-target-for-hackers-during-covid-19-pandemic/</loc>
		<lastmod>2020-06-19T07:21:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/as-layoffs-loom-be-cognizant-of-increased-insider-risk/</loc>
		<lastmod>2020-06-19T08:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/zoom-will-be-end-to-end-encrypted-for-all-users/</loc>
		<lastmod>2020-06-19T09:55:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/new-hacking-for-hire-company-in-india/</loc>
		<lastmod>2020-06-19T11:38:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ransomware-attack-confirmed-by-australia-based-beverage-manufacturer/</loc>
		<lastmod>2020-06-19T12:38:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/european-and-north-american-countries-are-least-exposed-to-cyberattacks-new-study-reveals/</loc>
		<lastmod>2020-06-19T12:42:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/weve-settled-into-wfh-but-security-challenges-remain/</loc>
		<lastmod>2020-06-22T07:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Survey-Cybersecurity-Crowdsourcing.jpg</image:loc>
			<image:caption><![CDATA[remote workforce]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/woman-who-deliberately-deleted-firms-dropbox-is-sentenced/</loc>
		<lastmod>2020-06-19T14:01:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/pharos-and-indelible-partner-to-deliver-integrated-software-and-services-for-security-teams/</loc>
		<lastmod>2020-06-23T12:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/best-practices-for-third-party-vendor-access/</loc>
		<lastmod>2020-06-19T14:45:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/qualys-rolls-out-vmdr-to-general-public/</loc>
		<lastmod>2020-06-19T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ripple20-new-zero-day-vulnerabilities-send-shockwaves-across-iot/</loc>
		<lastmod>2020-06-19T15:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/podcast-ep-9%e2%80%8a-%e2%80%8afrom-darkness-to-light/</loc>
		<lastmod>2020-06-19T15:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ssh-targeting-golang-bots-becoming-the-new-norm/</loc>
		<lastmod>2020-06-19T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ripple20-flaws-found-in-millions-of-iot-devices-avast/</loc>
		<lastmod>2020-06-19T15:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-alyssa-millers-track-d-00-loosing-our-reality-understanding-and-combating-the-deep-fake-threat/</loc>
		<lastmod>2020-06-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-one-college-professor-is-trying-to-address-the-cybersecurity-skills-gap/</loc>
		<lastmod>2020-06-19T16:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/reflecting-on-my-journey-with-sans/</loc>
		<lastmod>2020-06-19T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/survey-finds-sluggish-cybersecurity-response-to-pandemic/</loc>
		<lastmod>2020-06-19T16:53:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/canstockphoto32926109.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32926109]]></image:title>
			<image:caption><![CDATA[survey cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-low-background-metal/</loc>
		<lastmod>2020-06-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/huge-google-chrome-spyware-ring-111-add-ons15k-domains/</loc>
		<lastmod>2020-06-19T17:22:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/spy-tumisu-pixabay.jpg</image:loc>
			<image:title><![CDATA[spy--tumisu--pixabay]]></image:title>
			<image:caption><![CDATA[Google Chrome]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/1-billion-reasons-to-manage-cryptographic-keys-keyfactor/</loc>
		<lastmod>2020-06-19T17:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/your-login-credentials-are-worth-0-00005/</loc>
		<lastmod>2020-06-19T17:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-casey-martins-network-gravity-exploring-an-enterprise-network/</loc>
		<lastmod>2020-06-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/forgerock-eliminates-need-for-usernames-and-passwords/</loc>
		<lastmod>2020-06-23T13:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/dns-as-code/</loc>
		<lastmod>2020-06-19T19:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-talk-with-the-trusted-computing-group-on-cybersecurity/</loc>
		<lastmod>2020-06-19T18:42:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/state-of-software-security-open-source-edition-key-takeaways-for-developers/</loc>
		<lastmod>2020-06-19T18:48:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/zerotrustops-securing-at-scale/</loc>
		<lastmod>2020-06-19T18:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/oops-oracle-corporations-bluekai-exposes-billions-of-records-on-interwebs/</loc>
		<lastmod>2020-06-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-and-human-behavior-shb-2020/</loc>
		<lastmod>2020-06-19T19:09:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/turn-on-mfa-before-crooks-do-it-for-you/</loc>
		<lastmod>2020-06-19T19:19:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/9-types-of-cyber-attacks-organizations-must-prepare-for/</loc>
		<lastmod>2020-06-19T23:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/protecting-k-12-remote-classes-avast/</loc>
		<lastmod>2020-06-20T01:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-overlooked-evaluation-criteria-customer-experience/</loc>
		<lastmod>2020-06-20T01:51:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/webinar-solutions-for-remote-security-testing-and-training/</loc>
		<lastmod>2020-06-20T01:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/misconfigurations-poorly-managed-access-help-drive-data-breach-risks/</loc>
		<lastmod>2020-06-20T11:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-hardik-parekhs-track-d-02-owasp-samm/</loc>
		<lastmod>2020-06-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-joy-of-tech-socializing/</loc>
		<lastmod>2020-06-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-ira-winklers-track-d-03-stopping-cyberboom-mitigating-user-error/</loc>
		<lastmod>2020-06-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ondrej-vlcek-and-garry-kasparov-speak-at-collision-avast/</loc>
		<lastmod>2020-06-20T23:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cloud-security-spending-to-buoy-the-security-market-in-2020/</loc>
		<lastmod>2020-06-21T08:28:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/shared-intel-how-ransomware-evolved-from-consumer-trickery-to-deep-enterprise-hacks/</loc>
		<lastmod>2020-06-21T13:32:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-jeremy-rasmussens-track-d-04-post-quantum-cryptography-for-dummies/</loc>
