<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2018/05/new-remcos-rat-variant-is-spreading-by-exploiting-cve-2017-11882/</loc>
		<lastmod>2018-05-04T21:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-john-chipura/</loc>
		<lastmod>2018-05-05T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ics-scada-the-protectors/</loc>
		<lastmod>2018-05-05T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-sean-metcalfs-failtime-failing-towards-success/</loc>
		<lastmod>2018-05-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-imho/</loc>
		<lastmod>2018-05-05T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/do-not-meme-to-shame-twitters-password-leak-incident/</loc>
		<lastmod>2018-05-06T07:48:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-yoda-jedi-master/</loc>
		<lastmod>2018-05-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ask-these-questions-when-evaluating-siem-solutions/</loc>
		<lastmod>2018-05-06T13:46:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/quantum-systems-the-embiggenment/</loc>
		<lastmod>2018-05-06T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/vietnamese-ransomware-wants-you-to-add-credit-to-a-mobile-phone/</loc>
		<lastmod>2018-05-06T17:54:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-sarah-edwards-getting-saucy-with-apfs-the-state-of-apples-new-file-system/</loc>
		<lastmod>2018-05-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/robert-m-lee-jeff-hasss-little-bobby-here-we-go-again/</loc>
		<lastmod>2018-05-06T21:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/a-devops-model-what-it-is-and-why-its-beneficial/</loc>
		<lastmod>2018-05-07T03:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-shared-security-weekly-blaze-dna-privacy-this-weeks-social-media-privacy-news-roundup-remote-car-hacking/</loc>
		<lastmod>2018-05-07T04:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-much-gdpr-risk-is-hiding-in-your-data/</loc>
		<lastmod>2018-05-07T07:52:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/virginia-scanning-program-vita-uses-acunetix-to-slash-vulnerabilities-in-web-apps/</loc>
		<lastmod>2018-05-07T08:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/two-romanians-extradited-to-atlanta-to-face-cyber-fraud-charges/</loc>
		<lastmod>2018-05-07T09:52:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/this-is-spartacus-new-ransomware-on-the-block/</loc>
		<lastmod>2018-05-07T11:21:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/two-romanians-extradited-to-the-united-states-for-18m-phishing-scheme/</loc>
		<lastmod>2018-05-07T11:40:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-esther-dyson/</loc>
		<lastmod>2018-05-07T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-journey-to-an-intelligent-soc/</loc>
		<lastmod>2018-05-07T12:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/redos-in-go/</loc>
		<lastmod>2018-05-07T13:16:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-art-of-fileless-malware/</loc>
		<lastmod>2018-05-07T13:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/threat-hunting-chthonic-banking-trojan/</loc>
		<lastmod>2018-05-07T13:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/dod-the-banning/</loc>
		<lastmod>2018-05-07T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/portrait-of-a-21st-century-active-directory-attacker/</loc>
		<lastmod>2018-05-07T14:25:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hide-and-seek-iot-botnet-resurfaces-with-new-tricks-persistence/</loc>
		<lastmod>2018-05-07T15:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/addressing-growing-application-and-bandwidth-risks-in-education-networks/</loc>
		<lastmod>2018-05-07T16:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/study-attack-on-krebsonsecurity-cost-iot-device-owners-323k/</loc>
		<lastmod>2018-05-07T16:47:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/will-pci-dss-compliance-give-you-a-head-start-meeting-gdpr-requirements/</loc>
		<lastmod>2018-05-07T17:15:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-devon-bordonaros-basic-offensive-application-of-mof-files-in-wmi-scripting/</loc>
		<lastmod>2018-05-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/week-in-security-april-30-may-6/</loc>
		<lastmod>2018-05-07T18:16:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/all-these-vulnerabilities-rarely-matter/</loc>
		<lastmod>2018-05-07T18:45:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/once-again-avast-scores-100-in-antivirus-endpoint-protection-by-av-test-avast-business/</loc>
		<lastmod>2018-05-07T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-hipaa-impacts-social-media-usage/</loc>
		<lastmod>2018-05-07T20:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/countdown-to-gdpr-8-what-is-the-gdpr-impact-on-saas-providers/</loc>
		<lastmod>2018-05-07T20:31:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-joy-of-tech-happy-20th-imac/</loc>
