<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2020/06/broad-supply-chain-security-ripples-from-the-ripple20-iot-mega-vulnerability/</loc>
		<lastmod>2020-06-29T22:07:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/more-musings-on-reverse-security-theater-and-security-signalling/</loc>
		<lastmod>2020-06-29T22:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-predictions-covid-19-coronavirus-edition/</loc>
		<lastmod>2020-06-29T22:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/understanding-blueleaks-avast/</loc>
		<lastmod>2020-06-29T23:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-set-up-a-server-for-small-businesses-avast/</loc>
		<lastmod>2020-06-29T23:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/sucuri-academy-free-website-security-courses/</loc>
		<lastmod>2020-06-29T23:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/are-you-following-the-top-10-software-security-best-practices/</loc>
		<lastmod>2020-06-30T00:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ripple20-armis-helps-you-identify-devices-at-risk/</loc>
		<lastmod>2020-06-30T02:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-contact-tracing-just-dropped-on-android-ios/</loc>
		<lastmod>2020-06-30T02:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/securing-devices-for-a-challenge-of-a-lifetime/</loc>
		<lastmod>2020-06-30T03:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/simplifying-sd-wan-with-centralized-management-and-orchestration/</loc>
		<lastmod>2020-06-30T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-ruthless-ransomware-authors-attack-hospitals/</loc>
		<lastmod>2020-06-30T08:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/strongpity-apt-revealing-trojanized-tools-working-hours-and-infrastructure/</loc>
		<lastmod>2020-06-30T08:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/guide-the-next-generation-soc-tool-stack-the-convergence-of-siem-ndr-and-nta/</loc>
		<lastmod>2020-06-30T08:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/jack-henry-helps-banks-and-credit-unions-manage-risk-while-optimizing-the-digital-experience-with-nudata-securitys-behavioral-technology/</loc>
		<lastmod>2020-06-30T09:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/simple-and-reliable-network-security-for-smbs/</loc>
		<lastmod>2020-06-30T10:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/pci-pals-agent-assist-helps-customers-achieve-pci-dss-compliance-for-telephone-and-digital-payments/</loc>
		<lastmod>2020-06-30T11:23:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/fbi-warns-consumers-about-covid-19-antibody-testing-scams/</loc>
		<lastmod>2020-06-30T11:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/compliance-in-a-time-of-disruption/</loc>
		<lastmod>2020-06-30T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/purple-teaming-chronicles-ii-red-team-augmentation/</loc>
		<lastmod>2020-06-30T12:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-wfh-is-changing-endpoint-security/</loc>
		<lastmod>2020-06-30T12:19:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/enterprises-bring-security-bad-habits-along-with-their-digital-transformation-efforts/</loc>
		<lastmod>2020-06-30T12:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/equation-editor-attackers-continue-to-exploit-cve-2017-1182/</loc>
		<lastmod>2020-06-30T12:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-year-and-a-half-of-hunting-exciting-funding-news-from-hunters-ceo-2/</loc>
		<lastmod>2020-06-30T14:39:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/hunters-raises-15-million-in-series-a-funding-to-speed-enterprise-breach-detection-response-with-autonomous-threat-hunting/</loc>
		<lastmod>2020-06-30T13:40:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/insider-threats-are-on-the-rise/</loc>
		<lastmod>2020-06-30T14:07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/preventing-cybersecurity-employee-burnout-and-churn-6-tips-for-managers/</loc>
		<lastmod>2020-06-30T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/can-2fa-prevent-breaches-lessons-learned-from-the-sfo-airport-watering-hole-attack/</loc>
		<lastmod>2020-06-30T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-year-and-a-half-of-hunting-exciting-funding-news-from-hunters-ceo/</loc>
		<lastmod>2020-06-30T14:39:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/life-as-a-professional-hacker-3/</loc>
		<lastmod>2020-06-30T15:57:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/m00nd3v-hawkeye-threat-actor-sells-malware-after-covid-19-diagnosis/</loc>
		<lastmod>2020-06-30T15:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19-breach-bubble-waiting-to-pop/</loc>
		<lastmod>2020-06-30T15:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/covid-19s-impact-on-business-travel-bouncing-back-and-so-are-the-malicious-attacks/</loc>
		<lastmod>2020-06-30T15:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/4-tips-for-securing-your-public-cloud-for-remote-work/</loc>
		<lastmod>2020-06-30T15:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-to-upskill-your-team-with-kubernetes/</loc>
		<lastmod>2020-06-30T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ripple20-zeek-package-open-sourced/</loc>
		<lastmod>2020-06-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/appseccali-2020-mark-nesbitts-hacking-cryptocurrencies/</loc>
		<lastmod>2020-06-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/anjuna-closes-long-existing-enterprise-data-security-gap/</loc>
		<lastmod>2020-06-30T16:21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/ip-intelligence-and-the-digital-broadcast-revolution/</loc>
		<lastmod>2020-06-30T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/smb-cybersecurity-common-types-of-attacks-on-small-businesses/</loc>
		<lastmod>2020-06-30T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/xkcd-endorheic-basin/</loc>
		<lastmod>2020-06-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/tiktok-banned-59-chinese-apps-blocked-in-india/</loc>
		<lastmod>2020-06-30T17:19:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/xi-jinping-donkeyhotey-cc-by.jpg</image:loc>
			<image:title><![CDATA[xi-jinping--donkeyhotey--cc-by]]></image:title>
			<image:caption><![CDATA[TikTok]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/how-covid-19-has-altered-the-enterprise-cyberattack-landscape/</loc>
		<lastmod>2020-06-30T17:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/pandemic-shows-need-for-digital-enterprise-strategy/</loc>
		<lastmod>2020-07-01T07:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto23159600.jpg</image:loc>
			<image:title><![CDATA[canstockphoto23159600]]></image:title>
			<image:caption><![CDATA[digital strategy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/life-as-a-professional-hacker/</loc>
		<lastmod>2020-06-30T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/appseccali-2020-nikki-brandts-and-oliver-grubins-lightning-talk-operationalizing-our-open-source-security-scanner/</loc>
		<lastmod>2020-06-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-fifty-nine/</loc>
		<lastmod>2020-06-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-5-features-of-v11-5-flexibility-for-the-new-normal/</loc>
		<lastmod>2020-06-30T19:22:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/evaluating-grc-software-four-key-questions-to-ask/</loc>
		<lastmod>2020-06-30T19:38:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/tripwire-configuration-manager-saas-solution-delivers-enhanced-cloud-security/</loc>
		<lastmod>2020-06-30T20:05:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-dos-and-donts-of-ad-recovery/</loc>
		<lastmod>2020-06-30T21:13:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-dos-and-donts-of-ad-recovery-2/</loc>
		<lastmod>2020-06-30T21:13:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-appsec-can-learn-from-developers-feature-bug-workflows/</loc>
		<lastmod>2020-06-30T22:05:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/einstein-told-us-why-user-awareness-is-not-the-right-focus/</loc>
		<lastmod>2020-06-30T22:24:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/jack-henry-partners-up-with-nfacu-winner-nudata-to-help-banks-and-credit-unions-fight-fraud/</loc>
		<lastmod>2020-06-30T22:29:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/newsbites-drilldown-for-the-week-ending-26-june-2020/</loc>
		<lastmod>2020-06-30T22:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/untrained-and-malicious-users-lead-concerns-among-it-professionals-in-the-uk/</loc>
		<lastmod>2020-06-30T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/security-professionals-say-covid-19-crisis-increased-cyber-threat-to-enterprise-systems/</loc>
		<lastmod>2020-06-30T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/supporting-the-pillars-what-should-be-in-your-zero-trust-strategy/</loc>
		<lastmod>2020-07-01T00:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bidpath-leads-by-example-and-avoids-these-4-security-pitfalls/</loc>
		<lastmod>2020-07-01T00:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/is-your-security-posture-holistic/</loc>
		<lastmod>2020-07-01T01:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/encrypted-traffic-inspection-avast/</loc>
		<lastmod>2020-07-01T02:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-is-ccpa-compliance/</loc>
		<lastmod>2020-07-01T02:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/earn-it-act-facial-recognition-fail-can-i-be-phished/</loc>
		<lastmod>2020-07-01T03:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/the-csa-iot-security-controls-framework/</loc>
		<lastmod>2020-07-01T04:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fortinet-secure-sd-wan-enhances-azure-virtual-wan-integrations/</loc>
		<lastmod>2020-07-01T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/into-the-rabbit-hole-offensive-dns-tunneling-rootkits/</loc>
		<lastmod>2020-07-01T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ekans-ransomware-targeting-ot-ics-systems/</loc>
		<lastmod>2020-07-01T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/data-loss-protection-for-the-hybrid-cloud/</loc>
		<lastmod>2020-07-01T08:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/security-considerations-for-retailers-in-the-post-covid-era/</loc>
		<lastmod>2020-07-01T08:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-billion-pound-manchester-city-hack/</loc>
		<lastmod>2020-07-01T08:41:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/business-email-compromise-bec-attacks-jump-200-percent-from-april-to-may/</loc>
		<lastmod>2020-07-01T08:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/imperva-prevents-client-side-attacks-like-formjacking-and-magecart/</loc>
		<lastmod>2020-07-01T09:35:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bbc-publishes-screenshots-allegedly-depicting-ransomware-negotiations-between-netwalker-and-ucsf/</loc>
		<lastmod>2020-07-01T09:38:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/google-removes-25-malicious-google-play-apps-stealing-facebook-login-credentials/</loc>
		<lastmod>2020-07-01T11:16:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/healthcare-in-the-age-of-ransomware/</loc>
		<lastmod>2020-07-01T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-covid-19-changed-our-sales-enablement-for-good/</loc>
		<lastmod>2020-07-01T12:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-do-incident-response-triage-right/</loc>
		<lastmod>2020-07-01T13:33:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/new-mac-ransomware-leveraged-piracy-as-means-of-distribution/</loc>
		<lastmod>2020-07-01T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-latest-devsecops-podcast-playlist/</loc>
		<lastmod>2020-07-01T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-is-soc2-compliance-how-does-it-affect-your-business/</loc>
		<lastmod>2020-07-01T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/securing-the-international-iot-supply-chain/</loc>
		<lastmod>2020-07-01T14:31:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/us-now-considers-huawei-and-zte-threats-to-national-security/</loc>
		<lastmod>2020-07-01T15:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-nishil-shahs-protecting-the-bridge-from-dollars-to-bitcoin-securing-edge-payments-infrastructure/</loc>
		<lastmod>2020-07-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/remote-work-pushes-brute-force-attacks-higher/</loc>
		<lastmod>2020-07-02T06:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Extremist.jpg</image:loc>
			<image:caption><![CDATA[brute-force]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/introducing-the-new-application-owner-alerts-workflow-tool/</loc>
		<lastmod>2020-07-01T16:12:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/becoming-an-all-around-defender-beware-of-flying-baby-syndrome/</loc>
		<lastmod>2020-07-01T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-five-word-jargon/</loc>
		<lastmod>2020-07-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/jira-the-godzilla-of-team-support-tools/</loc>
		<lastmod>2020-07-01T17:17:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/white-box-encryption-ending-web-app-vulnerability/</loc>
		<lastmod>2020-07-02T07:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Data-Breach-Disclosures.jpg</image:loc>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/cryptopic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-is-an-x-509-certificate-keyfactor/</loc>
		<lastmod>2020-07-01T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/all-my-stripes-the-new-business-imperative-of-lgbtq-inclusion/</loc>
		<lastmod>2020-07-01T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/vishing-spikes-as-workforces-go-remote-6-vishing-prevention-tips-anyone-can-follow/</loc>
		<lastmod>2020-07-01T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-get-promoted-in-a-cybersecurity-career/</loc>
		<lastmod>2020-07-01T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/find-more-bugs-by-detecting-failure-better-an-introduction-to-sanitizerprocessmonitoragent/</loc>
		<lastmod>2020-07-01T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/spanning-release-notes-error-only-email-spanning-backup-for-office-365/</loc>
		<lastmod>2020-07-01T17:43:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-richard-tychanskys-web-app-containers-applied-threat-modeling/</loc>
		<lastmod>2020-07-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/happy-canada-day-2020-la-fete-du-canada-2020/</loc>
		<lastmod>2020-07-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ddos-attacks-increase-almost-300-in-just-one-year-study-shows/</loc>
		<lastmod>2020-07-01T20:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/pki-delivery-software-for-every-device/</loc>
		<lastmod>2020-07-01T20:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/prioritizing-cyber-risk-management-in-a-world-of-uncertainty/</loc>
		<lastmod>2020-07-01T21:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/five-benefits-to-implementing-security-automation-using-soar/</loc>
		<lastmod>2020-07-02T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cyber-security-roundup-for-july-2020/</loc>
		<lastmod>2020-07-02T00:38:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ransomware-gangs-dont-need-pr-help/</loc>
		<lastmod>2020-07-02T01:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/a-breakdown-of-singapores-notice-on-cyber-hygiene/</loc>
		<lastmod>2020-07-02T03:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-should-you-worry-about-dns-attacks/</loc>
		<lastmod>2020-07-02T06:55:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fortinac-enables-gettysburg-college-to-deliver-a-quality-wi-fi-experience/</loc>
		<lastmod>2020-07-02T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bob-reany-appointed-head-of-nudata-security/</loc>
		<lastmod>2020-07-02T07:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/crns-12-biggest-cloud-threats-and-vulnerabilities-in-2020/</loc>
		<lastmod>2020-07-02T07:30:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/identity-wars-episode-i-the-phantom-menace/</loc>
		<lastmod>2020-07-02T08:31:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/a-checklist-for-preparing-for-your-organizations-next-pci-audit/</loc>
		<lastmod>2020-07-02T09:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/understanding-the-purpose-of-security-controls-and-the-need-for-compliance/</loc>
		<lastmod>2020-07-02T09:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cisco-makes-economic-case-for-cybersecurity/</loc>
		<lastmod>2020-07-02T10:18:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Shadow-IT.jpg</image:loc>
			<image:title><![CDATA[Shadow-IT]]></image:title>
			<image:caption><![CDATA[Cisco cybersecurity]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/SecureX-Unified-Visibility-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/10-stats-about-soc-performance-practices-and-analyst-attitudes-in-2020/</loc>
		<lastmod>2020-07-02T10:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/remote-workers-encounter-8-risky-urls-per-day-new-research-shows/</loc>
		<lastmod>2020-07-02T10:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-state-of-k-12-cyber-safety-security-remote-learning-cybersecurity-lessons-for-next-school-year/</loc>
		<lastmod>2020-07-02T11:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/owasp-appsec-training-day-api-attacks-beyond-the-owasp-api-top-10/</loc>
		<lastmod>2020-07-02T11:42:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/loginradius-approves-consumer-audit-trail-for-in-depth-data-analysis-and-risk-assessment/</loc>
		<lastmod>2020-07-02T11:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/enhancing-speed-and-user-experience-with-bitglass-sase/</loc>
		<lastmod>2020-07-02T12:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/vulnerable-voting-infrastructure-and-the-future-of-election-security/</loc>
		<lastmod>2020-07-02T12:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/trickbot-malware-using-screen-resolution-checks-as-anti-vm-tactic/</loc>