		<lastmod>2020-06-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-iso-paper-size-golden-spiral/</loc>
		<lastmod>2020-06-21T17:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-will-baggetts-track-d-05-broken-arrow/</loc>
		<lastmod>2020-06-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-election-security-has-become-a-top-issue/</loc>
		<lastmod>2020-06-21T23:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/largest-ddos-attack-ever-new-dropbox-features-north-korean-cyber-attacks/</loc>
		<lastmod>2020-06-22T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/blueleaks-exposes-files-from-hundreds-of-police-departments/</loc>
		<lastmod>2020-06-22T04:33:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mejores-practicas-del-programa-de-gestion-de-vulnerabilidades/</loc>
		<lastmod>2020-06-22T05:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/taking-a-big-picture-look-at-the-cyber-threat-landscape/</loc>
		<lastmod>2020-06-22T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/feel-ready-for-a-disaster-youre-probably-not/</loc>
		<lastmod>2020-06-22T07:38:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/man-accused-of-selling-personal-information-of-65000-upmc-employees-arrested-in-michigan/</loc>
		<lastmod>2020-06-22T09:09:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-state-of-wfh-security-3-months-in/</loc>
		<lastmod>2020-06-23T06:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/User-Experience-Performance.jpg</image:loc>
			<image:title><![CDATA[User-Experience-Performance]]></image:title>
			<image:caption><![CDATA[WFH]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/setting-up-an-iso-27001-compliant-remote-work-process/</loc>
		<lastmod>2020-06-23T07:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Employee-Convenience.jpg</image:loc>
			<image:caption><![CDATA[cyber insurance]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/ISOcompliantpic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Rhand-Leal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/small-and-medium-sized-enterprises-to-increase-cyber-insurance-spending/</loc>
		<lastmod>2020-06-22T10:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/seczetta-and-systemdomain-announce-partnership-to-provide-third-party-identity-risk-to-the-financial-services-healthcare-and-utilities-industries/</loc>
		<lastmod>2020-06-22T11:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/introducing-the-rsa-cybersecurity-summit/</loc>
		<lastmod>2020-06-22T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/blueleaks-activist-group-publishes-more-than-1-million-police-and-federal-agency-documents-online/</loc>
		<lastmod>2020-06-22T12:05:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/identifying-a-person-based-on-a-photo-linkedin-and-etsy-profiles-and-other-internet-bread-crumbs/</loc>
		<lastmod>2020-06-22T12:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/rangeforce-revamps-cybersecurity-training-platform/</loc>
		<lastmod>2020-06-22T13:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/OWASP.jpg</image:loc>
			<image:title><![CDATA[OWASP]]></image:title>
			<image:caption><![CDATA[RangeForce]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/RangeForce-Screenshot-2020-06-19-at-17.56.53-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mergeresolver-automatic-merge-conflict-resolution/</loc>
		<lastmod>2020-06-22T13:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/nitrohack-modifies-windows-discord-client-into-infostealing-trojan/</loc>
		<lastmod>2020-06-22T13:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-human-hacking-conference-2021-plan-to-be-amazed/</loc>
		<lastmod>2020-06-22T13:31:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/hsbc-joins-data-privacy-firm-privitars-series-c-financing-round-with-7-million-investment/</loc>
		<lastmod>2020-06-22T13:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/my-take-remote-classes-mobile-computing-heighten-need-for-a-security-culture-in-k-12-schools/</loc>
		<lastmod>2020-06-22T14:23:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/analysis-of-the-top10-hacktivist-operations/</loc>
		<lastmod>2020-06-22T14:26:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/owasp-top-10-overview/</loc>
		<lastmod>2020-06-22T14:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-tampa-2020-charles-herrings-track-e-01-breaking-nbad-and-ueba-detection/</loc>
		<lastmod>2020-06-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/rangeforce-debuts-new-cyberskills-platform-to-jump-start-technical-training/</loc>
		<lastmod>2020-06-22T16:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/zoom-to-implement-end-to-end-encryption-for-all-users-not-just-paid/</loc>
		<lastmod>2020-06-22T16:02:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/axis-security-included-in-gartners-market-guide-for-zero-trust-network-access/</loc>
		<lastmod>2020-06-22T16:25:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/open-banking-around-the-world/</loc>
		<lastmod>2020-06-22T16:27:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/active-directory-walkthrough-series-golden-ticket/</loc>
		<lastmod>2020-06-22T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-8-tips-for-office-security-when-employees-are-working-from-home/</loc>
		<lastmod>2020-06-22T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/robert-m-lees-jeff-haas-little-bobby-comics-week-282/</loc>
		<lastmod>2020-06-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/executive-impersonation-techniques-on-social-media/</loc>
		<lastmod>2020-06-22T17:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/need-a-vulnerability-assessment-yesterday-consider-a-black-duck-audit/</loc>
		<lastmod>2020-06-22T17:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ekans-strikes-again-honda-and-enel-taken-down-by-ransomware/</loc>
		<lastmod>2020-06-22T17:32:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/critical-capabilities-of-it-risk-management-tools/</loc>
		<lastmod>2020-06-22T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/akamai-mitigates-sophisticated-1-44-tbps-and-385-mpps-ddos-attack/</loc>
		<lastmod>2020-06-22T20:16:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cross-site-scripting-in-yith-woocommerce-ajax-product-filter/</loc>
		<lastmod>2020-06-22T20:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-verify-adaptive-acceleration-features-are-working-on-browser/</loc>
		<lastmod>2020-06-22T20:31:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-security-in-the-saas-age-thinking-small/</loc>