		<lastmod>2018-05-07T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mobile-menace-monday-re-emergence-of-a-fake-android-av/</loc>
		<lastmod>2018-05-07T21:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/8-tips-to-harden-your-joomla-installation/</loc>
		<lastmod>2018-05-08T03:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/women-in-information-security-valerie-thomas/</loc>
		<lastmod>2018-05-08T03:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/law-firm-data-is-catnip-for-hackers/</loc>
		<lastmod>2018-05-08T07:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tripwire-survey-most-rsac-attendees-favor-shorter-vulnerability-disclosure-timelines/</loc>
		<lastmod>2018-05-08T07:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/enterprises-slack-at-security-patching-at-their-own-peril/</loc>
		<lastmod>2018-05-08T09:16:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/elevated-kidnap-risk-to-foreign-nationals-in-afghanistan-ahead-of-2018-elections/</loc>
		<lastmod>2018-05-08T09:37:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fbi-has-received-over-four-million-internet-crime-complaints-since-2000/</loc>
		<lastmod>2018-05-08T11:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-abraham-lincoln/</loc>
		<lastmod>2018-05-08T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/its-eleven-oclock-do-you-know-if-your-organizational-data-is-safe/</loc>
		<lastmod>2018-05-08T12:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/sap-cyber-threat-intelligence-report-may-2018/</loc>
		<lastmod>2018-05-08T12:27:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/london-msp-provides-better-smb-security-with-managed-workplace-avast-business/</loc>
		<lastmod>2018-05-08T13:52:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/shoppers-stop-tech-scam-draws-from-thousands-of-forced-ad-injections/</loc>
		<lastmod>2018-05-08T13:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/miscreant-gang-runs-drone-intercept-targeting-fbi-agents/</loc>
		<lastmod>2018-05-08T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-us-is-unprepared-for-election-related-hacking-in-2018/</loc>
		<lastmod>2018-05-08T14:07:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/wrangling-data-table-out-of-the-fbi-2017-ic3-crime-report/</loc>
		<lastmod>2018-05-08T14:10:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/wannacry-notpetya-and-the-rest-how-ransomware-evolved-in-2017/</loc>
		<lastmod>2018-05-08T14:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/a-smarter-approach-to-artificial-intelligence-and-machine-learning-in-mobile-security/</loc>
		<lastmod>2018-05-08T14:18:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-devcentral-chronicles-volume-1-issue-5/</loc>
		<lastmod>2018-05-08T14:57:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-7-craziest-iot-device-hacks/</loc>
		<lastmod>2018-05-08T15:16:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/spring-cleaning-its-time-to-clear-out-all-those-old-machine-identities/</loc>
		<lastmod>2018-05-08T15:33:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/addressing-the-cybersecurity-skills-shortage-with-automation/</loc>
		<lastmod>2018-05-08T16:16:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/flipping-the-script-on-cyber-threats-from-being-the-hunted-to-the-hunter/</loc>
		<lastmod>2018-05-08T16:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/top-five-securityiq-phishing-templates-april-edition/</loc>
		<lastmod>2018-05-08T16:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/frida/</loc>
		<lastmod>2018-05-08T16:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/kuik-a-simple-yet-annoying-piece-of-adware/</loc>
		<lastmod>2018-05-08T16:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/save-joern-open-source-at-shiftleft/</loc>
		<lastmod>2018-05-08T16:42:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/profile-of-an-ideal-security-hire-in-2018/</loc>
		<lastmod>2018-05-08T17:18:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-phil-roths-an-open-source-malware-classifier-and-dataset/</loc>
		<lastmod>2018-05-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/may-2018-patch-tuesday-medium-weight-however-one-active-exploit-needs-attention/</loc>
		<lastmod>2018-05-08T19:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-aikers-guide-to-the-cybersecurity-galaxy/</loc>
		<lastmod>2018-05-08T19:22:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/vert-threat-alert-may-2018-patch-tuesday-analysis/</loc>
		<lastmod>2018-05-08T20:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/machine-learning-are-you-smarter-than-a-toaster/</loc>
		<lastmod>2018-05-08T20:23:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/microsoft-patch-tuesday-may-2018-edition/</loc>
		<lastmod>2018-05-08T20:38:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-driving-cars/</loc>