		<lastmod>2020-07-02T12:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-best-risk-assessment-template-for-iso-27001-compliance/</loc>
		<lastmod>2020-07-02T13:19:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xdr-the-cybersecurity-x-factor/</loc>
		<lastmod>2020-07-03T06:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/canstockphoto7252890.jpg</image:loc>
			<image:title><![CDATA[canstockphoto7252890]]></image:title>
			<image:caption><![CDATA[XDR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-security-islands-prevent-effective-secrets-management/</loc>
		<lastmod>2020-07-02T14:19:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-security-value-of-inefficiency/</loc>
		<lastmod>2020-07-02T14:26:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/reputation-risks-how-cyberattacks-affect-consumer-perception/</loc>
		<lastmod>2020-07-02T15:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/one-in-every-142-passwords-is-123456-new-research-shows/</loc>
		<lastmod>2020-07-02T15:23:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/agent-tesla-what-it-is-how-it-works-and-why-its-targeting-energy-companies/</loc>
		<lastmod>2020-07-02T15:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cyber-work-podcast-top-soft-skills-and-the-federal-cybersecurity-reskilling-academy/</loc>
		<lastmod>2020-07-02T15:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/wearedelphix-hims-pawar/</loc>
		<lastmod>2020-07-02T15:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/wordpress-file-permissions-the-guide-to-configuring-secure-website-web-server-permissions/</loc>
		<lastmod>2020-07-02T15:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-brian-glas-owasp-samm2-your-dynamic-software-security-journey/</loc>
		<lastmod>2020-07-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/forgerock-identity-live-2020-what-our-customers-are-saying/</loc>
		<lastmod>2020-07-02T16:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/going-beyond-awareness-training-to-protect-mobile-devices-from-phishing/</loc>
		<lastmod>2020-07-02T16:12:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/3-web-third-party-related-events-you-dont-want-to-miss-from-may-june-2020/</loc>
		<lastmod>2020-07-02T16:12:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mandiant-security-effectiveness-report-2020-what-you-need-to-know-now-about-reconnaissance-by-major-general-earl-matthews-usaf-ret/</loc>
		<lastmod>2020-07-02T16:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/preventing-cyber-attacks-with-cis-basic-controls/</loc>
		<lastmod>2020-07-02T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/securing-the-new-normal-future-of-work/</loc>
		<lastmod>2020-07-02T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-oily-house-index/</loc>
		<lastmod>2020-07-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/22900-mongodb-databases-held-to-ransom-by-hacker-threatening-to-report-firms-for-gdpr-violations/</loc>
		<lastmod>2020-07-02T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-dmitry-sotnikovs-are-you-properly-using-jwts/</loc>
		<lastmod>2020-07-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/1000-false-wakewords-a-letter-buy-200-toilet-rolls/</loc>
		<lastmod>2020-07-02T18:05:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/alexa-michael-bussmann-pixabay.jpg</image:loc>
			<image:title><![CDATA[alexa--michael-bussmann--pixabay]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/vulcan-cyber-adds-customizable-risk-modeling-to-its-vulnerability-remediation-platform/</loc>
		<lastmod>2020-07-02T20:14:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/united-states-federal-trade-commission-hosts-privacycon-2020/</loc>
		<lastmod>2020-07-02T22:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cve-2020-2021-palo-alto-networks-pan-os-authentication-bypass-in-saml-authentication-vulnerability/</loc>
		<lastmod>2020-07-02T22:34:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/trust-and-courage-are-essential-to-a-strong-team-culture/</loc>
		<lastmod>2020-07-02T22:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/dangerous-website-backups/</loc>
		<lastmod>2020-07-03T00:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/checking-the-windows-store-for-patching-the-codecs-library-vulnerability/</loc>
		<lastmod>2020-07-03T02:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/filling-the-cybersecurity-skills-gap-with-fortivets/</loc>
		<lastmod>2020-07-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bad-actors-target-mongodb-databases-threatening-to-contact-gdpr-legislators-unless-ransom-is-paid/</loc>
		<lastmod>2020-07-03T11:09:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/child-identity-thief-receives-259-months-in-federal-prison-after-running-a-3-3-million-scheme/</loc>
		<lastmod>2020-07-03T13:57:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-vulnerable-iot-is-a-double-sided-problem-for-isps-and-their-customers/</loc>
		<lastmod>2020-07-03T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cisa-and-fbi-issue-advisory-on-dealing-with-tor-malicious-internet-traffic/</loc>
		<lastmod>2020-07-03T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/when-it-comes-to-dns-trust-but-verify/</loc>
		<lastmod>2020-07-06T07:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Idaptive-Unify-Access.jpg</image:loc>
			<image:caption><![CDATA[DNS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-john-villamils-lightning-talk-modern-web-security-the-art-of-creating-and-breaking-assertions/</loc>
		<lastmod>2020-07-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-joy-of-tech-doomscrolling/</loc>
		<lastmod>2020-07-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-avoid-blockchain-pitfalls/</loc>
		<lastmod>2020-07-03T17:08:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-importance-of-authentication-avast/</loc>
		<lastmod>2020-07-03T17:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/130m-user-records-for-sale-from-major-data-breaches-avast/</loc>
		<lastmod>2020-07-03T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-sahar-mazlooms-car-hacking-security-analysis-of-an-in-vehicle-infotainment-system-and-app-platform/</loc>
		<lastmod>2020-07-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/severe-windows-10-vulnerabilities-fixed-ahead-of-patch-tuesday/</loc>
		<lastmod>2020-07-03T18:33:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/secure-code-review-a-necessity/</loc>
		<lastmod>2020-07-04T05:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/happy-independence-day-july-4th-2020/</loc>
		<lastmod>2020-07-04T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/hacked-by-police/</loc>
		<lastmod>2020-07-04T08:49:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/let-me-out-of-your-net-egress-testing/</loc>
		<lastmod>2020-07-04T13:14:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-companies-ready-for-the-risks-of-iot/</loc>
		<lastmod>2020-07-04T17:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/e-verifys-ssn-lock-is-nothing-of-the-sort/</loc>
		<lastmod>2020-07-04T22:24:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-four-phases-of-offensive-security-teams/</loc>
		<lastmod>2020-07-05T14:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-gianluca-brigandis-achieve-ai-powered-api-privacy-using-open-source/</loc>
		<lastmod>2020-07-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/robert-m-lees-jeff-haas-little-bobby-comic-week-284/</loc>
		<lastmod>2020-07-05T17:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-alexei-kojenovs-insecure-serialization-and-how-not-to-do-it/</loc>
		<lastmod>2020-07-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/hushpuppi-and-mr-woodbery-bec-scammers-welcome-to-chicago/</loc>
		<lastmod>2020-07-05T19:38:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/is-my-site-hacked-heres-how-to-find-out-step-by-step/</loc>
		<lastmod>2020-07-06T01:07:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bitglass-adds-europe-local-edge-data-centers/</loc>
		<lastmod>2020-07-06T02:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/bens-book-of-the-month-review-of-data-breaches-crisis-and-opportunity/</loc>
		<lastmod>2020-07-06T02:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/countdown-to-rsac-2020-apj-qa-with-jason-lau/</loc>
		<lastmod>2020-07-06T02:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/weekly-news-roundup-june-22-26-2020/</loc>
		<lastmod>2020-07-06T02:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/seven-deadly-sins-of-security-communications/</loc>
		<lastmod>2020-07-06T02:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/soar-is-devsecops/</loc>
		<lastmod>2020-07-06T02:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/book-review-pci-dss-an-integrated-data-security-standard-guide/</loc>
		<lastmod>2020-07-06T02:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/your-application-is-mostly-written-by-strangers/</loc>
		<lastmod>2020-07-06T02:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/data-protection-and-privacy-officer-priorities-2020-how-organizations-are-adapting-to-a-rapidly-changing-regulatory-and-security-landscape/</loc>
		<lastmod>2020-07-06T02:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/weekly-news-roundup-june-15-19-2020/</loc>
		<lastmod>2020-07-06T02:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/devsecops-isnt-sexy-but-among-the-key-tools-to-strengthen-cybersecurity/</loc>
		<lastmod>2020-07-06T02:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/weekly-news-roundup-june-8-12-2020/</loc>
		<lastmod>2020-07-06T03:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/a-fresh-look-at-the-cybersecurity-risk-and-governance-jobs-of-the-future/</loc>
		<lastmod>2020-07-06T03:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/weekly-news-roundup-june-1-5-2020/</loc>
		<lastmod>2020-07-06T03:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-rsa-conference-resources-to-revisit-this-week/</loc>
		<lastmod>2020-07-06T03:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/were-facing-a-remote-working-future-and-its-a-security-opportunity/</loc>
		<lastmod>2020-07-06T03:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/elevate-your-third-party-risk-management-program-to-a-competitive-advantage/</loc>
		<lastmod>2020-07-06T03:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/weekly-news-roundup-may-25-29-2020/</loc>
		<lastmod>2020-07-06T03:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/bens-book-of-the-month-review-of-the-digital-big-bang/</loc>
		<lastmod>2020-07-06T03:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/from-rsa-conference-to-pandemic-a-startups-story/</loc>
		<lastmod>2020-07-06T03:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/5-strategic-concepts-to-keep-in-mind-during-your-next-incident/</loc>
		<lastmod>2020-07-06T03:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/as-pandemic-fueled-cyberattacks-increase-now-is-the-time-for-companies-to-check-and-enhance-their-cybersecurity/</loc>
		<lastmod>2020-07-06T03:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/weekly-news-roundup-may-18-22-2020/</loc>
		<lastmod>2020-07-06T03:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/top-5-rsa-conference-resources-to-revisit/</loc>
		<lastmod>2020-07-06T03:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/finding-truth-in-the-time-of-covid-19/</loc>
		<lastmod>2020-07-06T03:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/communicating-our-way-through-the-crisis-if-we-winter-this-one-out-we-can-summer-anywhere-2/</loc>
		<lastmod>2020-07-06T03:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/rsa-conference-2021-changes-date-from-february-to-may-2021/</loc>
		<lastmod>2020-07-06T03:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/nice-resources-for-skills-and-team-development/</loc>
		<lastmod>2020-07-06T03:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/weekly-news-roundup-may-11-15-2020/</loc>
		<lastmod>2020-07-06T03:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/top-5-rsa-conference-resources-week-6/</loc>
		<lastmod>2020-07-06T03:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/winning-the-war-on-cybercrime-the-passwordless-solution/</loc>
		<lastmod>2020-07-06T03:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/tiktok-privacy-concerns-macos-ransomware-bad-passwords/</loc>
		<lastmod>2020-07-06T04:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/the-global-pandemics-influence-on-hot-topics-in-cyber-law-2020/</loc>
		<lastmod>2020-07-06T04:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/weekly-news-roundup-may-4-8-2020/</loc>
		<lastmod>2020-07-06T04:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/top-5-rsa-conference-resources-week-5/</loc>
		<lastmod>2020-07-06T04:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/internet-blackouts-the-latest-front-in-the-battle-for-information-control/</loc>
		<lastmod>2020-07-06T04:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/weekly-news-roundup-april-27-may-1-2020/</loc>
		<lastmod>2020-07-06T04:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/top-5-rsa-conference-resources-week-4/</loc>
		<lastmod>2020-07-06T04:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/bens-book-of-the-month-review-of-building-an-effective-cybersecurity-program/</loc>
		<lastmod>2020-07-06T04:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/keeping-an-eye-on-business-email-compromise/</loc>
		<lastmod>2020-07-06T04:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/why-logging-in-the-cloud-is-now-more-imperative-than-ever/</loc>
		<lastmod>2020-07-06T04:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/weekly-news-roundup-april-20-24-2020/</loc>
		<lastmod>2020-07-06T04:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/top-5-rsa-conference-resources-of-the-week/</loc>
		<lastmod>2020-07-06T04:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/preparing-for-viral-attacks-in-the-digital-and-physical-worlds-requires-centralized-intelligence/</loc>
		<lastmod>2020-07-06T04:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/book-review-of-hunting-cyber-criminals-a-hackers-guide-to-online-intelligence-gathering-tools-and-techniques/</loc>
		<lastmod>2020-07-06T04:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/weekly-news-roundup-april-13-17-2020/</loc>
		<lastmod>2020-07-06T04:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/top-5-rsa-conference-resources/</loc>
		<lastmod>2020-07-06T04:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/amid-growing-coronavirus-related-cyberattacks-companies-must-continue-making-big-strides-in-siem-and-other-types-of-cybersecurity-analytics/</loc>
		<lastmod>2020-07-06T04:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/how-security-companies-can-leverage-immigration-for-expertise-and-growth/</loc>
		<lastmod>2020-07-06T04:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/weekly-news-roundup-april-6-10-2020/</loc>
		<lastmod>2020-07-06T04:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/remote-access-presents-new-challenges-in-industrial-cybersecurity/</loc>
		<lastmod>2020-07-06T04:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/hows-your-rsa-conference-homework-coming-along/</loc>
		<lastmod>2020-07-06T05:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/entornos-ics-y-gestion-de-parches-que-hacer-si-no-puede-aplicar-parches/</loc>
		<lastmod>2020-07-06T05:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/design-implementation-of-oem-ics-cybersecurity-frameworks-the-good-the-bad-and-the-ugly/</loc>
		<lastmod>2020-07-06T05:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/large-distributed-enterprise-adopts-fortinets-comprehensive-secure-sd-wan-solution/</loc>
		<lastmod>2020-07-06T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-is-rasp-and-why-should-you-care/</loc>
		<lastmod>2020-07-06T07:15:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/customer-corner-haworth-head-of-security-on-leading-through-covid-19/</loc>
		<lastmod>2020-07-06T10:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cybersecurity-lessons-from-the-pandemic-data-part-2/</loc>
		<lastmod>2020-07-06T10:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/exclusive-webinar-recording-attackers-inside-your-code/</loc>
		<lastmod>2020-07-06T10:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/debunking-cybersecurity-jargon-part-four-what-is-optical-character-recognition/</loc>
		<lastmod>2020-07-06T11:01:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/thiefquest-ransomware-for-the-mac/</loc>
		<lastmod>2020-07-06T11:43:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/smartedge-is-a-key-enabler-for-a-modern-remote-workforce/</loc>
		<lastmod>2020-07-06T12:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/5-dating-apps-leak-more-than-1-million-user-profiles-and-sensitive-information/</loc>
		<lastmod>2020-07-06T13:56:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/australian-cyber-attack-vectors-blocked-out-of-the-box-by-imperva-cloud-waf/</loc>
		<lastmod>2020-07-06T15:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/threat-actors-target-a-vulnerable-healthcare-industry-amid-coronavirus-outbreak/</loc>
		<lastmod>2020-07-06T15:13:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/csp-part-of-a-comprehensive-standards-based-security-strategy/</loc>
		<lastmod>2020-07-06T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ex-yahoo-employee-avoids-jail-despite-hacking-6000-accounts-and-stealing-explicit-photos-and-videos/</loc>
		<lastmod>2020-07-06T15:50:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/compliance-as-code/</loc>
		<lastmod>2020-07-06T15:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-anita-damicos-and-chris-horns-do-certain-types-of-developers-or-teams-write-more-secure-code/</loc>
		<lastmod>2020-07-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-is-siem-what-is-soar-how-do-they-compare-do-you-need-both/</loc>
		<lastmod>2020-07-06T16:18:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/4-tips-for-phishing-field-employees-updated-2020/</loc>