		<lastmod>2020-06-22T21:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/newsbites-drilldown-for-the-week-ending-19-june-2020/</loc>
		<lastmod>2020-06-22T21:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/http-request-smuggling-abusing-reverse-proxies/</loc>
		<lastmod>2020-06-22T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/garry-on-lockdown-episode-2-avast/</loc>
		<lastmod>2020-06-22T23:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/understanding-air-gaps-avast/</loc>
		<lastmod>2020-06-22T23:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/take-back-the-keys-to-your-kingdom-with-the-latest-release-of-semperis-directory-services-protector-2/</loc>
		<lastmod>2020-06-23T00:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/take-back-the-keys-to-your-kingdom-with-the-latest-release-of-semperis-directory-services-protector/</loc>
		<lastmod>2020-06-23T00:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/digital-footprint-the-first-step-in-most-offensive-services/</loc>
		<lastmod>2020-06-23T01:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/application-security-testing-ast-tools-after-hours/</loc>
		<lastmod>2020-06-23T03:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-future-of-cx-depends-on-data/</loc>
		<lastmod>2020-06-23T03:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/iot-architects-guide-published-on-page-28-of-the-iot-2020-design-guide/</loc>
		<lastmod>2020-06-23T04:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/beyond-passing-the-test-lessons-from-my-infosec-certification-journey/</loc>
		<lastmod>2020-06-23T04:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/transportation-systems-sector-cybersecurity-framework-implementation-guide/</loc>
		<lastmod>2020-06-23T04:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/amid-times-of-rapid-change-security-functions-must-be-nimble/</loc>
		<lastmod>2020-06-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mixmode-cto-responds-to-lecuns-self-supervised-ai-hopes/</loc>
		<lastmod>2020-06-23T07:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/quantum-whisky-getting-ready-for-post-quantum-cryptography/</loc>
		<lastmod>2020-06-23T07:41:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/6-steps-to-effectively-manage-business-data/</loc>
		<lastmod>2020-06-23T08:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/thoughts-on-the-state-of-enterprise-open-source/</loc>
		<lastmod>2020-06-23T09:35:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/pci-pal-progresses-partnership-with-leading-cloud-contact-center-provider-talkdesk/</loc>
		<lastmod>2020-06-23T09:50:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/making-the-next-digital-transition-will-require-extensive-security-planning/</loc>
		<lastmod>2020-06-23T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/response-required/</loc>
		<lastmod>2020-06-23T12:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/illumio-extends-zero-trust-to-the-endpoint/</loc>
		<lastmod>2020-06-23T12:37:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bitglass-security-spotlight-telehealth-startup-based-in-the-united-kingdom-affected-by-data-leak/</loc>
		<lastmod>2020-06-23T12:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/enabling-safe-adoption-of-connected-and-unmanaged-devices/</loc>
		<lastmod>2020-06-23T13:01:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/global-security-operations-with-a-remote-workforce/</loc>
		<lastmod>2020-06-23T13:09:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ddos-protection-for-networks-utilizing-as-prepending-to-route-traffic-through-imperva/</loc>
		<lastmod>2020-06-23T13:12:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/tcg-propels-security-for-embedded-automotive-and-iot-systems-with-complete-tpm-2-0-software-stack/</loc>
		<lastmod>2020-06-23T13:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/business-continuity-planning-for-the-next-pandemic/</loc>
		<lastmod>2020-06-24T06:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto2235748.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2235748]]></image:title>
			<image:caption><![CDATA[data recovery]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-7-must-have-cybersecurity-books/</loc>
		<lastmod>2020-06-23T13:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/grandoreiro-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-06-23T13:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/emergencies-and-cyberattacks-3-common-scams/</loc>
		<lastmod>2020-06-24T07:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/canstockphoto48859984.jpg</image:loc>
			<image:title><![CDATA[canstockphoto48859984]]></image:title>
			<image:caption><![CDATA[emergencies and cyberattacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-election-security-has-become-a-top-issue-2/</loc>
		<lastmod>2020-06-23T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/oss-index-contributor-asks-where-r-you/</loc>
		<lastmod>2020-06-23T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ryuk-ransomware-deployed-two-weeks-after-initial-trickbot-infection/</loc>
		<lastmod>2020-06-23T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/looking-for-a-silver-tail-replacement/</loc>
		<lastmod>2020-06-23T14:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/automation-in-compliance-why-its-a-business-imperative-and-where-to-start/</loc>
		<lastmod>2020-06-23T14:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mitigating-zero-day-threats/</loc>
		<lastmod>2020-06-23T14:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/first-circuit-rejects-attempt-to-extend-carpenter-to-public-surveillance-cameras/</loc>
		<lastmod>2020-06-23T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/veracode-achieves-aws-devops-competency-status/</loc>
		<lastmod>2020-06-23T15:23:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/digicert-and-valimail-partner-to-help-companies-display-brand-in-email-get-bimi-ready/</loc>
		<lastmod>2020-06-23T15:26:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/malicious-bots-have-realized-your-apis-are-the-weak-link/</loc>
		<lastmod>2020-06-23T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ncipher-hsms-provide-root-of-trust-to-hashicorp-vault/</loc>
		<lastmod>2020-06-23T15:32:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-canberra-csides-may-2020-silvio-cesares-attacks-against-secure-heap-allocators/</loc>
		<lastmod>2020-06-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/blueliv-and-king-union-announce-strategic-partnership-for-threat-intelligence-services/</loc>