		<lastmod>2018-05-08T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/pscrypt-ransomware-back-in-business/</loc>
		<lastmod>2018-05-08T21:16:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/social-engineer-newsletter-vol-08-issue-104/</loc>
		<lastmod>2018-05-08T21:17:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/sap-security-notes-may-18-hidden-in-plain-sight/</loc>
		<lastmod>2018-05-08T21:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-is-the-dod-cssp-cyber-security-service-provider/</loc>
		<lastmod>2018-05-08T22:40:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/georgia-governor-vetoes-cybersecurity-bill-s-b-315/</loc>
		<lastmod>2018-05-09T00:04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/massive-localstorage-tk-drupal-infection/</loc>
		<lastmod>2018-05-09T01:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-organizations-need-to-secure-their-containers/</loc>
		<lastmod>2018-05-09T03:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ransomware-attacks-emerge-as-key-cyber-security-threat-verizon-report-says/</loc>
		<lastmod>2018-05-09T08:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/drupe-app-removed-from-google-play-store-after-photos-and-messages-leaked-publicly/</loc>
		<lastmod>2018-05-09T11:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-ken-thompson/</loc>
		<lastmod>2018-05-09T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/nutanix-and-thales-hyerconverged-hypersecure/</loc>
		<lastmod>2018-05-09T12:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/danish-capital-area-bikes-system-goes-down-due-to-hacking-attack/</loc>
		<lastmod>2018-05-09T12:04:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/think-youve-got-your-credit-freezes-covered-think-again/</loc>
		<lastmod>2018-05-09T13:36:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-end-of-humanity-ai-style-or-how-i-learned-to-admire-rand/</loc>
		<lastmod>2018-05-09T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/lets-make-a-good-thing-better-the-2018-trailblazer-community-survey/</loc>
		<lastmod>2018-05-09T14:15:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-is-the-23-nycrr-500-regulation/</loc>
		<lastmod>2018-05-09T14:35:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/6-must-have-metrics-in-your-sla/</loc>
		<lastmod>2018-05-09T14:52:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/rise-of-the-serverless-machines/</loc>
		<lastmod>2018-05-09T14:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/make-application-access-it-friendly/</loc>
		<lastmod>2018-05-09T15:05:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/john-summers-qa-evanta-global-cio-executive-summit/</loc>
		<lastmod>2018-05-09T15:11:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fortinet-is-a-preferred-partner-for-securing-ics-scada-systems/</loc>
		<lastmod>2018-05-09T16:40:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/is-converging-your-it-and-ot-networks-putting-your-organization-at-risk/</loc>
		<lastmod>2018-05-09T16:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/devopsdays-austin-recap-getting-back-to-basics/</loc>
		<lastmod>2018-05-09T17:07:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/netflix-phish-claims-your-membership-is-on-hold/</loc>
		<lastmod>2018-05-09T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/https-why-the-green-padlock-is-not-enough/</loc>
		<lastmod>2018-05-09T17:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-tina-caldarone-boosted-her-skills-confidence-salary-with-ccna-certification/</loc>
		<lastmod>2018-05-09T17:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-nolan-hedglins-counting-down-to-skynet/</loc>
		<lastmod>2018-05-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/antidote-for-fake-everything/</loc>
		<lastmod>2018-05-09T18:52:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/your-users-have-left-the-building-now-what/</loc>
		<lastmod>2018-05-09T19:13:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/trusted-computing-group-with-embedded-computing-design-will-address-iot-security-at-june-28-sensors-expo-conference-workshop/</loc>
		<lastmod>2018-05-09T19:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/will-gdpr-kill-risk-based-authentication/</loc>
		<lastmod>2018-05-09T20:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/want-to-see-what-a-live-ddos-attack-looks-like/</loc>
		<lastmod>2018-05-09T20:49:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-research-areas-by-size-and-countedness/</loc>
		<lastmod>2018-05-09T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/its-national-teacher-appreciation-week/</loc>
		<lastmod>2018-05-09T21:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/microsoft-may-madness/</loc>
		<lastmod>2018-05-09T21:56:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/inner-circle-podcast-episode-007-daniel-miessler-demystifies-machine-learning/</loc>