		<lastmod>2020-07-06T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/djinn-1-ctf-walkthrough-part-1/</loc>
		<lastmod>2020-07-06T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cybersecurity-consultant-certifications-explore-your-options/</loc>
		<lastmod>2020-07-06T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-joy-of-tech-stop-hate-for-profit/</loc>
		<lastmod>2020-07-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-ben-sadeghipours-and-chris-holts-owning-the-cloud-through-ssrf-and-pdf-generators/</loc>
		<lastmod>2020-07-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-steps-can-people-take-to-safeguard-their-digital-identities/</loc>
		<lastmod>2020-07-06T18:51:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/threat-intelligence-in-a-big-data-world/</loc>
		<lastmod>2020-07-07T06:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto34318568.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34318568]]></image:title>
			<image:caption><![CDATA[threat intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bolstering-corporate-security-post-covid-19/</loc>
		<lastmod>2020-07-07T07:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/CISO-Security-Necessary.jpg</image:loc>
			<image:title><![CDATA[CISO-Security-Necessary]]></image:title>
			<image:caption><![CDATA[corporate security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/vulnerability-management-maturity-model/</loc>
		<lastmod>2020-07-06T22:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/5-technology-budget-tips-for-hard-times/</loc>
		<lastmod>2020-07-06T23:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/many-cios-believe-expired-tls-certificates-could-affect-their-business/</loc>
		<lastmod>2020-07-06T23:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/vulnerabilities-digest-june-2020/</loc>
		<lastmod>2020-07-07T01:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/open-source-audits-the-secret-ingredient-for-successful-ma/</loc>
		<lastmod>2020-07-07T03:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/lucifer-malware-hits-unpatched-windows-systems-with-cryptomining-ddos-attacks/</loc>
		<lastmod>2020-07-07T05:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/entry-level-career-advice-for-aspiring-cybersecurity-professionals/</loc>
		<lastmod>2020-07-07T05:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/using-update-exe-as-a-case-study-for-robust-ot-cybersecurity/</loc>
		<lastmod>2020-07-07T05:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/before-you-join-us-at-the-dfir-summit-read-this/</loc>
		<lastmod>2020-07-07T05:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ot-infrastructure-attacks-the-risk-is-real/</loc>
		<lastmod>2020-07-07T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/report-ot-security-remains-a-challenge-for-leaders-across-industries/</loc>
		<lastmod>2020-07-07T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/4-ways-to-advance-your-tech-without-sacrificing-security/</loc>
		<lastmod>2020-07-07T08:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/survey-from-pci-pal-reveals-australians-concerns-relating-to-data-and-payment-security-practices-during-the-coronavirus-pandemic/</loc>
		<lastmod>2020-07-07T08:08:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-recent-history-of-self-supervised-learning/</loc>
		<lastmod>2020-07-07T09:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/digital-anarchist-watch-whats-next-in-tech-2/</loc>
		<lastmod>2020-07-07T12:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/prioritizing-privacy-in-an-age-of-surveillance-and-tracking/</loc>
		<lastmod>2020-07-07T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/attackiq-includes-mitre-attcks-new-sub-techniques-for-customers/</loc>
		<lastmod>2020-07-07T12:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/social-engineering-sales-and-ethics/</loc>
		<lastmod>2020-07-07T12:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/qualys-appoints-ben-carr-as-chief-information-security-officer/</loc>
		<lastmod>2020-07-07T12:19:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/pci-compliance-for-government-bodies/</loc>
		<lastmod>2020-07-07T12:42:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/armis-extends-exabeam-siem-visibility-to-unmanaged-iot-devices/</loc>
		<lastmod>2020-07-07T12:50:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/memory-management-is-the-leading-cause-of-security-vulnerabilities-in-google-chrome/</loc>
		<lastmod>2020-07-07T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bricata-partners-with-elastic-to-deliver-comprehensive-network-security-visibility-through-elastic-security/</loc>
		<lastmod>2020-07-07T13:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/improving-your-vulnerability-remediation-process-2/</loc>
		<lastmod>2020-07-07T13:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/improving-your-vulnerability-remediation-process/</loc>
		<lastmod>2020-07-07T13:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/massive-bec-scheme-run-by-nigerian-national-dismantled-by-fbi/</loc>
		<lastmod>2020-07-07T13:08:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/radware-threat-researchers-live-recent-network-threats/</loc>
		<lastmod>2020-07-07T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/avast-finds-banking-trojan-cerberus-on-google-play-avast/</loc>
		<lastmod>2020-07-07T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/using-cybersaint-power-controls-to-implement-the-nist-csf/</loc>
		<lastmod>2020-07-07T13:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-future-of-zero-trust-continuous-authentication/</loc>
		<lastmod>2020-07-07T13:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/exabeam-and-armis-partner-to-extend-siem-visibility-to-unmanaged-and-iot-devices-helping-security-teams-identify-malicious-activity-across-all-devices/</loc>
		<lastmod>2020-07-07T13:38:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-only-constant-is-change-rethinking-secure-access-for-a-new-workforce/</loc>
		<lastmod>2020-07-07T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/european-agencies-hack-criminal-encrochat-messaging-system/</loc>
		<lastmod>2020-07-07T13:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cloud-security-alliance-publishes-new-paper-the-six-pillars-of-devsecops-automation/</loc>
		<lastmod>2020-07-07T13:58:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/nigerian-national-extradited-to-united-states-on-bec-scam-charges/</loc>
		<lastmod>2020-07-07T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/secure-remote-access-gain-control-over-home-office-network-activity/</loc>
		<lastmod>2020-07-07T14:07:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/order-out-of-chaos-tackling-phishing-attacks/</loc>
		<lastmod>2020-07-08T07:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Phishing-Scams.jpg</image:loc>
			<image:caption><![CDATA[phishing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/proxying-https-traffic-with-burp-suite/</loc>
		<lastmod>2020-07-07T14:26:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-cisos-should-tell-the-board-about-cybersecurity/</loc>
		<lastmod>2020-07-07T14:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/security-risks-of-outdated-encryption-is-your-data-really-secure/</loc>
		<lastmod>2020-07-07T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cookies-an-overview-of-associated-privacy-and-security-risks/</loc>
		<lastmod>2020-07-07T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ferpa-compliance-how-to-obtain-it/</loc>
		<lastmod>2020-07-07T15:23:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/f5-big-ip-has-huge-enormous-bad-scary-security-holes-patch-now/</loc>
		<lastmod>2020-07-07T15:57:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/network-michael-schwarzenberger-pixabay.jpg</image:loc>
			<image:title><![CDATA[network--michael-schwarzenberger--pixabay]]></image:title>
			<image:caption><![CDATA[F5]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/enisa-guidelines-endorsed-pseudonymisation-even-before-gdpr/</loc>
		<lastmod>2020-07-07T15:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-brian-foxs-open-source-developers-are-securitys-new-front-line/</loc>
		<lastmod>2020-07-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/enhanced-product-security-incident-response-reduces-customer-risk/</loc>
		<lastmod>2020-07-07T16:08:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/enhanced-product-security-incident-response-reduces-customer-risk-2/</loc>
		<lastmod>2020-07-07T16:08:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xm-cyber-secures-17-million-in-series-b-funding-to-accelerate-cloud-development/</loc>
		<lastmod>2020-07-09T10:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/businesses-now-spend-a-third-of-their-cybersecurity-budget-on-soc/</loc>
		<lastmod>2020-07-07T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-space-basketball/</loc>
		<lastmod>2020-07-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/week-four-featuring-research-from-forrester-see-why-secure-devops-is-the-future-of-speed/</loc>
		<lastmod>2020-07-07T17:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/find-and-fix-vulnerabilities-in-seconds-using-github-pr-reviews-with-line-comments/</loc>
		<lastmod>2020-07-07T17:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-four-stages-of-a-certificate-life-cycle/</loc>
		<lastmod>2020-07-07T17:31:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/24-months-at-verodin/</loc>
		<lastmod>2020-07-07T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/36-months-at-verodin-by-brian-contos/</loc>
		<lastmod>2020-07-07T17:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/rsa-2020-start-validating-your-cybersecurity-effectiveness-by-tracey-moon/</loc>
		<lastmod>2020-07-07T17:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/instrumenting-cloud-security-to-validate-critical-controls-by-tracey-moon/</loc>
		<lastmod>2020-07-07T17:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/security-validation-addressing-the-need-for-change-rsa-2020-key-takeaways-by-henry-peltokangas/</loc>
		<lastmod>2020-07-07T17:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/verodin-thanksgiving-event-guns-n-roses-oracle-arena-oakland-by-brian-contos/</loc>
		<lastmod>2020-07-07T17:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/3-reasons-to-join-us-at-flight-europe-2020-virtual-conference/</loc>
		<lastmod>2020-07-07T17:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/webinars-static-analysis-best-practices-remote-security-testing-and-training/</loc>
		<lastmod>2020-07-07T17:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-chris-kubeckas-more-than-turbulence/</loc>
		<lastmod>2020-07-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/is-97-network-traffic-offload-interesting/</loc>
		<lastmod>2020-07-07T18:27:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/securing-the-multi-cloud-environment-through-cspm-and-sspm/</loc>
		<lastmod>2020-07-07T18:57:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/priorities-in-agile-lead-to-software-observability-in-annual-agile-report/</loc>
		<lastmod>2020-07-07T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/top-9-free-security-training-tools/</loc>
		<lastmod>2020-07-07T19:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mobile-authentication-with-802-11u/</loc>
		<lastmod>2020-07-07T20:43:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bot-management-3-critical-capabilities-your-vendor-must-deliver/</loc>
		<lastmod>2020-07-07T20:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fuzzcon-tv-tackles-federal-fuzz-testing-5/</loc>
		<lastmod>2020-07-07T22:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/newsbites-drilldown-for-the-week-ending-3-july-2020/</loc>
		<lastmod>2020-07-07T21:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-ensure-your-company-is-protected-from-ransomware-attacks-during-a-pandemic/</loc>
		<lastmod>2020-07-08T00:27:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/threatx-integrates-with-cortex-xsoar-by-palo-alto-networks/</loc>
		<lastmod>2020-07-08T00:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/web-scammers-are-using-the-covid-19-crisis-to-attack-with-magecart/</loc>
		<lastmod>2020-07-08T02:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/tala-presents-at-rsac-innovation-sandbox-threats-to-cybersecurity/</loc>
		<lastmod>2020-07-08T02:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/evaluating-client-side-web-security-questions-to-ask-your-vendor-2/</loc>
		<lastmod>2020-07-08T02:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ransomware-characteristics-and-attack-chains-what-you-need-to-know-about-recent-campaigns/</loc>
		<lastmod>2020-07-08T05:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/malware-the-new-age-weaponry/</loc>
		<lastmod>2020-07-08T06:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/strategies-for-overcoming-the-cybersecurity-skills-gap/</loc>
		<lastmod>2020-07-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/deep-analysis-of-a-qbot-campaign-part-ii/</loc>
		<lastmod>2020-07-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-data-protection-in-apac-has-fallen-between-the-gaps/</loc>
		<lastmod>2020-07-08T07:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-embed-a-positive-security-culture-in-the-covid-19-remote-working-new-normal/</loc>
		<lastmod>2020-07-08T09:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/todays-whitelisted-applications-are-tomorrows-security-breaches/</loc>
		<lastmod>2020-07-08T10:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/network-security-monitoring-data-types-i-ii-and-iii/</loc>
		<lastmod>2020-07-08T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-identity-management-for-education-sector-has-become-crucial/</loc>
		<lastmod>2020-07-08T11:30:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/while-in-lock-down-heres-what-fraudsters-did-in-q1-2020-2/</loc>
		<lastmod>2020-07-08T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/risk-manager-the-top-career-of-the-future/</loc>
		<lastmod>2020-07-08T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/kazakh-hacker-known-as-fxmsp-faces-45-years-behind-bars/</loc>
		<lastmod>2020-07-08T12:33:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/smbs-benefit-from-sd-wan-features-for-branch-offices-connectivity/</loc>
		<lastmod>2020-07-08T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cyber-attacks-in-the-pandemic-era-more-of-the-same/</loc>
		<lastmod>2020-07-08T13:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/north-american-renewable-energy-giant-confirms-data-breach-after-its-parent-company-discloses-ransomware-attack/</loc>
		<lastmod>2020-07-08T13:49:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/kingminer-botnet-keeps-up-with-the-times/</loc>
		<lastmod>2020-07-08T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/security-jobs-whats-hot-and-whats-cooling/</loc>
		<lastmod>2020-07-08T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/us-k-12-and-colleges-suffered-1300-data-breaches-in-15-years/</loc>
		<lastmod>2020-07-08T14:01:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-improve-asset-management-and-security/</loc>
		<lastmod>2020-07-09T06:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/canstockphoto2264177.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2264177]]></image:title>
			<image:caption><![CDATA[asset management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/it-project-managers-a-career-of-keeping-business-it-on-track/</loc>
		<lastmod>2020-07-08T14:24:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/stalkerware-use-surges-during-lockdown-avast/</loc>
		<lastmod>2020-07-08T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/court-lets-microsoft-seize-web-domains-used-in-covid-19-phishing-bec-scams-and-fraud/</loc>
		<lastmod>2020-07-08T14:50:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-cyber-resilience-planning-is-critical-hint-pandemic/</loc>
		<lastmod>2020-07-09T07:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/canstockphoto29952616.jpg</image:loc>
			<image:title><![CDATA[canstockphoto29952616]]></image:title>
			<image:caption><![CDATA[cyber resilience]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bring-your-own-device-bitglass-2020-personal-device-report/</loc>
		<lastmod>2020-07-08T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/15-billion-usernames-and-passwords-for-internet-services-including-bank-and-social-media-accounts-on-offer-to-cyber-criminals-finds-new-research-from-digital-shadows/</loc>
		<lastmod>2020-07-08T15:46:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/improve-threat-prevention-with-a-focus-on-tactics-not-techniques/</loc>
		<lastmod>2020-07-08T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-lakshmi-sudheers-dhivya-chandramouleeswarans-who-dis-the-right-way-to-authenticate/</loc>
		<lastmod>2020-07-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ronald-graham-and-the-magic-of-math/</loc>
		<lastmod>2020-07-08T16:06:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/2020-is-on-track-to-hit-a-new-data-breach-record/</loc>
		<lastmod>2020-07-08T16:22:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/best-tools-to-perform-steganography-updated-2019/</loc>
		<lastmod>2020-07-08T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-prevent-burnout-in-a-cybersecurity-career/</loc>
		<lastmod>2020-07-08T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mutation-cross-site-scripting-mxss-vulnerabilities-discovered-in-mozilla-bleach/</loc>
		<lastmod>2020-07-08T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/todays-whitelisted-applications-are-tomorrows-security-breaches-2/</loc>
		<lastmod>2020-07-08T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/website-security-shouldnt-slow-down-your-websites-performance/</loc>
		<lastmod>2020-07-08T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/hackers-are-using-the-covid-19-crisis-to-attack-with-magecart/</loc>
		<lastmod>2020-07-08T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/your-soar-has-changed-your-life-here-are-three-ways-it-can-work-harder/</loc>