		<lastmod>2020-06-23T16:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/building-security-into-your-cloud-first-business/</loc>
		<lastmod>2020-06-23T16:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/def-con-28-sevillage-update/</loc>
		<lastmod>2020-06-23T16:50:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/implementing-role-based-access-controls-for-third-party-access/</loc>
		<lastmod>2020-06-23T16:52:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-pass-the-test-of-reasonable-security-when-it-comes-to-ccpa/</loc>
		<lastmod>2020-06-23T16:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-modeling-study/</loc>
		<lastmod>2020-06-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/blueleaks-is-huge-fail-for-anonymous-and-ddosecrets/</loc>
		<lastmod>2020-06-23T17:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/police-matt-popovich-cc0.jpg</image:loc>
			<image:title><![CDATA[police--matt-popovich--cc0]]></image:title>
			<image:caption><![CDATA[BlueLeaks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/making-a-case-for-the-cloud-customers-give-their-honest-feedback-of-saas-based-appsec/</loc>
		<lastmod>2020-06-23T17:05:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/todyl-raises-additional-2-25-million-in-funding-and-opens-headquarters-in-denver/</loc>
		<lastmod>2020-06-23T17:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-canberra-csides-may-2020-dan-kennedys-threatpursuit-vm/</loc>
		<lastmod>2020-06-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/most-employees-overestimate-their-ability-to-work-safely-from-home-study-finds/</loc>
		<lastmod>2020-06-23T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/one-in-six-businesses-pay-ransom-to-cybercriminals-new-research-shows/</loc>
		<lastmod>2020-06-23T18:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/number-of-breached-records-continues-to-soar/</loc>
		<lastmod>2020-06-23T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/code-scanning-does-not-guarantee-code-security/</loc>
		<lastmod>2020-06-23T19:15:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/avast-discovers-47-android-adware-apps-avast/</loc>
		<lastmod>2020-06-23T20:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/transparent-microsegmentation-for-smart-home-security-avast/</loc>
		<lastmod>2020-06-23T20:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/june-device-threat-report/</loc>
		<lastmod>2020-06-23T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ebay-employees-charged-with-cyberstalking-critics/</loc>
		<lastmod>2020-06-23T21:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/canstockphoto11645182.jpg</image:loc>
			<image:title><![CDATA[canstockphoto11645182]]></image:title>
			<image:caption><![CDATA[eBay cyberstalking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/six-capabilities-required-to-meet-ecb-network-security-audit-requirements-and-achieve-least-privilege-segmentation/</loc>
		<lastmod>2020-06-23T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/challenging-roi-myths-of-software-application-security-testing-sast/</loc>
		<lastmod>2020-06-23T22:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/perception-v-reality-most-companies-are-incorrectly-assuming-that-they-are-alerting-preventing-and-blocking-attacks-by-major-general-earl-matthews-usaf-ret/</loc>
		<lastmod>2020-06-23T23:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/challenging-roi-myths-of-static-application-security-testing-sast-2/</loc>
		<lastmod>2020-06-24T03:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-confessions-the-worst-kept-secrets-of-enterprise-teams/</loc>
		<lastmod>2020-06-24T02:58:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/state-of-insider-data-breaches-in-2020/</loc>
		<lastmod>2020-06-24T05:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/getting-started-with-contrast-security-community-edition-for-java/</loc>
		<lastmod>2020-06-24T06:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/choosing-the-right-soar-solution-to-support-your-secops-team/</loc>
		<lastmod>2020-06-24T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/key-elements-for-ddos-detection-mitigation-and-analysis/</loc>
		<lastmod>2020-06-24T08:38:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-and-compliance-in-the-age-of-remote-working/</loc>
		<lastmod>2020-06-24T09:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/half-of-u-s-businesses-have-yet-to-mandate-new-security-policies-for-remote-workers/</loc>
		<lastmod>2020-06-24T11:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/advance-your-api-security-with-amazon-api-gateway-api-sentinel/</loc>
		<lastmod>2020-06-24T12:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-discovery-to-rescue-historical-data-from-compliance-violations/</loc>
		<lastmod>2020-06-24T12:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-predict-the-future-in-the-palm-lines-of-the-web/</loc>
		<lastmod>2020-06-24T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/new-crycryptor-ransomware-masqueraded-as-covid-19-tracing-app/</loc>
		<lastmod>2020-06-24T13:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-take-command-during-a-security-crisis-video/</loc>
		<lastmod>2020-06-24T14:22:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-is-data-center-security-6-ways-to-ensure-your-interests-are-protected/</loc>
		<lastmod>2020-06-24T14:41:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-theorem-launches-industrys-first-full-stack-application-security-analyzer-to-prevent-data-breaches-across-modern-web-and-cloud-services/</loc>
		<lastmod>2020-06-24T14:41:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/hyperproof-releases-new-features-to-help-organizations-prepare-for-compliance-audits/</loc>
		<lastmod>2020-06-24T14:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-breach-hacker-sells-over-1-3-million-user-records-of-popular-stalker-online-mmo-game-on-dark-web-marketplace/</loc>
		<lastmod>2020-06-24T14:55:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-establish-an-open-source-program-office/</loc>
		<lastmod>2020-06-24T14:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/aqua-1-vulnhub-capture-the-flag-ctf-walkthrough/</loc>
		<lastmod>2020-06-24T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/poetrat-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-06-24T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/adobe-to-remove-flash-download-links-recommends-people-uninstall-it-now/</loc>