		<lastmod>2018-05-09T22:04:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/advance-your-security-program-with-the-latest-securitycenter-innovations/</loc>
		<lastmod>2018-05-09T22:08:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr-chapter-summaries-part-1/</loc>
		<lastmod>2018-05-09T22:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/rsa-survey-why-is-encryption-usage-on-the-rise/</loc>
		<lastmod>2018-05-09T23:24:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-shared-security-podcast-episode-76-special-guest-kevin-johnson-secureideas-router-hacking-gdpr-nsa-metadata/</loc>
		<lastmod>2018-05-10T04:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-behavioral-intelligence-officer/</loc>
		<lastmod>2018-05-10T04:16:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/all-about-peerlyst-a-thriving-online-platform-for-cybersecurity-professionals/</loc>
		<lastmod>2018-05-10T04:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/data-breach-disclosure-is-still-taking-too-long-report-reveals-as-gdpr-looms/</loc>
		<lastmod>2018-05-10T08:04:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-install-and-configure-the-netsparker-cloud-scan-bamboo-plugin/</loc>
		<lastmod>2018-05-10T08:47:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/artificial-intelligence-ai-used-in-ddos-attacks/</loc>
		<lastmod>2018-05-10T08:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-henry-spencer/</loc>
		<lastmod>2018-05-10T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/whos-more-of-a-threat-insiders-or-external-threat-actors/</loc>
		<lastmod>2018-05-10T12:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/devs-find-fake-version-of-bitcoin-wallet-stealing-users-seeds/</loc>
		<lastmod>2018-05-10T12:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bitdefender-gravityzone-becomes-worlds-first-workload-security-platform-integrated-with-nutanix-prism/</loc>
		<lastmod>2018-05-10T13:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fido-carry-on/</loc>
		<lastmod>2018-05-10T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/supply-chain-security/</loc>
		<lastmod>2018-05-10T14:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/failure-without-consequences-after-breach/</loc>
		<lastmod>2018-05-10T16:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/are-you-buying-solid-protection-or-snake-oil/</loc>
		<lastmod>2018-05-10T16:16:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/nigelthorn-malware-abuses-chrome-extensions-to-cryptomine-and-steal-data/</loc>
		<lastmod>2018-05-10T16:16:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/20-dev-leaders-and-hiring-managers-reveal-their-favorite-devops-interview-questions/</loc>
		<lastmod>2018-05-10T16:19:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/evolving-playbooks-in-targeted-apt-attacks-across-asia-pacific-and-japan/</loc>
		<lastmod>2018-05-10T16:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/digital-business-requires-digital-security/</loc>
		<lastmod>2018-05-10T17:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-ultimate-mothers-day-gift-avast/</loc>
		<lastmod>2018-05-10T17:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bec-attacks-how-email-account-compromise-works/</loc>
		<lastmod>2018-05-10T17:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-recover-from-a-business-email-compromise-bec-attack/</loc>
		<lastmod>2018-05-10T17:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-cloud-identity-dilemma/</loc>
		<lastmod>2018-05-10T17:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-amit-serpers-how-we-reverse-engineered-osx-pirrit-got-legal-threats-and-survived/</loc>
		<lastmod>2018-05-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-importance-of-cybersecurity-in-digital-transformation/</loc>
		<lastmod>2018-05-10T18:06:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/android-security-update-may-2018/</loc>
		<lastmod>2018-05-10T18:20:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-ultimate-guide-to-cisco-certification/</loc>
		<lastmod>2018-05-10T18:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bec-attacks-how-attorney-impersonation-works/</loc>
		<lastmod>2018-05-10T18:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-reasons-why-you-should-report-not-reply-to-suspicious-emails/</loc>
		<lastmod>2018-05-10T18:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bec-attacks-how-fake-invoice-schemes-work/</loc>
		<lastmod>2018-05-10T18:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/conversations-with-the-inventor-of-wildcard-certificates-part-1-early-days/</loc>
		<lastmod>2018-05-10T18:49:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-is-pci-compliance/</loc>
		<lastmod>2018-05-10T19:40:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/parenting-in-the-digital-world-a-review/</loc>
		<lastmod>2018-05-10T20:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr-chapter-summaries-part-2/</loc>