		<lastmod>2020-07-08T16:42:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-universal-rating-scale/</loc>
		<lastmod>2020-07-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/installing-s-mime-certificates-with-securew2/</loc>
		<lastmod>2020-07-08T17:24:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/supreme-court-passes-on-limiting-tcpa-litigation/</loc>
		<lastmod>2020-07-08T17:36:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/edp-renewables-notifies-landowners-of-ransomware-attack/</loc>
		<lastmod>2020-07-08T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-elizabeth-nammours-pinyao-guos-building-data-discovery-and-classification-at-scale/</loc>
		<lastmod>2020-07-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/decision-automation-the-new-mission-for-cybersecurity-in-government-defense/</loc>
		<lastmod>2020-07-08T18:02:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cloudy-with-a-probability-of-a-breach/</loc>
		<lastmod>2020-07-08T18:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/us-secret-service-warns-of-attacks-on-msps/</loc>
		<lastmod>2020-07-08T18:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/best-business-tools-of-2019-winner-avast/</loc>
		<lastmod>2020-07-08T18:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/podcast-the-healthcare-sectors-accelerated-cloud-migration-and-evolving-security-needs/</loc>
		<lastmod>2020-07-08T19:11:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/whats-driving-healthcares-accelerated-cloud-migration/</loc>
		<lastmod>2020-07-08T20:54:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-code-security-unlocks-the-next-trillion-dollar-software-opportunity/</loc>
		<lastmod>2020-07-08T21:59:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/smb-cybersecurity-five-best-practices-for-small-businesses/</loc>
		<lastmod>2020-07-08T23:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/smb-cybersecurity-why-layered-security-helps-small-businesses/</loc>
		<lastmod>2020-07-08T23:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/smb-cybersecurity-how-small-businesses-can-control-online-access/</loc>
		<lastmod>2020-07-08T23:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/smb-cybersecurity-attacks-can-be-devastating-for-small-businesses/</loc>
		<lastmod>2020-07-08T23:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/pirated-wordpress-plugins-bundled-with-backdoors/</loc>
		<lastmod>2020-07-09T00:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ccpa-2-0-gets-closer-to-reality-but-how-does-it-compare-to-gdpr/</loc>
		<lastmod>2020-07-09T01:12:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/rdp-based-ransomware-is-targeting-school-districts-what-can-you-do-to-prevent-it/</loc>
		<lastmod>2020-07-09T03:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/i-have-antivirus-im-protected-right-mis-steps-customers-make-with-their-security-and-vulnerability-tools/</loc>
		<lastmod>2020-07-09T06:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/leveraging-automation-and-analytics-to-protect-security-infrastructure-in-government/</loc>
		<lastmod>2020-07-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/understanding-web-application-penetration-testing/</loc>
		<lastmod>2020-07-09T07:10:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/introducing-imperva-cloud-data-security/</loc>
		<lastmod>2020-07-09T08:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-is-siem-what-is-soar-how-are-they-different/</loc>
		<lastmod>2020-07-09T08:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-problem-with-relying-on-log-data-for-cybersecurity/</loc>
		<lastmod>2020-07-09T09:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/is-your-malware-detection-future-proof-7-adaptable-technologies-for-elusive-threats/</loc>
		<lastmod>2020-07-09T09:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/discrimination-monitoring-in-hybrid-learning-environments/</loc>
		<lastmod>2020-07-09T11:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/summer-security-tips-for-surfing-the-internet/</loc>
		<lastmod>2020-07-09T11:15:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/data-leak-on-online-gambling-app-puts-millions-of-users-at-risk-of-cyber-attacks/</loc>
		<lastmod>2020-07-09T11:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/while-in-lock-down-heres-what-fraudsters-did-in-q1-2020/</loc>
		<lastmod>2020-07-09T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-egregious-11-examining-the-top-cloud-computing-threats/</loc>
		<lastmod>2020-07-09T12:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/think-bad-do-good-podcast-episode-3-best-practices-in-threat-informed-defense/</loc>
		<lastmod>2020-07-09T12:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/survey-surfaces-heavy-security-toll-from-alert-fatigue/</loc>
		<lastmod>2020-07-09T13:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/canstockphoto12340437.jpg</image:loc>
			<image:title><![CDATA[canstockphoto12340437]]></image:title>
			<image:caption><![CDATA[alert fatigue]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-are-iams-still-struggling-today/</loc>
		<lastmod>2020-07-09T13:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/lessons-learned-from-the-fresenius-ransomware-cyberattack/</loc>
		<lastmod>2020-07-09T13:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/podcast-recap-identifying-worms-bots-fraud-and-other-malicious-traffic-with-guest-fang-yu/</loc>
		<lastmod>2020-07-09T13:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/implementing-automated-security-services-were-somewhat-confident-virtually-here/</loc>
		<lastmod>2020-07-09T13:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/new-research-from-sumo-logic-reveals-growing-security-alerts-driving-demand-for-cloud-siem-solutions-in-the-soc/</loc>
		<lastmod>2020-07-09T13:50:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fast-user-access-to-saas-for-users-on-home-wi-fi/</loc>
		<lastmod>2020-07-09T13:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/kasa-camera-vulnerability-discovery-responsible-disclosures-feel-like-groundhog-day-again/</loc>
		<lastmod>2020-07-09T14:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/billions-of-leaked-credentials-available-on-the-dark-web/</loc>
		<lastmod>2020-07-09T14:05:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/report-digital-transformation-increases-cyber-risk/</loc>
		<lastmod>2020-07-10T06:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/canstockphoto267793.jpg</image:loc>
			<image:title><![CDATA[canstockphoto267793]]></image:title>
			<image:caption><![CDATA[digital transformation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fake-outlook-credential-upgrade-campaign-phishes-for-employee-credentials/</loc>
		<lastmod>2020-07-09T14:19:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-key-reason-why-some-enterprises-outright-refuse-to-enable-byod/</loc>
		<lastmod>2020-07-09T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cosmic-lynx-the-highly-professional-cybercrime-gang-scamming-businesses-out-of-millions-of-dollars/</loc>
		<lastmod>2020-07-09T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/joker-spyware-infiltrated-google-play-abused-old-trick-to-target-users/</loc>
		<lastmod>2020-07-09T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mitre-attck-july-2020-update-sub-techniques/</loc>
		<lastmod>2020-07-09T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/authentic8-silo-labeled-high-performer-on-g2/</loc>
		<lastmod>2020-07-09T14:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/securing-enterprises-from-rf-exploitation/</loc>
		<lastmod>2020-07-10T07:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/canstockphoto24689497.jpg</image:loc>
			<image:title><![CDATA[canstockphoto24689497]]></image:title>
			<image:caption><![CDATA[RF]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-bad-bots-are-targeting-the-healthcare-sector/</loc>
		<lastmod>2020-07-09T15:49:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/american-frontier-history-is-poisoned-by-losers-of-civil-war/</loc>
		<lastmod>2020-07-09T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-abhay-bhargavs-dr-devsecops-or-how-i-stopped-worrying-about-ci-and-started-loving-the-cloud/</loc>
		<lastmod>2020-07-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-childrens-internet-protection-act-cipa/</loc>
		<lastmod>2020-07-09T17:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-joy-of-tech-stages-of-grief-over-arm-based-macs/</loc>
		<lastmod>2020-07-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/8-key-areas-to-improve-cybersecurity-efficiency/</loc>
		<lastmod>2020-07-09T17:03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/job-centric-design-the-next-generation-of-cybersecurity/</loc>
		<lastmod>2020-07-09T17:03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/4-reasons-your-it-asset-inventory-is-inaccurate/</loc>
		<lastmod>2020-07-09T17:03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/6-slides-every-ciso-should-use-in-their-board-presentation/</loc>
		<lastmod>2020-07-09T17:03:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/perception-vs-reality-in-cybersecurity/</loc>
		<lastmod>2020-07-09T17:03:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-steps-to-measure-and-assess-security-posture/</loc>
		<lastmod>2020-07-09T17:03:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/3-essential-tools-for-cisos-to-get-the-job-done/</loc>
		<lastmod>2020-07-09T17:03:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/blueleaks-putting-out-an-apb-for-appropriate-password-policies/</loc>
		<lastmod>2020-07-09T17:03:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-it-takes-10x-longer-to-patch-than-it-does-to-exploit/</loc>
		<lastmod>2020-07-09T17:03:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/your-login-credentials-are-worth-0-00005-2/</loc>
		<lastmod>2020-07-09T17:03:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/elevating-the-mssp-from-the-backroom-to-the-boardroom/</loc>
		<lastmod>2020-07-09T17:08:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/garry-on-lockdown-episode-3-avast/</loc>
		<lastmod>2020-07-09T17:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-hariram-balasundarams-jana-geddis-securing-third-party-apps-in-a-marketplace-ecosystem/</loc>
		<lastmod>2020-07-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/spoofed-domains-present-multifaceted-growing-problems-for-enterprises/</loc>
		<lastmod>2020-07-09T18:06:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/digital-signature-vs-digital-certificate-keyfactor/</loc>
		<lastmod>2020-07-09T18:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fuzzcon-tv-launches-with-an-introduction-to-fuzzing-panel/</loc>
		<lastmod>2020-07-09T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-net-effect-why-cloud-iam-is-so-difficult/</loc>
		<lastmod>2020-07-09T21:22:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mind-the-gaps-the-requisite-mindset-to-stay-ahead-of-cybersecurity-threats/</loc>
		<lastmod>2020-07-09T21:31:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/enhancing-speed-and-user-experience-with-bitglass-sase-2/</loc>
		<lastmod>2020-07-09T21:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-importance-of-authentication-security/</loc>
		<lastmod>2020-07-09T22:38:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/making-the-change-to-risk-based-appsec/</loc>
		<lastmod>2020-07-09T22:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/accelerate-cmmc-compliance-with-nist-and-dfars/</loc>
		<lastmod>2020-07-10T00:19:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/assessing-api-security-risks-plotting-a-solution/</loc>
		<lastmod>2020-07-10T01:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/spotlight-podcast-two-decades-on-tcg-tackles-trustworthiness-for-the-internet-of-things/</loc>
		<lastmod>2020-07-10T04:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/17k-dfir-summit-registrations-and-counting-deep-dive-into-this-content-before-you-join-us-next-week/</loc>
		<lastmod>2020-07-10T06:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/zoom-zero-day-flaw-allegedly-allows-full-takeover-of-windows-pcs/</loc>
		<lastmod>2020-07-10T10:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/could-better-technology-protect-privacy-when-a-crisis-requires-enhanced-knowledge/</loc>
		<lastmod>2020-07-10T10:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/business-email-compromise-bec-criminal-ring/</loc>
		<lastmod>2020-07-10T11:12:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/police-buy-hacked-data-to-fish-for-evidence-is-that-even-legal/</loc>
		<lastmod>2020-07-10T11:59:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/fed-fish-cocoparisienne-pixabay.jpg</image:loc>
			<image:title><![CDATA[fed-fish--cocoparisienne--pixabay]]></image:title>
			<image:caption><![CDATA[police]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/masking-malicious-memory-artifacts-part-i-phantom-dll-hollowing/</loc>
		<lastmod>2020-07-10T12:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/conti-ransomware-deemed-a-possible-successor-of-ryuk/</loc>
		<lastmod>2020-07-10T12:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/more-than-half-of-canadians-admit-to-have-been-a-victim-of-cybercriminals/</loc>
		<lastmod>2020-07-10T12:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/covid-19-tracking-apps-riddled-with-flaws-avast/</loc>
		<lastmod>2020-07-10T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/firefox-send-used-to-spread-malware-mozilla-temporarily-stops-the-service/</loc>
		<lastmod>2020-07-10T13:52:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mitigating-threats-associated-with-downloading-files-in-native-file-format/</loc>
		<lastmod>2020-07-10T13:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/schrodingers-cryptocurrency-both-private-and-not/</loc>
		<lastmod>2020-07-13T06:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Trust-Cryptocurrency.jpg</image:loc>
			<image:title><![CDATA[Trust-Cryptocurrency]]></image:title>
			<image:caption><![CDATA[cryptocurrency]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/biometrics-preparing-for-a-passwordless-future/</loc>
		<lastmod>2020-07-13T07:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Invasion-Of-Privacy.jpg</image:loc>
			<image:title><![CDATA[Invasion-Of-Privacy]]></image:title>
			<image:caption><![CDATA[biometrics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/one-in-2-companies-unable-to-cope-with-remote-work-security-risks/</loc>
		<lastmod>2020-07-10T15:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-christian-folinis-practical-owasp-crs-in-high-security-settings/</loc>
		<lastmod>2020-07-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/a-look-at-pan-os-versions-with-a-bit-of-r/</loc>
		<lastmod>2020-07-10T16:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-acceptable-risk/</loc>
		<lastmod>2020-07-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-is-third-party-remote-access/</loc>
		<lastmod>2020-07-10T17:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mcafee-launches-esm-cloud-delivering-rapid-time-to-value-with-incident-investigations/</loc>
		<lastmod>2020-07-14T13:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/weekly-news-roundup-july-6-10-2020/</loc>
		<lastmod>2020-07-10T17:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/theres-not-a-bank-ignoring-digital-but-it-takes-dataops-to-succeed/</loc>
		<lastmod>2020-07-10T17:48:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-tanya-jancas-lightning-talk-purple-is-the-new-black-modern-approaches-to-application-security/</loc>
		<lastmod>2020-07-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/idaptive-release-20-2-is-now-available/</loc>
		<lastmod>2020-07-10T18:46:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/webinars-implementing-sast-reducing-open-source-risk-in-ma/</loc>
		<lastmod>2020-07-10T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/remote-security-operations-center-concerns-ariacybersecurity/</loc>
		<lastmod>2020-07-10T20:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/iapp-privacy-and-regulations-whats-next-after-ccpa/</loc>
		<lastmod>2020-07-10T23:11:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/justice-for-the-six-executed-jesuits/</loc>
		<lastmod>2020-07-11T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/new-study-finds-75-of-cios-are-concerned-about-tls-certificate-related-security-risks/</loc>
		<lastmod>2020-07-11T13:09:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-kelley-robinsons-what-if-we-had-tls-for-phone-numbers-an-introduction-to-shaken-stir/</loc>
		<lastmod>2020-07-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-joy-of-tech-a-field-guide-to-maskholes/</loc>
		<lastmod>2020-07-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-francesco-cipollones-the-security-phoenix-from-the-ashes-of-devops/</loc>
		<lastmod>2020-07-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-braiterman-greenberg-kubecka-pearlman-verma-jiggetts-mason-diversity-by-design-securing-the-cyber-workforce-development-lifecycle/</loc>
		<lastmod>2020-07-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/robert-m-lees-jeff-haas-little-bobby-comic-week-285/</loc>
		<lastmod>2020-07-12T17:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-hamster-ball-2/</loc>
		<lastmod>2020-07-12T17:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-jarrod-oversons-the-state-of-credential-stuffing-and-the-future-of-account-takeovers/</loc>
		<lastmod>2020-07-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/contract-verification-made-easier/</loc>
		<lastmod>2020-07-12T19:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/browser-isolation-evasion-and-exploits-how-to-fill-the-gap-in-browser-isolation/</loc>
		<lastmod>2020-07-13T03:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/f5-big-ip-exploit-wifi-router-security-updates-password-reuse/</loc>