		<lastmod>2020-06-24T15:01:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/you-found-your-vendor-management-solution-whats-next/</loc>
		<lastmod>2020-06-24T15:47:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bbp-youve-just-been-promoted/</loc>
		<lastmod>2020-06-24T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-canberra-csides-june-2020-eleanor-mcmurtrys-what-makes-cryptography-secure/</loc>
		<lastmod>2020-06-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/managedmethods-named-best-overall-it-solution-for-the-education-market-for-second-consecutive-year-in-annual-edtech-breakthrough-awards-program/</loc>
		<lastmod>2020-06-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/forcepoint-makes-the-case-for-the-future-of-cloud-powered-cybersecurity/</loc>
		<lastmod>2020-06-24T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-joy-of-tech-the-view-from-space/</loc>
		<lastmod>2020-06-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ddosecrets-thrown-off-twitter-after-distributing-269gb-blueleaks-data-dump/</loc>
		<lastmod>2020-06-24T17:08:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/smb-cybersecurity-why-small-businesses-are-attractive-targets/</loc>
		<lastmod>2020-06-24T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/attack-worries-increase-as-pandemic-continues/</loc>
		<lastmod>2020-06-25T06:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Looming.jpg</image:loc>
			<image:caption><![CDATA[attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/wfcm-1-6-full-integration-with-wp-activity-log/</loc>
		<lastmod>2020-06-24T17:43:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/soc-teams-care-too-much-about-detecting-cyberthreats-and-not-enough-about-mttd/</loc>
		<lastmod>2020-06-24T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-canberra-csides-june-2020-jim-mussareds-security-privacy-of-bluetooth-based-contact-tracing-apps/</loc>
		<lastmod>2020-06-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/connectwise-announces-industrys-first-global-cybersecurity-framework-for-msps-and-new-security-product-offering/</loc>
		<lastmod>2020-06-24T19:04:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/know-your-code-and-know-your-stuff/</loc>
		<lastmod>2020-06-24T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/spotlight-on-the-cold-hard-facts-of-application-security/</loc>
		<lastmod>2020-06-24T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/obfuscated-vbscript-drops-zloader-ursnif-qakbot-dridex/</loc>
		<lastmod>2020-06-24T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/virtual-conference-provided-a-great-framework-on-how-to-begin-implementing-sase/</loc>
		<lastmod>2020-06-24T20:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/sucuri-sit-down-episode-2-malware-types-explained-with-krasimir-konov/</loc>
		<lastmod>2020-06-24T20:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-address-remote-work-security-concerns/</loc>
		<lastmod>2020-06-25T07:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Security-Professionals.jpg</image:loc>
			<image:title><![CDATA[Security-Professionals]]></image:title>
			<image:caption><![CDATA[remote work security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/understanding-encrypted-attack-types-and-how-they-work-avast/</loc>
		<lastmod>2020-06-24T21:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/whats-all-the-buzz-around-microsoft-azure/</loc>
		<lastmod>2020-06-24T22:20:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/psd2-new-authentication-standards-dont-have-to-mean-more-friction-2/</loc>
		<lastmod>2020-06-24T22:26:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/onedrive-vs-google-drive-which-cloud-storage-is-better/</loc>
		<lastmod>2020-06-24T22:48:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/tripwire-patch-priority-index-for-june-2020/</loc>
		<lastmod>2020-06-24T23:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/menlo-security-thwarts-covid-19-related-phishing-attacks/</loc>
		<lastmod>2020-06-24T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/an-oxymoron-static-analysis-of-a-dynamic-language-part-1/</loc>
		<lastmod>2020-06-25T00:05:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/an-oxymoron-static-analysis-of-a-dynamic-language-part-2/</loc>
		<lastmod>2020-06-25T00:06:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/an-oxymoron-static-analysis-of-a-dynamic-language-part-3/</loc>
		<lastmod>2020-06-25T00:07:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/an-oxymoron-static-analysis-of-a-dynamic-language-part-4/</loc>
		<lastmod>2020-06-25T00:07:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/an-oxymoron-static-analysis-of-a-dynamic-language-part-5/</loc>
		<lastmod>2020-06-25T00:08:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-reduce-the-risk-of-misoperations-in-your-bulk-electric-systems/</loc>
		<lastmod>2020-06-25T06:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/financial-institution-leverages-fortinet-to-increase-efficiency-of-its-security-infrastructure/</loc>
		<lastmod>2020-06-25T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/learning-more-about-sql-injection/</loc>
		<lastmod>2020-06-25T07:57:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/online-casino-and-gambling-industry-is-gaining-momentum-so-is-the-cyber-threat/</loc>
		<lastmod>2020-06-25T08:06:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/identity-wars-episode-ii-attack-of-the-clones/</loc>
		<lastmod>2020-06-25T08:21:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/which-device-will-be-your-weakest-link-this-year/</loc>
		<lastmod>2020-06-25T09:30:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/80-of-drivers-dont-remove-personal-information-before-selling-their-car/</loc>
		<lastmod>2020-06-25T10:18:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/it-departments-may-be-helping-bad-actors-with-new-apps-for-untrained-staff-new-research-shows/</loc>
		<lastmod>2020-06-25T10:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-state-of-k-12-cyber-safety-security-student-data-privacy-in-remote-learning/</loc>
		<lastmod>2020-06-25T11:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/twitter-warns-paying-customers-of-potential-data-leak/</loc>
		<lastmod>2020-06-25T11:25:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/voice-to-tweet-fuels-new-fears-for-deep-fakes-and-cybercrime/</loc>
		<lastmod>2020-06-25T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/analyzing-iot-security-best-practices/</loc>
		<lastmod>2020-06-25T12:09:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/uk-cyber-security-watchdog-receives-1-million-suspicious-email-reports-in-just-two-months/</loc>
		<lastmod>2020-06-25T12:21:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/osint-tip-how-to-analyze-exif-data/</loc>
		<lastmod>2020-06-25T12:41:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/back-to-basics-simple-moves-to-keep-you-secure-at-home/</loc>
		<lastmod>2020-06-25T12:47:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mythbusting-network-security-architecture-best-practices/</loc>
		<lastmod>2020-06-25T12:50:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/cost-effective-cloud-security-for-the-modern-enterprise-part-1/</loc>
		<lastmod>2020-06-25T12:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-changing-world-requires-a-changing-view-of-security/</loc>
		<lastmod>2020-06-25T13:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/redefining-the-definition-of-baseline-in-cybersecurity/</loc>
		<lastmod>2020-06-25T13:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/2020-soar-report-highlights-key-drivers-and-impacts/</loc>
		<lastmod>2020-06-25T14:20:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/helpsystems-acquires-leading-data-classification-providers-to-bolster-security-business/</loc>
		<lastmod>2020-06-25T14:38:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-road-to-devsecops-addressing-the-challenges-of-appsec-awareness/</loc>
		<lastmod>2020-06-25T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/akamai-identifies-another-massive-ddos-attack/</loc>
		<lastmod>2020-06-25T15:31:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/canstockphoto8282159.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8282159]]></image:title>
			<image:caption><![CDATA[Akamai DDoS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/zeek-sigma-fully-compatible-for-cross-siem-detections/</loc>
		<lastmod>2020-06-25T15:49:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/saltstack-enterprise-6-3-improves-it-monitoring-capabilities-vulnerability-management-workflows-and-risk-based-vulnerability-remediation/</loc>
		<lastmod>2020-06-25T15:50:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bsides-canberra-csides-june-2020-iain-dicksons-transitioning-cyber-security-to-a-mission-risk-mindset/</loc>
		<lastmod>2020-06-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fight-the-surge-of-coronavirus-related-attacks/</loc>
		<lastmod>2020-06-26T07:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/canstockphoto77252211.jpg</image:loc>
			<image:title><![CDATA[canstockphoto77252211]]></image:title>
			<image:caption><![CDATA[prepare]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/covidpic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/covidpic2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/covidpic3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/find-a-playstation-4-vulnerability-and-earn-over-50000/</loc>
		<lastmod>2020-06-25T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/lucifer-malware-abused-windows-exploits-for-cryptomining-ddos-attacks/</loc>
		<lastmod>2020-06-25T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fundamentals-of-blockchain-security/</loc>
		<lastmod>2020-06-25T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/blockchain-security-overview/</loc>
		<lastmod>2020-06-25T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/active-directory-series-silver-ticket/</loc>
		<lastmod>2020-06-25T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ragnar-locker-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-06-25T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/encryption-politicians-try-to-outlaw-math-again/</loc>
		<lastmod>2020-06-25T16:29:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/lindsey-graham-donkeyhotey-cc-by.jpg</image:loc>
			<image:title><![CDATA[lindsey-graham--donkeyhotey--cc-by]]></image:title>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/sonatype-a-cybersecurity-impact-award-honoree/</loc>
		<lastmod>2020-06-25T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/considering-nexus-auditor-you-should-but-know-these-things-first/</loc>
		<lastmod>2020-06-25T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/daniel-storis-to-devops-or-not-to-devops/</loc>
		<lastmod>2020-06-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/browser-extensions-and-malware-qa/</loc>
		<lastmod>2020-06-25T17:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/amazon-caught-selling-toxic-bottled-water/</loc>
		<lastmod>2020-06-25T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-bsides-athens-2020/</loc>
		<lastmod>2020-06-25T18:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/technical-analysis-of-cve-2020-12675-new-vulnerability-fix-bypass-in-mappress/</loc>
		<lastmod>2020-06-25T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/miscreant-hackers-co-opt-captchas/</loc>
		<lastmod>2020-06-25T19:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5g-cybersecurity-and-service-providers-avast/</loc>
		<lastmod>2020-06-25T19:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/basic-tech-y-article-on-password-hacking/</loc>
		<lastmod>2020-06-25T20:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/modernizing-your-secops-for-stability-resilience-and-growth/</loc>
		<lastmod>2020-06-25T21:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mastercard-fis-and-open-lending-named-nafcu-services-innovation-award-winners/</loc>
		<lastmod>2020-06-25T22:03:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/new-charges-sentencing-in-satori-iot-botnet-conspiracy/</loc>
		<lastmod>2020-06-25T23:52:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/mitigating-the-risks-of-open-source-software-in-devops/</loc>
		<lastmod>2020-06-26T01:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/marrying-satellite-with-security-innovation-published-on-page-14-16-of-satellite-evolution-magazine/</loc>
		<lastmod>2020-06-26T02:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/foundational-controls-make-the-hard-things-easier-to-do/</loc>
		<lastmod>2020-06-26T04:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/nist-recommendations-for-tls-server-certificate-management-an-overview/</loc>
		<lastmod>2020-06-26T06:38:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/investing-in-security-and-cutting-costs-dont-have-to-be-mutually-exclusive/</loc>
		<lastmod>2020-06-26T06:47:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-virtual-patching-is-essential-for-vulnerability-mitigation/</loc>