		<lastmod>2020-07-13T04:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/addressing-the-security-requirements-of-dynamic-cloud-environments/</loc>
		<lastmod>2020-07-13T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/iphone-hacks-what-you-need-to-know-about-mobile-security/</loc>
		<lastmod>2020-07-13T07:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/attack-worries-increase-as-pandemic-continues-2/</loc>
		<lastmod>2020-07-13T07:06:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/vpns-what-do-they-do-and-what-dont-they-do/</loc>
		<lastmod>2020-07-13T08:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/toddlers-technology-avast/</loc>
		<lastmod>2020-07-13T09:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/towards-a-universal-security-solution-against-bluetooth-low-energy-attacks/</loc>
		<lastmod>2020-07-13T11:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ive-got-99-problems-and-api-visibility-aint-one-of-em/</loc>
		<lastmod>2020-07-13T12:03:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/go-phish-cybercriminals-stick-to-coronavirus-and-financial-content-to-fuel-phishing-schemes/</loc>
		<lastmod>2020-07-13T12:32:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/deep-dive-into-synthetic-identity-fraud/</loc>
		<lastmod>2020-07-13T12:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-work-in-ways-that-will-make-your-boss-take-notice/</loc>
		<lastmod>2020-07-13T13:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cost-effective-cloud-security-for-the-modern-enterprise-part-2/</loc>
		<lastmod>2020-07-13T13:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mitigating-risk-to-healthcare-data-in-heightened-threat-environments/</loc>
		<lastmod>2020-07-13T13:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/introducing-page-integrity-manager/</loc>
		<lastmod>2020-07-13T14:15:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/jsonar-introduces-ai-driven-sensitive-data-management-sdm-and-database-security-threat-prevention/</loc>
		<lastmod>2020-07-22T13:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/14-best-open-source-web-application-vulnerability-scanners-updated-for-2020/</loc>
		<lastmod>2020-07-13T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/dmv-1-vulnhub-capture-the-flag-ctf-walkthrough/</loc>
		<lastmod>2020-07-13T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-identify-and-prevent-firmware-vulnerabilities/</loc>
		<lastmod>2020-07-13T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/key-findings-from-infosecs-2020-it-security-talent-pipeline-study/</loc>
		<lastmod>2020-07-13T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/trickbot-malware-warning-victims-of-infection-by-mistake/</loc>
		<lastmod>2020-07-13T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/quality-conundrum-relying-on-qa-tools-alone-increases-risk/</loc>
		<lastmod>2020-07-13T15:10:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/man-who-lived-luxury-lifestyle-after-hacking-linkedin-and-dropbox-is-found-guilty/</loc>
		<lastmod>2020-07-13T15:16:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/zero-day-vulnerability-in-zoom-affected-windows-7-users/</loc>
		<lastmod>2020-07-13T15:31:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-jonathan-marcils-lightning-talk-owasp-project-showcase-threat-model-cookbook/</loc>
		<lastmod>2020-07-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/covid-19-could-catalyze-passwordless-authentication/</loc>
		<lastmod>2020-07-14T06:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/passwordlesssecurity.jpg</image:loc>
			<image:title><![CDATA[passwordlesssecurity]]></image:title>
			<image:caption><![CDATA[passwordless]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/securing-digital-transformation-on-a-budget/</loc>
		<lastmod>2020-07-14T07:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/empty-wallet.jpg</image:loc>
			<image:title><![CDATA[empty wallet]]></image:title>
			<image:caption><![CDATA[digital transformation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/outsmarting-ato-threats/</loc>
		<lastmod>2020-07-13T16:35:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/exabeam-appoints-security-industry-veteran-adam-geller-as-chief-product-officer/</loc>
		<lastmod>2020-07-14T13:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-joy-of-tech-zucks-ok-with-civil-rights-setbacks/</loc>
		<lastmod>2020-07-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/identity-lookup-cloud-directory-authentication-without-ldap/</loc>
		<lastmod>2020-07-13T17:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-jim-manicos-from-the-owasp-top-tens-to-the-owasp-asvs/</loc>
		<lastmod>2020-07-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/most-companies-now-accept-byod-policies-but-30-dont-use-endpoint-protection-for-those-devices/</loc>
		<lastmod>2020-07-13T18:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/understand-the-past-to-shape-the-future-of-appsec/</loc>
		<lastmod>2020-07-13T19:23:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/new-forrester-report-build-a-developer-security-champions-program/</loc>
		<lastmod>2020-07-13T19:51:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-cyber-security-fuzz-a-tank/</loc>
		<lastmod>2020-07-13T21:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-automation-can-help-you-respond-to-hacked-credentials-circulating-the-dark-web/</loc>
		<lastmod>2020-07-13T21:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ai-cyber-attack-prediction-platform-cyr3con-secures-8-2-million-in-financing/</loc>
		<lastmod>2020-07-14T13:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/in-defense-of-open-debate/</loc>
		<lastmod>2020-07-13T23:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/breached-data-indexer-data-viper-hacked/</loc>
		<lastmod>2020-07-13T23:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/achieving-compliance-with-data-protection-regulations/</loc>
		<lastmod>2020-07-13T23:56:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/choosing-the-best-risk-cyber-risk-quantification-method/</loc>
		<lastmod>2020-07-14T00:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/spox-phishing-kit-harvests-chase-bank-credentials/</loc>
		<lastmod>2020-07-14T00:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/facing-up-to-virtual-reality-at-infosec-world-2020/</loc>
		<lastmod>2020-07-14T02:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/5-risks-you-need-to-remember-when-securing-your-containers/</loc>
		<lastmod>2020-07-14T05:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/live-auction-marketplace-confirms-data-breach-after-bad-actor-puts-user-database-up-for-sale-on-the-dark-web/</loc>
		<lastmod>2020-07-14T06:27:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/returning-to-the-workplace-and-the-ongoing-threat-of-phishing-attacks/</loc>
		<lastmod>2020-07-14T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fortinet-unveils-secure-sd-wan-for-multi-cloud/</loc>
		<lastmod>2020-07-14T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/nta-and-ndr-the-missing-piece/</loc>
		<lastmod>2020-07-14T07:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-stop-data-breaches-of-your-cloud-data/</loc>
		<lastmod>2020-07-14T08:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/san-diego-resident-receives-46-months-after-pleading-guilty-to-million-dollar-scam-involving-the-stolen-identities-of-military-members/</loc>
		<lastmod>2020-07-14T08:12:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/continuous-intelligence-driver-for-cyber-success/</loc>
		<lastmod>2020-07-15T06:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Real-Security.jpg</image:loc>
			<image:title><![CDATA[Real-Security]]></image:title>
			<image:caption><![CDATA[continuous intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/clocking-in-from-the-couch-and-how-to-do-it-securely/</loc>
		<lastmod>2020-07-14T11:28:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cybersecurity-and-the-remote-work-revolution-a-10-point-plan/</loc>
		<lastmod>2020-07-14T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/digital-home-security-how-to-stay-safe-while-the-world-works-from-home/</loc>
		<lastmod>2020-07-14T12:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/managedmethods-a-winner-in-the-tech-learning-awards-of-excellence-program-for-second-consecutive-year/</loc>
		<lastmod>2020-07-14T12:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mcafee-launches-esm-cloud-delivering-rapid-time-to-value-with-incident-investigations-2/</loc>
		<lastmod>2020-07-14T12:31:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-your-cloud-apps-deserve-better-data-protection/</loc>
		<lastmod>2020-07-15T07:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto18974507.jpg</image:loc>
			<image:title><![CDATA[canstockphoto18974507]]></image:title>
			<image:caption><![CDATA[cloud data]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/Shared_Responsibility_Model_V2.59d1eccec334b366627e9295b304202faf7b899b.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/man-gets-prison-time-for-identity-theft-scheme-targeting-veterans/</loc>
		<lastmod>2020-07-14T12:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/survey-finds-majority-of-europeans-will-take-custom-and-loyalty-elsewhere-following-a-security-breach/</loc>
		<lastmod>2020-07-14T13:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/digital-defense-introduces-frontline-threat-landscape/</loc>
		<lastmod>2020-07-14T13:15:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/wells-fargo-employees-advised-to-delete-tiktok-from-company-phones/</loc>
		<lastmod>2020-07-14T13:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/did-my-cloud-migration-really-cost-that-much/</loc>
		<lastmod>2020-07-14T13:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fedramp-driving-innovation-in-government-agencies-by-providing-a-framework-to-secure-cloud-infrastructures/</loc>
		<lastmod>2020-07-14T13:30:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/security-and-visibility-when-users-are-not-in-the-office/</loc>
		<lastmod>2020-07-14T13:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/researchers-reveal-the-countries-most-targeted-by-cyberattacks/</loc>
		<lastmod>2020-07-14T13:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bolstering-corporate-security-post-covid-19-2/</loc>
		<lastmod>2020-07-14T14:19:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/developing-your-risk-management-plan-using-the-nist-csf/</loc>
		<lastmod>2020-07-14T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/critical-security-concerns-for-the-education-industry/</loc>
		<lastmod>2020-07-14T14:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-studying-for-the-exam/</loc>
		<lastmod>2020-07-14T14:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/your-30-60-90-day-appsec-plan/</loc>
		<lastmod>2020-07-14T15:09:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/is-my-data-for-sale-on-the-dark-web/</loc>
		<lastmod>2020-07-14T15:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-does-it-take-to-be-a-rockstar-developer/</loc>
		<lastmod>2020-07-14T15:22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-lightning-talk-owasp-project-showcase-jonathan-marcils-threat-model-cookbook/</loc>
		<lastmod>2020-07-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-new-normal-have-the-fundamentals-of-data-security-and-encryption-changed-for-australian-businesses/</loc>
		<lastmod>2020-07-14T16:04:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/92-of-the-worlds-top-websites-expose-customer-data-to-attackers/</loc>
		<lastmod>2020-07-14T16:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-interaction-between-identity-cloud-and-akamai-edge-services/</loc>
		<lastmod>2020-07-14T16:33:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/e-gift-card-bots-a-deep-dive/</loc>
		<lastmod>2020-07-14T16:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-cursed-chair/</loc>
		<lastmod>2020-07-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-secret-isolation-affects-your-data-security-mechanisms/</loc>
		<lastmod>2020-07-14T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-passwords-secure/</loc>
		<lastmod>2020-07-14T17:41:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/digital-envoy-appoints-jerrod-stoller-as-new-president/</loc>
		<lastmod>2020-07-14T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-julien-sobriers-kubernetes-security-from-the-trenches/</loc>
		<lastmod>2020-07-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/understanding-group-policy-privilege-escalation-in-cve-2020-1317/</loc>
		<lastmod>2020-07-14T18:11:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/infotagion-episode-22-inrupt/</loc>
		<lastmod>2020-07-14T18:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/microsoft-sued-for-linkedin-clipboard-snooping-scare/</loc>
		<lastmod>2020-07-14T19:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/linkedin-greg-bulla-pixabay.jpg</image:loc>
			<image:title><![CDATA[linkedin--greg-bulla--pixabay]]></image:title>
			<image:caption><![CDATA[LinkedIn]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/date-online-safely-and-securely-avast/</loc>
		<lastmod>2020-07-14T19:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/choose-the-right-framework-to-better-navigate-the-convergence-of-data-privacy-cybersecurity/</loc>
		<lastmod>2020-07-14T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/delaware-supreme-court-reverses-7-3m-gift-card-escheatment-judgment/</loc>
		<lastmod>2020-07-14T20:52:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/votiro-partners-with-m-tech-to-expand-access-to-positive-selection-technology-in-asia-pacific-region/</loc>
		<lastmod>2020-07-14T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/generate-x-509-certificates-with-okta/</loc>
		<lastmod>2020-07-14T21:44:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/wormable-flaw-leads-july-microsoft-patches/</loc>
		<lastmod>2020-07-14T21:45:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/helmerich-payne-were-all-two-hops-from-the-internet-rethinking-the-ot-security-approach/</loc>
		<lastmod>2020-07-14T22:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-quality-and-security-synonymous-in-software/</loc>
		<lastmod>2020-07-14T22:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/vert-threat-alert-july-2020-patch-tuesday-analysis/</loc>
		<lastmod>2020-07-14T22:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/get-ccna-ready-in-2020/</loc>
		<lastmod>2020-07-14T23:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/web-professional-security-survey-2020/</loc>
		<lastmod>2020-07-15T01:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/employee-spotlight-jennifer-williams/</loc>
		<lastmod>2020-07-15T02:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/newsbites-drilldown-for-the-week-ending-10-july-2020/</loc>
		<lastmod>2020-07-15T04:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/6-cloud-security-threats-healthcare-companies-may-face-with-solutions/</loc>
		<lastmod>2020-07-15T05:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/loginradius-identity-import-manager-an-automated-feature-for-seamless-data-migration/</loc>
		<lastmod>2020-07-15T06:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/securing-communities-through-disaster-relief-volunteering/</loc>
		<lastmod>2020-07-15T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ppmwp-2-3-inactive-users-check-policies-performance-updates/</loc>
		<lastmod>2020-07-15T08:06:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/debunking-cybersecurity-jargon-part-five-what-are-lexical-expression-qualifiers/</loc>
		<lastmod>2020-07-15T09:54:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ddos-protection-for-networks-combatting-local-preference-from-isps/</loc>
		<lastmod>2020-07-15T10:08:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/marketing-in-a-pandemic/</loc>
		<lastmod>2020-07-15T11:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/3-tough-questions-cisos-must-ask-about-their-application-security-training-program/</loc>
		<lastmod>2020-07-15T11:39:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/managing-digital-risk-in-a-new-age-of-internet-of-things/</loc>
		<lastmod>2020-07-15T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-you-ready-for-impact-live-7-reasons-to-register-today/</loc>
		<lastmod>2020-07-15T12:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/human-sqli/</loc>
		<lastmod>2020-07-15T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/centrify-announces-flint-brenton-as-chief-executive-officer/</loc>
		<lastmod>2020-07-15T13:10:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/logicgate-enhances-third-party-risk-management-and-infosec-offerings-with-three-additional-pre-built-applications/</loc>
		<lastmod>2020-07-15T13:35:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/digital-shadows-launches-validation-for-exposed-credentials-alerting-enabling-organizations-to-find-out-instantly-if-breached-login-details-are-a-current-risk/</loc>
		<lastmod>2020-07-15T13:51:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/your-guide-to-how-pki-works-secures-your-organization/</loc>
		<lastmod>2020-07-15T14:04:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/microsoft-patches-17-year-old-windows-vulnerability-with-cve-10-0-score/</loc>
		<lastmod>2020-07-15T14:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/autonomous-identity-maximize-your-identity-investments-with-ai-driven-identity-analytics/</loc>
		<lastmod>2020-07-15T14:24:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bitglass-security-spotlight-over-15-billion-usernames-and-passwords-are-now-available-on-the-dark-web/</loc>
		<lastmod>2020-07-15T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-covid-19-is-changing-compliance-operations-and-how-cisos-should-respond/</loc>
		<lastmod>2020-07-15T14:53:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/breaking-down-cis-foundational-controls/</loc>
		<lastmod>2020-07-15T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/smbs-face-higher-rate-of-malware-infection-avast/</loc>