		<lastmod>2020-06-26T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/securing-the-cloud-during-remote-work/</loc>
		<lastmod>2020-06-26T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-most-notorious-malware-attacks-of-all-time/</loc>
		<lastmod>2020-06-26T10:44:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/yapr-yet-another-privacy-regulation-an-lgpd-primer/</loc>
		<lastmod>2020-06-26T11:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/remote-work-increases-ransomware-attacks-on-k-12-schools-and-districts-fbi-warns/</loc>
		<lastmod>2020-06-26T11:49:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-unintended-harms-of-cybersecurity/</loc>
		<lastmod>2020-06-26T12:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/man-sentenced-two-others-charged-in-connection-with-satori-iot-botnet/</loc>
		<lastmod>2020-06-26T12:25:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/vancouver-man-sentenced-to-federal-prison-for-developing-ddos-botnets/</loc>
		<lastmod>2020-06-26T12:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-largest-ddos-attacks-in-history/</loc>
		<lastmod>2020-06-26T14:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/good-cyber-hygiene-is-critical-for-remote-workforces/</loc>
		<lastmod>2020-06-26T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-security-of-legacy-devices-should-not-be-the-bane-of-isps/</loc>
		<lastmod>2020-06-26T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/phishing-attacks-use-social-media-notifications-to-steal-credentials/</loc>
		<lastmod>2020-06-26T14:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/podcast-ep-7-shifting-left-at-roblox%e2%80%8a-%e2%80%8aa-conversation-with-julie-tsai/</loc>
		<lastmod>2020-06-26T15:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-cloud-security-challenges-in-2020/</loc>
		<lastmod>2020-06-26T15:25:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-anatomy-of-a-phish-avast/</loc>
		<lastmod>2020-06-26T15:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/time-for-a-haircut/</loc>
		<lastmod>2020-06-26T15:30:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/consumer-password-habits-concerning-not-surprising/</loc>
		<lastmod>2020-06-26T15:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/no-trespassing-facebook-sues-for-data-scraping/</loc>
		<lastmod>2020-06-29T06:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/canstockphoto56637500.jpg</image:loc>
			<image:title><![CDATA[canstockphoto56637500]]></image:title>
			<image:caption><![CDATA[data scraping]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/appseccali-2020-richard-greenbergs-thursday-welcome-address/</loc>
		<lastmod>2020-06-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/money-doesnt-buy-happiness-but-happy-developers-protect-money/</loc>
		<lastmod>2020-06-26T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/to-reduce-cyber-risk-strive-for-secops/</loc>
		<lastmod>2020-06-29T07:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/canstockphoto14195874.jpg</image:loc>
			<image:title><![CDATA[canstockphoto14195874]]></image:title>
			<image:caption><![CDATA[SecOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-old-days-2/</loc>
		<lastmod>2020-06-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/stop-pitting-privacy-against-public-health-and-start-innovating-to-address-both/</loc>
		<lastmod>2020-06-26T17:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/webinar-instrumentation-techniques-for-fuzz-testing/</loc>
		<lastmod>2020-06-26T17:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/appseccali-2020-alex-stamos-opening-keynote/</loc>
		<lastmod>2020-06-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/week-three-featuring-research-from-forrester-how-to-make-open-source-software-work-for-you/</loc>
		<lastmod>2020-06-26T18:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/google-removes-106-malicious-chrome-extensions-avast/</loc>
		<lastmod>2020-06-26T19:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-set-up-radius-authentication-with-google/</loc>
		<lastmod>2020-06-26T19:37:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/using-similar-taxonomies-to-understand-present-and-future-security-challenges/</loc>
		<lastmod>2020-06-26T21:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/three-republican-senators-proposed-anti-encryption-bill-endorsed-by-doj/</loc>
		<lastmod>2020-06-27T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/new-gov-domains-to-force-https-hsts-preloading-will-be-enabled-starting-sept-1/</loc>
		<lastmod>2020-06-27T14:15:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/appseccali-2020-eva-galperins-thursday-closing-keynote/</loc>
		<lastmod>2020-06-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/daniel-storis-checksum-2/</loc>
		<lastmod>2020-06-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/russian-cybercrime-boss-burkov-gets-9-years/</loc>
		<lastmod>2020-06-27T17:27:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/appseccali-2020-taiye-lambos-friday-opening-keynote-attribution/</loc>
		<lastmod>2020-06-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/sansmic-talk-threat-hunting-via-dns-with-eric-conrad/</loc>
		<lastmod>2020-06-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-risks-of-flying/</loc>
		<lastmod>2020-06-28T08:31:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/appseccali-2020-samy-kamkars-closing-keynote-browser-manipulation-for-bypassing-firewalls/</loc>
		<lastmod>2020-06-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/robert-m-lees-jeff-haas-little-bobby-comics-week-283/</loc>
		<lastmod>2020-06-28T17:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/appseccali-2020-ksenia-pegueros-how-do-javascript-frameworks-impact-the-security-of-applications/</loc>
		<lastmod>2020-06-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/minutephysics-the-astounding-physics-of-n95-masks/</loc>
		<lastmod>2020-06-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-predictions-covid-19-edition/</loc>
		<lastmod>2020-06-28T22:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-to-expect-from-brazils-new-data-protection-law/</loc>
		<lastmod>2020-06-29T03:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/family-safety-and-security-with-andy-murphy-from-the-secure-dad-podcast/</loc>
		<lastmod>2020-06-29T04:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/under-the-hood-of-fortiguard-labs-a-threat-landscape-perspective/</loc>
		<lastmod>2020-06-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/providing-threat-intelligence-at-machine-speed-with-fortiguard-labs/</loc>