		<lastmod>2020-07-15T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/theres-no-silver-bullet-to-deal-with-cyberattacks/</loc>
		<lastmod>2020-07-15T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-is-vendor-privileged-access-management/</loc>
		<lastmod>2020-07-15T15:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/new-research-reveals-covid-19-has-increased-cyber-and-financial-risks-as-security-teams-reduce-staff/</loc>
		<lastmod>2020-07-16T13:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fuzzcon-tv-tackles-federal-fuzz-testing-4/</loc>
		<lastmod>2020-07-15T16:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/scada-security-of-critical-infrastructures-updated-2020/</loc>
		<lastmod>2020-07-15T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/top-8-cybersecurity-books-for-incident-responders-in-2020/</loc>
		<lastmod>2020-07-15T15:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/spamdexing-seo-spam-malware/</loc>
		<lastmod>2020-07-15T15:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/acunetix-now-available-on-macos/</loc>
		<lastmod>2020-07-15T15:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/step-by-step-configuration-with-jira/</loc>
		<lastmod>2020-07-15T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/web-system-hardening-in-5-easy-steps/</loc>
		<lastmod>2020-07-15T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/nginx-security-how-to-harden-your-server-configuration/</loc>
		<lastmod>2020-07-15T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/tracking-a-vulnerability-from-detection-to-resolution/</loc>
		<lastmod>2020-07-15T15:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/acunetix-update-introduces-support-for-graphql-and-oauth-2-0-multiple-ui-updates-and-a-new-comprehensive-report/</loc>
		<lastmod>2020-07-15T15:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/exploiting-ssti-in-thymeleaf/</loc>
		<lastmod>2020-07-15T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/pauls-security-weekly-new-web-technology-impact-on-automated-security-testing/</loc>
		<lastmod>2020-07-15T15:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/what-is-website-security-how-to-protect-your-website-from-hacking/</loc>
		<lastmod>2020-07-15T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-kavya-pearlmans-machine-learning-and-application-security-evolution-of-attack-detection/</loc>
		<lastmod>2020-07-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/grow-up-plotting-your-path-along-the-zero-trust-maturity-model/</loc>
		<lastmod>2020-07-15T16:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-texas-cybersecurity-act-what-you-need-to-know/</loc>
		<lastmod>2020-07-15T16:48:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/who-watches-the-watchers/</loc>
		<lastmod>2020-07-15T16:53:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/common-threats-and-online-protection-avast/</loc>
		<lastmod>2020-07-15T16:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/virtual-desktop-security-requires-more-than-antivirus/</loc>
		<lastmod>2020-07-15T16:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-ins-and-outs-of-fuzz-testing-with-defensics-qa/</loc>
		<lastmod>2020-07-15T16:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-joy-of-tech-stupid-people-on-the-internet/</loc>
		<lastmod>2020-07-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-chris-kubeckas-jc-vegas-lessons-from-the-war-zone-to-the-cyber-trenches-what-leaders-need-to-know/</loc>
		<lastmod>2020-07-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/report-surfaces-web-insecurities/</loc>
		<lastmod>2020-07-16T06:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto20764094.jpg</image:loc>
			<image:title><![CDATA[web insecurities]]></image:title>
			<image:caption><![CDATA[web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-is-secure-coding/</loc>
		<lastmod>2020-07-15T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-cost-cutting-presents-an-opportunity-for-cybersecurity-vars/</loc>
		<lastmod>2020-07-15T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fuzzcon-tv-tackles-federal-fuzz-testing/</loc>
		<lastmod>2020-07-15T18:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-cisos-should-own-application-rationalization/</loc>
		<lastmod>2020-07-16T07:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Software-As-A-Service.jpg</image:loc>
			<image:title><![CDATA[Software-As-A-Service]]></image:title>
			<image:caption><![CDATA[application]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/more-than-a-tenth-of-ransomware-attacks-now-involve-data-theft/</loc>
		<lastmod>2020-07-15T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/soc-employees-continue-to-battle-stress-and-skill-shortages-study-finds/</loc>
		<lastmod>2020-07-15T19:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/grow-up-plotting-your-path-along-the-zero-trust-maturity-model-2/</loc>
		<lastmod>2020-07-15T20:07:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-sans-security-awareness-planning-kit/</loc>
		<lastmod>2020-07-15T20:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ios-full-file-system-extraction-using-checkra1n-and-ios-bfu-triage-script-part-1-the-prep/</loc>
		<lastmod>2020-07-15T20:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/kubernetes-containers-a-boon-for-developers/</loc>
		<lastmod>2020-07-15T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/tufin-adds-network-insights-and-business-context-to-vulnerability-scans-to-prioritize-remediation-and-mitigation-efforts/</loc>
		<lastmod>2020-07-15T23:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/new-tufin-marketplace-extend-your-network-security-benefits-with-innovative-integrations-from-tufin-and-its-partners/</loc>
		<lastmod>2020-07-15T23:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/making-mitre-attampck-actionable/</loc>
		<lastmod>2020-07-16T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/self-servicing-network-access-requests-with-appviewx/</loc>
		<lastmod>2020-07-16T04:37:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/strong-things-have-deep-roots-capitalizing-on-half-a-century-of-positive-action-in-the-cybersecurity-sector/</loc>
		<lastmod>2020-07-16T06:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/analysis-of-net-thanos-ransomware-supporting-safeboot-with-networking-mode/</loc>
		<lastmod>2020-07-16T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-threat-researchers-leverage-the-darknet-to-stay-ahead-of-cyber-threats/</loc>
		<lastmod>2020-07-16T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/key-use-cases-for-the-fortinet-fabric-management-center/</loc>
		<lastmod>2020-07-16T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/3-steps-to-improve-your-appsec-using-threatx-and-splunk-phantom/</loc>
		<lastmod>2020-07-16T07:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-history-behind-the-dfir-summit-characters/</loc>
		<lastmod>2020-07-16T07:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/menlo-security-helps-organizations-build-a-cybersecurity-strategy-based-on-asds-essential-eight-recommendations/</loc>
		<lastmod>2020-07-16T07:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/resource-top-7-books-for-cyber-security/</loc>
		<lastmod>2020-07-16T07:40:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/our-q2-top-cybersecurity-insights/</loc>
		<lastmod>2020-07-16T08:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-are-ai-and-machine-learning-adding-to-threat-intelligence-brains-brawn-or-both/</loc>
		<lastmod>2020-07-16T09:23:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/feds-point-to-escalated-ransomware-attacks-on-financial-institutions-offer-guidance-based-on-success-stories/</loc>
		<lastmod>2020-07-16T10:02:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/these-are-the-highest-penalties-under-gdpr-including-fines-issued-to-private-individuals/</loc>
		<lastmod>2020-07-16T10:25:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/sql-injection-cheat-sheet-for-developers/</loc>
		<lastmod>2020-07-16T10:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-control-3rd-party-apps-in-hybrid-learning/</loc>
		<lastmod>2020-07-16T11:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-twitter-mega-hack-what-you-need-to-know/</loc>
		<lastmod>2020-07-16T11:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-avoid-money-scams-while-holidaying-at-home/</loc>
		<lastmod>2020-07-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/security-for-the-modern-ot-environment/</loc>
		<lastmod>2020-07-16T12:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/masking-malicious-memory-artifacts-part-ii-insights-from-moneta/</loc>
		<lastmod>2020-07-16T12:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/build-vs-buy-securing-customer-identity-with-loginradius/</loc>
		<lastmod>2020-07-16T12:06:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cybercriminals-take-over-famous-twitter-accounts-start-bitcoin-scam/</loc>
		<lastmod>2020-07-16T12:33:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/pci-pal-and-civica-host-payments-security-and-compliance-webinar-for-the-public-sector/</loc>
		<lastmod>2020-07-16T12:50:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/blackrock-malware-goes-after-banking-social-and-other-mobile-apps/</loc>
		<lastmod>2020-07-16T13:01:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/an-introduction-to-integrated-reasoning/</loc>
		<lastmod>2020-07-16T13:22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mdr-creates-new-revenue-opportunities-for-managed-services-providers/</loc>
		<lastmod>2020-07-16T13:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ciphercloud-chronicles-1-two-gentlemen-the-honking-car-2/</loc>
		<lastmod>2020-07-16T13:49:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ciphercloud-chronicles-2-the-story-of-ciso-and-the-breached-multi-clouds/</loc>
		<lastmod>2020-07-16T13:53:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/accertify-launches-digital-identity-solution-to-battle-increasing-account-opening-and-account-takeover-fraud/</loc>
		<lastmod>2020-07-16T14:26:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/connected-cars-smart-homes-remain-targets/</loc>
		<lastmod>2020-07-17T07:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Connected-Vehicles-Hackable.jpg</image:loc>
			<image:title><![CDATA[Connected-Vehicles-Hackable]]></image:title>
			<image:caption><![CDATA[connected cars]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-embracing-energys-digital-future-means-going-all-in-on-cloud/</loc>
		<lastmod>2020-07-16T14:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/evil-corps-wastedlocker-demanding-millions-of-dollars-for-decryption/</loc>
		<lastmod>2020-07-17T06:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Fileless-Malware-RSAC.jpg</image:loc>
			<image:caption><![CDATA[Zerologon]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/wastedlocker.jpg</image:loc>
			<image:caption><![CDATA[wastedlocker ransom demadning message]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/on-the-road-to-devsecops-top-three-benefits-of-cxflow/</loc>
		<lastmod>2020-07-16T15:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-you-should-reconsider-ddos-mitigation-from-public-cloud-providers/</loc>
		<lastmod>2020-07-16T15:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-lightning-talk-lori-barfields-raiseme-introduction/</loc>
		<lastmod>2020-07-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/enhancing-the-value-of-threat-intelligence-via-a-mature-flexible-api/</loc>
		<lastmod>2020-07-16T16:21:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/supply-chain-and-third-party-risks/</loc>
		<lastmod>2020-07-16T16:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/twittersupport-a-lesson-in-incident-response-comms/</loc>
		<lastmod>2020-07-16T16:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/blackrock-android-banking-malware-targeting-337-mobile-apps/</loc>
		<lastmod>2020-07-16T16:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-covid-risk-chart/</loc>
		<lastmod>2020-07-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/week-five-featuring-research-from-forrester-dont-forget-about-orchestration-when-you-automate-security/</loc>
		<lastmod>2020-07-16T17:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/efficient-demotivation-how-black-box-risk-solutions-disempower-cyber-professionals/</loc>
		<lastmod>2020-07-16T17:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-good-and-bad-of-tracing-apps-avast/</loc>
		<lastmod>2020-07-16T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/phishing-scams-increase-in-uk-avast/</loc>
		<lastmod>2020-07-16T17:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/crowdsourcing-security-fixes-with-bug-bounties-avast/</loc>
		<lastmod>2020-07-16T17:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-louis-nyffeneggers-jwt-parkour/</loc>
		<lastmod>2020-07-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cyderes-cnap-makes-siem-modernization-a-snap/</loc>
		<lastmod>2020-07-16T18:25:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mozilla-cuts-ssl-certificate-lifespans-keyfactor/</loc>
		<lastmod>2020-07-16T18:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/todays-court-ruling-on-data-privacy-in-eu/</loc>
		<lastmod>2020-07-16T18:32:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fake-wordpress-plugin-sitespeed-serves-malicious-ads-backdoors/</loc>
		<lastmod>2020-07-16T18:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/confederate-flags-still-fly-in-brazil/</loc>
		<lastmod>2020-07-16T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/devops-industry-veterans-team-up-with-zap-founder-simon-bennetts-to-deliver-appsec-to-developers/</loc>
		<lastmod>2020-07-16T19:44:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/sase-and-qoe-what-you-need-to-know/</loc>
		<lastmod>2020-07-16T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/hvi-blocks-sigred-prevents-zero-day-execution-from-suspicious-memory-regions/</loc>
		<lastmod>2020-07-16T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/me-and-my-girlfriend-1-ctf-walkthrough/</loc>
		<lastmod>2020-07-16T20:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ponyfinal-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-07-16T20:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/account-takeover-attacks-cause-chaos-twitter/</loc>
		<lastmod>2020-07-16T20:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/those-pesky-rus/</loc>
		<lastmod>2020-07-16T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/securing-devices-for-a-challenge-of-a-lifetime-2/</loc>
		<lastmod>2020-07-16T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/whos-behind-wednesdays-epic-twitter-hack/</loc>
		<lastmod>2020-07-16T21:41:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/introducing-gartners-tips-for-selecting-the-right-tools-for-your-security-operations-center/</loc>
		<lastmod>2020-07-16T21:47:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-5-ws-for-diying-your-cybersecurity-decision-making/</loc>
		<lastmod>2020-07-16T22:17:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appsec-becomes-a-priority-for-new-cisos-csos-recommendations-for-the-first-100-days/</loc>
		<lastmod>2020-07-16T23:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/privacy-shield-dies-sccs-survive-with-a-catch-cjeu/</loc>
		<lastmod>2020-07-17T01:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/stopping-millions-of-brute-force-account-takeover-attacks-in-seconds/</loc>
		<lastmod>2020-07-17T03:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/new-in-nexus-repository-3-25-how-do-i-switch-to-nuget-v3/</loc>
		<lastmod>2020-07-17T04:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/tutorial-of-arm-stack-overflow-exploit-defeating-aslr-with-ret2plt/</loc>
		<lastmod>2020-07-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/email-impersonation-on-the-rise-as-workforce-grows-increasingly-distracted-and-dispersed/</loc>
		<lastmod>2020-07-17T07:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/covid-19-research-and-vaccine-research-targeted-by-apt29-group/</loc>
		<lastmod>2020-07-17T12:59:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/twitter-releases-new-details-about-recent-hack-of-high-profile-accounts/</loc>
		<lastmod>2020-07-17T13:23:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/breach-and-attack-simulations-how-to-find-the-gaps-in-your-cyber-defenses/</loc>
		<lastmod>2020-07-17T13:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/media-is-the-most-targeted-industry-in-credential-stuffing-attacks/</loc>
		<lastmod>2020-07-17T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/apple-uber-hacked-in-twitter-attack/</loc>
		<lastmod>2020-07-17T15:37:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cmmc-still-on-track/</loc>
		<lastmod>2020-07-17T15:51:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/new-avast-for-business-website-avast/</loc>
		<lastmod>2020-07-17T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-lightning-talk-lukasz-radoszs-devsecops-enabled-micro-perimeter-api-protection/</loc>
		<lastmod>2020-07-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/api-security-need-to-know-ramifications-of-weak-api-authentication/</loc>
		<lastmod>2020-07-17T16:06:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/twitter-is-dead-to-me-what-really-happened-this-week/</loc>
		<lastmod>2020-07-17T16:34:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/dead-twitter-katja-just-pixabay.jpg</image:loc>
			<image:title><![CDATA[dead-twitter--katja-just--pixabay]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/robert-m-lees-jeff-haas-little-bobby-comics-week-104-from-the-archive/</loc>
		<lastmod>2020-07-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/data-privacy-during-economic-downturn-how-to-make-it-work-with-limited-resources/</loc>
		<lastmod>2020-07-17T17:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/infocyte-helps-mssp-cyberdefenses-perform-end-to-end-election-security-assessments/</loc>