		<lastmod>2020-06-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/majority-of-cyber-attacks-go-undetected/</loc>
		<lastmod>2020-06-29T07:54:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/screwed-drivers-open-atms-to-attack/</loc>
		<lastmod>2020-06-29T08:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/june-device-threat-report-2/</loc>
		<lastmod>2020-06-29T08:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ensuring-device-security-in-federal-environments-2/</loc>
		<lastmod>2020-06-29T08:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/may-device-threat-report-2/</loc>
		<lastmod>2020-06-29T08:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/tools-and-techniques-for-updating-enterprise-firmware-2/</loc>
		<lastmod>2020-06-29T08:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/eclypsium-named-a-cool-vendor-in-the-may-2020-gartner-cool-vendors-in-security-operations-and-threat-intelligence-report-2/</loc>
		<lastmod>2020-06-29T08:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/april-firmware-threat-report-2/</loc>
		<lastmod>2020-06-29T08:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/enterprise-best-practices-for-firmware-updates-2/</loc>
		<lastmod>2020-06-29T08:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/eclypsium-named-to-fast-companys-annual-list-of-the-worlds-most-innovative-companies-for-2020-2/</loc>
		<lastmod>2020-06-29T08:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/february-firmware-threat-report-2/</loc>
		<lastmod>2020-06-29T08:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ddos-protection-for-networks-divert-traffic-using-more-specific-routin/</loc>
		<lastmod>2020-06-29T09:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/world-economic-forum-outlines-core-principles-for-businesses-seeking-to-reduce-cyber-risk/</loc>
		<lastmod>2020-06-29T10:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/e-learning-platform-exposes-personal-information-of-over-1-million-north-american-students/</loc>
		<lastmod>2020-06-29T11:01:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/university-of-california-san-francisco-pays-1-million-to-ransomware-operators-after-june-1-attack/</loc>
		<lastmod>2020-06-29T11:23:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/as-the-world-reopens-privacy-and-workforce-risks-await/</loc>
		<lastmod>2020-06-29T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/pushing-web-security-to-the-edge-is-common-sense/</loc>
		<lastmod>2020-06-29T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/voice-recordings-from-domestic-violence-alerting-app-exposed-on-the-internet/</loc>
		<lastmod>2020-06-29T13:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/half-of-internet-users-fall-victim-to-cyber-attacks/</loc>
		<lastmod>2020-06-29T13:54:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/device-security-dont-count-on-users/</loc>
		<lastmod>2020-06-30T06:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/canstockphoto8737276.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8737276]]></image:title>
			<image:caption><![CDATA[device security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-build-the-right-security-assessment/</loc>
		<lastmod>2020-06-30T07:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/canstockphoto5836635.jpg</image:loc>
			<image:title><![CDATA[canstockphoto5836635]]></image:title>
			<image:caption><![CDATA[security assessment]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-new-cybersecurity-legislation-doesnt-include/</loc>
		<lastmod>2020-06-30T07:30:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Third-Party-Risk-Assessment.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity legislation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/dark-web-fraud-how-to-guides-make-cybercrime-too-easy/</loc>
		<lastmod>2020-06-29T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/active-directory-series-unconstrained-delegation/</loc>
		<lastmod>2020-06-29T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/you-wouldnt-buy-a-home-without-an-inspection-why-buy-a-company-without-one/</loc>
		<lastmod>2020-06-29T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/appseccali-2020-clint-giblers-an-opinionated-guide-to-scaling-your-companys-security/</loc>
		<lastmod>2020-06-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/enabling-802-1x-with-ad-cs/</loc>
		<lastmod>2020-06-29T16:21:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/holding-the-industry-accountable/</loc>
		<lastmod>2020-06-29T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/hr-data-management-in-a-non-employee-world-4-things-to-know/</loc>
		<lastmod>2020-06-29T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-joy-of-tech-ms-mac-dumps-mr-intel/</loc>
		<lastmod>2020-06-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ciphercloud-chronicles-1-two-gentlemen-the-honking-car/</loc>
		<lastmod>2020-06-29T17:27:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/whitehat-security-announces-web-and-mobile-appsec-bundle-to-help-organizations-secure-the-digital-future/</loc>
		<lastmod>2020-06-30T13:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/yubikey-piv-certificate-management/</loc>
		<lastmod>2020-06-29T17:48:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/appseccali-2020-chris-horns-choosing-the-right-static-code-analyzers-based-on-hard-data/</loc>
		<lastmod>2020-06-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/most-employees-would-enjoy-working-from-home-wfh-long-term-but-arent-fans-of-invasive-monitoring-software/</loc>
		<lastmod>2020-06-29T18:04:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/attackers-targeted-dozens-of-u-s-companies-with-wastedlocker/</loc>
		<lastmod>2020-06-29T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/into-the-dark-scratching-the-surface-of-the-dark-web-and-its-potential-risks-to-users/</loc>
		<lastmod>2020-06-29T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-predictions-covid-19-edition-2/</loc>
		<lastmod>2020-06-29T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/irespond-meet-michael-holburn/</loc>
		<lastmod>2020-06-29T19:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bitglass-adds-middle-east-africa-local-edge-data-centers/</loc>
		<lastmod>2020-06-29T19:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/modernizing-your-pki-infrastructure%e2%80%af-keyfactor%e2%80%af/</loc>
		<lastmod>2020-06-29T21:58:32+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->