		<lastmod>2020-07-17T17:45:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-michael-wylies-continuous-cloud-security-monitoring-ccsm/</loc>
		<lastmod>2020-07-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bluetooth-reconnection-flaw-could-lead-to-spoofing-attacks/</loc>
		<lastmod>2020-07-20T06:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/IoTsecurity.jpg</image:loc>
			<image:title><![CDATA[IoTsecurity]]></image:title>
			<image:caption><![CDATA[Bluetooth]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/navigating-cybersecurity-metrics-for-web-applications/</loc>
		<lastmod>2020-07-17T18:37:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/greening-the-digital-economy/</loc>
		<lastmod>2020-07-17T18:41:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-run-a-gdpr-gap-analysis/</loc>
		<lastmod>2020-07-20T07:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/compliance.jpg</image:loc>
			<image:title><![CDATA[compliance]]></image:title>
			<image:caption><![CDATA[GDPR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/massive-twitter-hack-hijacks-famous-accounts-avast/</loc>
		<lastmod>2020-07-17T19:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/los-angeles-man-arrested-charged-with-ppp-loan-fraud/</loc>
		<lastmod>2020-07-17T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/almost-like-a-virtual-safe-room/</loc>
		<lastmod>2020-07-17T19:37:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/from-strategy-definition-to-reporting-how-to-get-the-most-out-of-your-pam-program/</loc>
		<lastmod>2020-07-17T21:48:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/forgerock-congratulates-bmw-on-prestigious-kuppingercole-award/</loc>
		<lastmod>2020-07-17T22:09:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/webinars-binary-scanning-software-supply-chain-management/</loc>
		<lastmod>2020-07-17T22:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/twitter-latest-security-breach-reveals-the-value-of-a-proactive-compliance-program/</loc>
		<lastmod>2020-07-17T23:06:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ondrej-vlcek-interviews-wellcome-therapeutics-accelerator-lead-avast/</loc>
		<lastmod>2020-07-18T00:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/twitter-hack-scam/</loc>
		<lastmod>2020-07-18T10:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-omer-levi-hevronis-solving-trust-issues-at-scale/</loc>
		<lastmod>2020-07-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-slide-trombone/</loc>
		<lastmod>2020-07-18T17:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/weekly-news-roundup-july-13-17-2020/</loc>
		<lastmod>2020-07-18T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-twitter-hack-is-a-security-system-failing-not-an-awareness-failing/</loc>
		<lastmod>2020-07-18T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/book-review-stiennon-on-security-collected-essays-volume-1/</loc>
		<lastmod>2020-07-18T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-lightning-talk-pak-foleys-oauth-2-0-misimplementation-vulnerabilities-and-best-practices/</loc>
		<lastmod>2020-07-18T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/object-linking-and-embedding-technology-how-the-highly-exploited-vulnerability-poses-a-major-cybersecurity-threat/</loc>
		<lastmod>2020-07-19T03:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/were-the-wwii-dam-busters-racist/</loc>
		<lastmod>2020-07-19T06:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-allison-schoenfields-izar-tarandachs-scaling-up-is-hard-to-do-the-threat-modeling-cover/</loc>
		<lastmod>2020-07-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/robert-m-lees-jeff-haas-little-bobby-comics-week-286/</loc>
		<lastmod>2020-07-19T17:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appseccali-2020-sam-stepanyans-introducing-the-owasp-nettacker-project/</loc>
		<lastmod>2020-07-19T18:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/congressman-john-robert-lewis-american-patriot/</loc>
		<lastmod>2020-07-19T20:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-ceos-think/</loc>
		<lastmod>2020-07-19T21:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/press-release-anitian-appoints-rakesh-narasimhan-as-ceo-to-build-on-market-leadership-in-automated-cloud-security-and-compliance/</loc>
		<lastmod>2020-07-20T01:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-big-twitter-hack-critical-windows-dns-server-update-email-impersonation-attacks/</loc>
		<lastmod>2020-07-20T04:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-anatomy-of-massive-application-layer-ddos-attacks/</loc>
		<lastmod>2020-07-20T05:50:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-you-ready-to-automate-your-cloud-account-security/</loc>
		<lastmod>2020-07-20T05:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/top-5-cybersecurity-risks-with-cloud-migration/</loc>
		<lastmod>2020-07-20T05:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fortinet-acquires-cloud-security-and-networking-innovator-opaq-networks/</loc>
		<lastmod>2020-07-20T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/long-term-strategies-for-securing-remote-work-in-2020-and-beyond/</loc>
		<lastmod>2020-07-20T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/risk-terminology-understanding-assets-threats-and-vulnerabilities/</loc>
		<lastmod>2020-07-20T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/developers-claim-security-has-a-negative-impact-on-their-productivity/</loc>
		<lastmod>2020-07-20T07:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/devsecops-how-to-get-there-from-devops/</loc>
		<lastmod>2020-07-20T09:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/orange-confirms-ransomware-attack-compromising-data-of-business-solutions-customers/</loc>
		<lastmod>2020-07-20T09:42:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cybersecurity-lessons-from-the-pandemic-metrics-and-decision-making/</loc>
		<lastmod>2020-07-20T10:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/roundtable-whats-next-now-that-we-know-v-i-p-twitter-users-can-so-easily-be-spoofed/</loc>
		<lastmod>2020-07-20T10:08:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ccpa-compliance-can-improve-smbs-cybersecurity/</loc>
		<lastmod>2020-07-21T06:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto19097276-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto19097276]]></image:title>
			<image:caption><![CDATA[CCPA]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/employees-embrace-work-from-home-but-worry-about-data-security-study-shows/</loc>
		<lastmod>2020-07-20T11:53:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/report-says-data-in-the-cloud-is-creating-fear-and-trust-issues-for-security-professionals/</loc>
		<lastmod>2020-07-20T11:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/help-theres-an-openbullet-attack-config-for-our-site-what-should-we-do/</loc>
		<lastmod>2020-07-20T12:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cloud-services-abused-by-clever-phishing-campaign/</loc>
		<lastmod>2020-07-20T12:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/managedmethods-recognized-by-crn-on-the-2020-emerging-vendors-list/</loc>
		<lastmod>2020-07-20T12:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/corelight-splunk-app-update-new-dashboard-and-data/</loc>
		<lastmod>2020-07-20T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/atms-across-europe-are-hacked-using-purpose-built-black-boxes/</loc>
		<lastmod>2020-07-20T13:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/globalscape-and-helpsystems-sign-merger-agreement/</loc>
		<lastmod>2020-07-20T13:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/waving-the-white-flag-why-infosec-should-stop-caring-about-httponly/</loc>
		<lastmod>2020-07-20T14:08:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-value-of-cybersecurity-ratings-for-cfos/</loc>
		<lastmod>2020-07-21T07:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto5755420.jpg</image:loc>
			<image:title><![CDATA[canstockphoto5755420]]></image:title>
			<image:caption><![CDATA[threat intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/understanding-the-cmmc-model/</loc>
		<lastmod>2020-07-20T14:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/aws-essentials-solution-architect-associate-certification-the-ultimate-guide/</loc>
		<lastmod>2020-07-20T14:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/key-elements-of-an-information-security-policy/</loc>
		<lastmod>2020-07-20T14:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/introducing-ciphercloud-data-security-as-a-service-dsaas/</loc>
		<lastmod>2020-07-20T14:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/on-the-twitter-hack/</loc>
		<lastmod>2020-07-20T15:04:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/windows-logon-audit-far-beyond-native-windows-security/</loc>
		<lastmod>2020-07-20T15:05:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/solving-preventable-data-breaches-with-the-right-vendor-management-tool/</loc>
		<lastmod>2020-07-20T15:23:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/3-cybersecurity-risk-areas-to-focus-on-in-2020/</loc>
		<lastmod>2020-07-20T15:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-riana-pfefferkorns-daniel-j-weitzners-matt-blazes-panel-discussion-encrypted-messaging/</loc>
		<lastmod>2020-07-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-joy-of-tech-comet-neowise/</loc>
		<lastmod>2020-07-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-overcome-4-software-security-training-challenges/</loc>
		<lastmod>2020-07-20T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-configure-windows-10-firewall/</loc>
		<lastmod>2020-07-20T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/windows-10-security-features/</loc>
		<lastmod>2020-07-20T17:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/vulnerable-plugins-june-2020-update/</loc>
		<lastmod>2020-07-20T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-filippo-valsordas-securing-the-software-supply-chain/</loc>
		<lastmod>2020-07-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cybersecurity-measures-and-internal-controls-needed-to-adapt-for-remote-work-environments/</loc>
		<lastmod>2020-07-20T18:26:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-commercial-o365-is-not-dfars-compliant/</loc>
		<lastmod>2020-07-20T18:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/patching-sigred-windows-cve-2020-1350/</loc>
		<lastmod>2020-07-20T18:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-growth-of-telemedicine-rising-risks-and-challenges-to-address-today/</loc>
		<lastmod>2020-07-20T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/talatek-and-cerberus-enter-into-merger-agreement/</loc>
		<lastmod>2020-07-21T12:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/aqua-security-unveils-new-platform-to-secure-the-build-infrastructure-and-workloads-of-cloud-native-applications/</loc>
		<lastmod>2020-07-21T13:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/frontline-ats-and-microsoft-defender-atp-integration/</loc>
		<lastmod>2020-07-20T23:49:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/managed-service-providers-still-not-appreciating-the-risk-of-ransomware/</loc>
		<lastmod>2020-07-21T02:28:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/protecting-iot-with-a-secure-root-fo-trust-keyfactor/</loc>
		<lastmod>2020-07-21T03:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/trading-cookies-for-u-s-federal-data-privacy-regulations/</loc>
		<lastmod>2020-07-21T03:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/understanding-the-benefits-of-the-capability-maturity-model-integration-cmmi/</loc>
		<lastmod>2020-07-21T03:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/biggest-twitter-breach-accounts-of-us-high-profiles-hacked-in-bitcoin-scam/</loc>
		<lastmod>2020-07-21T05:06:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/securing-the-shift-to-5g/</loc>
		<lastmod>2020-07-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/credible-strategies-your-business-can-use-to-avoid-a-data-breach/</loc>
		<lastmod>2020-07-21T08:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-the-future-of-cybersecurity-needs-both-humans-and-ai-working-together/</loc>
		<lastmod>2020-07-21T08:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-big-twitter-hack-vs-privacy-avast/</loc>
		<lastmod>2020-07-21T09:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/qa-sophos-poll-shows-how-attackers-are-taking-advantage-of-cloud-migration-to-wreak-havoc/</loc>
		<lastmod>2020-07-21T09:39:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/out-of-the-grace-period-trust-and-communication-rises-in-a-post-ccpa-world/</loc>
		<lastmod>2020-07-21T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/maryland-based-nursing-home-announces-ransomware-attack-affecting-nearly-50000-residents/</loc>
		<lastmod>2020-07-21T10:09:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/pentesting-user-interfaces-how-to-phish-any-chrome-outlook-or-thunderbird-user/</loc>
		<lastmod>2020-07-21T10:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/imperva-shields-against-windows-dns-server-rce-vulnerability-cve-2020-1350/</loc>
		<lastmod>2020-07-21T11:24:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cisos-and-the-covid-19-challenge-making-wfh-frictionless-and-secure/</loc>
		<lastmod>2020-07-21T11:48:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cisos-and-the-covid-19-challenge-making-wfh-frictionless-and-secure-2/</loc>
		<lastmod>2020-07-21T11:48:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/attackers-demand-7-5-million-in-monero-after-hacking-argentine-telco/</loc>
		<lastmod>2020-07-21T11:54:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/92-of-businesses-give-criminals-access-to-customer-data-through-vulnerable-javascript-integrations/</loc>
		<lastmod>2020-07-21T11:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/is-your-short-term-remote-workforce-technology-in-for-the-long-haul/</loc>
		<lastmod>2020-07-21T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-it-needs-to-know-about-ot-iot-security-threats-in-2020/</loc>
		<lastmod>2020-07-21T12:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-it-needs-to-know-about-ot-iot-security-threats-in-2020-2/</loc>
		<lastmod>2020-07-21T12:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/assisted-living-services-provider-discloses-data-security-incident/</loc>
		<lastmod>2020-07-21T12:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-gcc-high-is-the-wrong-choice-for-small-to-medium-sized-businesses/</loc>
		<lastmod>2020-07-21T12:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bringing-cutting-edge-security-automation-to-the-enterprise-respond-softwares-new-partnership-with-securenation/</loc>
		<lastmod>2020-07-21T13:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/forallsecure-launches-the-hacker-mind-podcast-3/</loc>
		<lastmod>2020-07-21T14:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cybersecurity-researchers-discover-5-e-learning-websites-leaking-nearly-1-million-user-records/</loc>
		<lastmod>2020-07-21T13:21:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/designing-ddos-mitigation-solutions-for-simplicity-speed/</loc>
		<lastmod>2020-07-21T13:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/message-from-digital-envoy-president-jerrod-stoller/</loc>
		<lastmod>2020-07-21T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/us-national-security-agency-issues-recommendations-for-securing-ipsec-vpns/</loc>
		<lastmod>2020-07-21T14:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/security-guidelines-for-contact-tracing-apps/</loc>
		<lastmod>2020-07-22T06:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/contact-tracing.jpg</image:loc>
			<image:title><![CDATA[contact tracing]]></image:title>
			<image:caption><![CDATA[contact tracing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/data-requirements-for-lgpd/</loc>
		<lastmod>2020-07-21T15:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/big-data-and-the-importance-of-data-integrity/</loc>
		<lastmod>2020-07-22T07:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/big.jpg</image:loc>
			<image:title><![CDATA[big]]></image:title>
			<image:caption><![CDATA[big data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/understanding-the-eu-data-privacy-decision/</loc>
		<lastmod>2020-07-23T06:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/GDPR-Automation.jpg</image:loc>
			<image:title><![CDATA[GDPR-Automation]]></image:title>
			<image:caption><![CDATA[data privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/1873-slaughterhouse-case-explains-us-covid19-anti-mask-cultism/</loc>
		<lastmod>2020-07-21T15:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-sarah-harveys-third-party-integrations-friend-or-foe/</loc>
		<lastmod>2020-07-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/making-infosec-jobs-easier-improving-security-posture/</loc>
		<lastmod>2020-07-21T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-photo-deposit/</loc>
		<lastmod>2020-07-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cbp-scandal-buying-license-plate-scans/</loc>
		<lastmod>2020-07-21T17:22:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/license-plates-threemilesperhour-pixabay.jpg</image:loc>
			<image:title><![CDATA[license-plates--threemilesperhour--pixabay]]></image:title>
			<image:caption><![CDATA[license plate]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/open-access-to-the-internet-with-protection/</loc>
		<lastmod>2020-07-21T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-felix-fischers-stack-overflow-a-story-of-two-security-tales/</loc>
		<lastmod>2020-07-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/is-security-awareness-becoming-the-latest-cybersecurity-snake-oil/</loc>
		<lastmod>2020-07-21T18:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/malicious-magento-user-creator/</loc>
		<lastmod>2020-07-21T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/preventing-security-misconfigurations-change-management-and-compliance/</loc>
		<lastmod>2020-07-21T18:35:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-configure-internet-options-for-local-group-policy/</loc>
		<lastmod>2020-07-21T18:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/credential-management-vulnerabilities/</loc>
		<lastmod>2020-07-21T18:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/command-injection-vulnerabilities/</loc>
		<lastmod>2020-07-21T18:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/format-string-vulnerabilities/</loc>
		<lastmod>2020-07-21T18:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/analysis-of-ransomware-used-in-recent-cyberattacks-on-health-care-institutions/</loc>
		<lastmod>2020-07-21T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cmmc-relationship-mapping-to-other-frameworks/</loc>
		<lastmod>2020-07-21T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/coinbase-stopped-scammers-from-stealing-an-extra-280000-during-twitter-hack/</loc>
		<lastmod>2020-07-21T18:59:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/building-well-architected-serverless-applications-with-thundra-part-3/</loc>
		<lastmod>2020-07-21T19:10:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/building-well-architected-serverless-applications-with-thundra-part-2/</loc>
		<lastmod>2020-07-21T19:10:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/building-well-architected-serverless-applications-with-thundra-part-1/</loc>
		<lastmod>2020-07-21T19:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/troubleshooting-a-problem-with-thundra-at-3-am/</loc>
		<lastmod>2020-07-21T19:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-do-companies-invent-their-own-serverless-functions/</loc>
		<lastmod>2020-07-21T19:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/dry-dont-repeat-yourself-on-the-cloud-with-pulumi/</loc>
		<lastmod>2020-07-21T19:10:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/expanding-the-serverless-war-chest-with-aws-efs/</loc>
		<lastmod>2020-07-21T19:10:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/can-lambda-and-rds-play-nicely-together/</loc>
		<lastmod>2020-07-21T19:10:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/integrating-thundra-with-slack/</loc>
		<lastmod>2020-07-21T19:10:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/coordinate-complex-workflows-with-step-functions/</loc>
		<lastmod>2020-07-21T19:10:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/pandemics-create-new-attack-opportunities-in-travel-and-hospitality/</loc>
		<lastmod>2020-07-21T19:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-necessity-of-zero-trust-in-data-discovery-for-privacy/</loc>
		<lastmod>2020-07-21T19:45:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/do-financial-crime-investigators-have-a-bulls-eye-on-their-back/</loc>
		<lastmod>2020-07-21T21:18:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/qa-perimeterx-human-challenge/</loc>
		<lastmod>2020-07-21T21:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/infographic-the-six-steps-of-the-nist-risk-management-framework-rmf/</loc>
		<lastmod>2020-07-21T22:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/newsbites-drilldown-for-the-week-ending-17-july-2020/</loc>
		<lastmod>2020-07-21T23:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/tcg-tackles-trustworthiness-for-the-internet-of-things/</loc>
		<lastmod>2020-07-22T00:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-cyber-risks-of-remote-workers-returning-to-the-office/</loc>
		<lastmod>2020-07-22T05:28:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/strategies-for-protecting-and-enabling-the-remote-workforce/</loc>
		<lastmod>2020-07-22T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fortinets-soc-lifecycle-helps-partners-become-visionary-mssps/</loc>
		<lastmod>2020-07-22T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/pci-pal-announced-as-finalist-in-insurance-times-tech-innovation-awards/</loc>
		<lastmod>2020-07-22T07:27:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/wp-2fa-1-4-support-for-authy-freeotp-and-other-2fa-apps/</loc>
		<lastmod>2020-07-22T07:48:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/data-governance-best-practices-for-enterprises/</loc>
		<lastmod>2020-07-22T08:23:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ai-brings-a-new-pace-in-cyber-security/</loc>
		<lastmod>2020-07-22T08:35:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/trust-is-key-in-healthcare-you-cant-afford-a-breach/</loc>
		<lastmod>2020-07-22T08:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/protecting-yourself-on-post-pandemic-vacation-avast/</loc>
		<lastmod>2020-07-22T09:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-choose-linux-kernel-live-patching-software/</loc>
		<lastmod>2020-07-23T07:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/patched-pipe.jpg</image:loc>
			<image:title><![CDATA[patched pipe]]></image:title>
			<image:caption><![CDATA[Linux]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/all-you-need-to-know-about-the-f5-cve-2020-5902-big-ip-tmui-rce-vulnerability-consequences-and-the-fix/</loc>
		<lastmod>2020-07-22T11:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/three-ways-managing-risk-helps-during-economic-downturns/</loc>
		<lastmod>2020-07-22T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/security-architecture-podcast-and-the-bitglass-sase/</loc>
		<lastmod>2020-07-22T12:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/secure-code-warrior-expands-its-secure-coding-platform-to-empower-developers-to-release-quality-code-faster/</loc>
		<lastmod>2020-07-22T13:02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/trusting-passwords-best-practices-for-threat-proofing-credentials/</loc>
		<lastmod>2020-07-22T13:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/hybrid-warfare-how-cancel-culture-can-fuel-a-war/</loc>
		<lastmod>2020-07-22T13:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/two-chinese-hackers-face-40-years-in-prison-for-hacking-spree-on-global-organizations-including-covid-19-researchers/</loc>
		<lastmod>2020-07-22T14:11:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/5-tips-for-financial-institutions-to-achieve-a-more-secure-digital-transformation/</loc>
		<lastmod>2020-07-22T14:20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/new-cisco-report-smb-security-posture-catches-up-to-enterprise-counterparts/</loc>
		<lastmod>2020-07-22T14:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/digital-shadows-announces-integration-with-atlassian-jira/</loc>
		<lastmod>2020-07-22T14:56:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/securing-the-human-layer-the-first-sane-step-towards-achieving-a-strong-cybersecurity-posture/</loc>
		<lastmod>2020-07-22T14:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/3-emerging-innovations-in-technology-that-will-impact-cyber-security/</loc>
		<lastmod>2020-07-22T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/new-core-value-united-with-respect-keyfactor/</loc>
		<lastmod>2020-07-22T15:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/multi-platform-malware-framework-mata-claimed-victims-worldwide/</loc>
		<lastmod>2020-07-22T15:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/version-7-of-the-remnux-distro-now-available/</loc>
		<lastmod>2020-07-22T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-francis-guibernaus-catch-me-if-you-can-detecting-sandbox-evasion-techniques/</loc>
		<lastmod>2020-07-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/managing-your-vishing-defenses-at-home/</loc>
		<lastmod>2020-07-22T16:18:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-joy-of-tech-covid-supplies/</loc>
		<lastmod>2020-07-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/a-guide-to-server-certificates/</loc>
		<lastmod>2020-07-22T17:17:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/appomni-strengthens-ping-identitys-visibility-and-control-over-its-salesforce-instance/</loc>
		<lastmod>2020-07-22T17:24:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cpted-in-cybersecurity-avast/</loc>
		<lastmod>2020-07-22T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-you-making-software-security-a-requirement/</loc>
		<lastmod>2020-07-22T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-brandon-bakers-beyondprod-the-origin-of-cloud-native-security-at-google/</loc>
		<lastmod>2020-07-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/forbes-defying-covid-19-vc-funding-of-israeli-startups-accelerates/</loc>
		<lastmod>2020-07-22T19:25:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/skimmers-in-images-github-repos/</loc>
		<lastmod>2020-07-22T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/avast-relocates-hong-kong-based-vpn-servers-avast/</loc>
		<lastmod>2020-07-22T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/twitter-hacking-for-profit-and-the-lols/</loc>
		<lastmod>2020-07-22T20:25:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/4-essentials-for-work-from-home/</loc>
		<lastmod>2020-07-22T21:09:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/expanding-codesonar-sast-capabilities-with-java-and-c/</loc>
		<lastmod>2020-07-22T22:01:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/selecting-the-best-soar-solution-series-whats-in-a-name-part-1/</loc>
		<lastmod>2020-07-22T22:18:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-most-ignored-data-security-practice-a-lesson-from-twitters-data-breach-nightmare/</loc>
		<lastmod>2020-07-22T22:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/report-organizations-lack-visibility-into-their-top-risks/</loc>
		<lastmod>2020-07-22T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/devops-productivity-series%e2%80%8a-%e2%80%8agithub-for-devsecops/</loc>
		<lastmod>2020-07-23T03:10:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/self-contained-ready-and-secured-enhancing-red-hat-openshift-with-hardware-cryptography/</loc>
		<lastmod>2020-07-23T05:32:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ensuring-mission-continuity-through-federal-government-cybersecurity/</loc>
		<lastmod>2020-07-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/enhancing-vulnerability-detection-as-part-of-devsecops/</loc>
		<lastmod>2020-07-23T07:37:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/data-breach-university-of-york-staff-and-student-records-stolen-in-third-party-cloud-service-provider-ransomware-attack/</loc>
		<lastmod>2020-07-23T08:51:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/using-python-to-make-api-calls-to-your-acunetix-installation/</loc>
		<lastmod>2020-07-23T08:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/largest-ever-recorded-packet-per-second-based-ddos-attack-mitigated-by-akamai/</loc>
		<lastmod>2020-07-23T08:59:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/device-integrity-and-the-zero-trust-framework/</loc>
		<lastmod>2020-07-23T09:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-makes-serverless-hard-and-how-can-thundra-help/</loc>
		<lastmod>2020-07-23T10:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cybersecai-connected-qa-with-garry-kasparov-avast/</loc>
		<lastmod>2020-07-23T10:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-businesses-unprepared-to-fight-bot-attacks/</loc>
		<lastmod>2020-07-24T06:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Bad-Bots.jpg</image:loc>
			<image:title><![CDATA[Bad-Bots]]></image:title>
			<image:caption><![CDATA[bots]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/looking-to-reopen-your-business-prepare-now/</loc>
		<lastmod>2020-07-24T07:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Zero-Trust-App.jpg</image:loc>
			<image:title><![CDATA[Zero-Trust-App]]></image:title>
			<image:caption><![CDATA[prepare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/11-vs-byod-in-hybrid-learning-security/</loc>
		<lastmod>2020-07-23T11:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/adversarial-machine-learning-and-the-cfaa/</loc>
		<lastmod>2020-07-23T11:03:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/more-than-half-of-european-citizens-worry-about-malicious-use-of-their-online-data/</loc>
		<lastmod>2020-07-23T11:17:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-next-normal-brings-opportunities-and-challenges-for-the-ciso/</loc>
		<lastmod>2020-07-23T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/a-look-back-at-the-impact-live-2020-our-largest-impact-yet/</loc>
		<lastmod>2020-07-23T12:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/raft-of-healthcare-breaches-continue/</loc>
		<lastmod>2020-07-23T12:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/simple-malware-obfuscation-techniques/</loc>
		<lastmod>2020-07-23T12:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/beyond-identity-joins-ping-identitys-technology-alliance-program-to-enable-passwordless-single-sign-on/</loc>
		<lastmod>2020-07-23T13:26:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cracking-passwords-and-taking-over-user-accounts/</loc>
		<lastmod>2020-07-23T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-best-gets-better-with-the-new-bitdefender/</loc>
		<lastmod>2020-07-23T14:01:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/chinese-covid-19-hackers-indicted-after-11-year-hacking-spree/</loc>
		<lastmod>2020-07-23T14:06:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fortressiq-launches-worlds-first-learning-and-adaptive-computer-vision-based-firewall/</loc>
		<lastmod>2020-07-23T14:44:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/centrify-unveils-client-based-password-reconciliation-to-strengthen-admin-password-availability-and-integrity/</loc>
		<lastmod>2020-07-23T14:47:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/crl-explained-what-is-a-certificate-revocation-list/</loc>
		<lastmod>2020-07-23T14:59:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/amid-spike-in-hospital-attacks-more-must-be-done-to-safeguard-medical-devices/</loc>
		<lastmod>2020-07-23T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/politician-amongst-those-who-had-their-direct-messages-accessed-during-twitter-hack/</loc>
		<lastmod>2020-07-23T15:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/counting-the-cost-of-endpoint-security-breaches/</loc>
		<lastmod>2020-07-23T15:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/e16-7m-direct-marketing-fine-issued-by-italian-authority/</loc>
		<lastmod>2020-07-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-kenn-whites-bringing-usable-crypto-to-7-million-developers/</loc>
		<lastmod>2020-07-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ny-charges-first-american-financial-for-massive-data-leak/</loc>
		<lastmod>2020-07-23T16:12:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/permanent-improvisation-nazi-dictatorship-was-opposite-to-law-and-order/</loc>
		<lastmod>2020-07-23T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-campfire-habitable-zone/</loc>
		<lastmod>2020-07-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/when-legacy-application-security-becomes-your-mr-hyde/</loc>
		<lastmod>2020-07-23T17:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/feature-release-20-3/</loc>
		<lastmod>2020-07-23T17:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/aryaka-announces-global-managed-security-partnership-with-check-point-software-technologies/</loc>
		<lastmod>2020-07-23T17:53:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-there-any-new-cybersecurity-threats-that-come-with-5g-technology/</loc>
		<lastmod>2020-07-23T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ramsay-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-07-23T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/securing-next-gen-pki-keyfactor/</loc>
		<lastmod>2020-07-23T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-yomna-nassers-pre-authentication-messages-as-a-common-root-cause-of-cell-network-attacks/</loc>
		<lastmod>2020-07-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/detecting-ransomware-and-other-threats-from-malicious-bootloaders/</loc>
		<lastmod>2020-07-23T18:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-does-public-key-encryption-work/</loc>
		<lastmod>2020-07-23T18:57:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mongodbreached/</loc>
		<lastmod>2020-07-23T19:34:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/this-way-to-waap/</loc>
		<lastmod>2020-07-23T19:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/it-takes-48-hours-to-catch-a-phishing-threat/</loc>
		<lastmod>2020-07-23T20:03:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mandiant-security-validation-offers-automated-evaluation-of-security-controls-against-mitre-attck-framework-by-lynn-harrington/</loc>
		<lastmod>2020-07-23T20:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-you-striking-out-with-your-dsar-duties/</loc>
		<lastmod>2020-07-23T21:09:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-security-teams-can-learn-from-the-attacks-on-twitter-and-covid-19-researchers/</loc>
		<lastmod>2020-07-23T21:24:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/making-infosec-jobs-easier-assessing-and-reporting-breach-risk/</loc>
		<lastmod>2020-07-23T21:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/combat-phishing-attacks-using-modern-machine-learning-algorithms/</loc>
		<lastmod>2020-07-23T22:18:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-a-platform-with-a-generative-baseline-matters/</loc>
		<lastmod>2020-07-23T22:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/forallsecure-launches-the-hacker-mind-podcast/</loc>
		<lastmod>2020-07-23T22:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/july-device-threat-report/</loc>
		<lastmod>2020-07-23T23:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/advice-from-the-pros-turning-your-free-computing-device-into-a-goldmine-of-hands-on-experience/</loc>
		<lastmod>2020-07-24T06:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/education-organization-delivers-high-performance-security-with-fortigate-ngfws/</loc>
		<lastmod>2020-07-24T07:00:00+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->