		<lastmod>2018-05-10T20:52:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-it-means-to-achieve-pci-certification-a-full-explanation-2/</loc>
		<lastmod>2018-05-10T21:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/internet-explorer-zero-day-browser-is-once-again-under-attack/</loc>
		<lastmod>2018-05-10T21:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-joy-of-tech-wheres-posto/</loc>
		<lastmod>2018-05-10T21:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-gdpr-is-every-security-professionals-dream/</loc>
		<lastmod>2018-05-10T21:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/inner-circle-podcast-episode-006-corey-williams-discusses-next-gen-access-and-zero-trust-security/</loc>
		<lastmod>2018-05-10T22:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/zero-day-flaw-exploited-in-targeted-attacks-is-fixed-by-microsoft/</loc>
		<lastmod>2018-05-10T22:52:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/survey-finds-most-financial-firms-unprepared-for-looming-gdpr-deadline/</loc>
		<lastmod>2018-05-11T00:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/encryption-is-only-as-strong-as-your-password/</loc>
		<lastmod>2018-05-11T04:04:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/text-bombs-and-black-dots-of-death-plague-whatsapp-and-imessage-users/</loc>
		<lastmod>2018-05-11T06:43:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/i-still-wannacry-one-year-later-avast/</loc>
		<lastmod>2018-05-11T07:52:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/reported-data-breaches-falling-fast-cryptojacking-and-gdpr-likely-culprits/</loc>
		<lastmod>2018-05-11T08:52:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/phishing-site-encrypted-with-aes-designed-to-steal-users-apple-ids/</loc>
		<lastmod>2018-05-11T11:40:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-thucydides/</loc>
		<lastmod>2018-05-11T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tenable-research-april-vulnerability-disclosure-roundup/</loc>
		<lastmod>2018-05-11T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-fight-for-net-neutrality-and-the-might-of-cryptojacking-malware-avast/</loc>
		<lastmod>2018-05-11T12:04:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/one-in-three-investment-firms-have-not-yet-started-gdpr-compliance-projects/</loc>
		<lastmod>2018-05-11T13:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-smarter-the-student-the-stronger-the-password-study/</loc>
		<lastmod>2018-05-11T13:50:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/six-cyber-security-tips-for-every-mom-out-there/</loc>
		<lastmod>2018-05-11T13:52:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-georgian-gauntlet-signed-sealed-and-delivered/</loc>
		<lastmod>2018-05-11T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/crooks-exploit-facebook-to-spread-crypto-miner-malware/</loc>
		<lastmod>2018-05-11T14:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/where-did-the-tech-support-scam-blacklist-go/</loc>
		<lastmod>2018-05-11T15:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/rise-of-the-rogue-cloud-the-fundamental-security-mistake-enterprises-make-and-how-to-correct-it/</loc>
		<lastmod>2018-05-11T15:34:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/top-10-solutions-to-protect-against-ddos-attacks-and-increase-security/</loc>
		<lastmod>2018-05-11T15:34:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/imperva-python-sdk-were-all-consenting-secops-here/</loc>
		<lastmod>2018-05-11T15:43:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-your-approach-to-sd-wan-can-impact-your-network-security/</loc>
		<lastmod>2018-05-11T15:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mssps-disrupting-the-sd-wan-market-for-fun-and-profit/</loc>
		<lastmod>2018-05-11T15:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/infiltration-successes-and-pitfalls-of-penetrating-hostile-online-groups/</loc>
		<lastmod>2018-05-11T16:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/advisory-intel-simply-misunderstood/</loc>
		<lastmod>2018-05-11T16:31:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-joe-slowiks-threat-activity-attribution-differentiating-the-who-from-the-how/</loc>
		<lastmod>2018-05-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/threat-hunting-zyklon-trojan/</loc>
		<lastmod>2018-05-11T18:22:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/adding-security-to-your-msp-business-opportunities-and-challenges/</loc>
		<lastmod>2018-05-11T18:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/infosec-institute-offers-dod-8140-related-training/</loc>
		<lastmod>2018-05-11T19:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/insider-threat-how-to-protect-your-business-from-your-own-employees/</loc>
		<lastmod>2018-05-11T19:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cert-certified-computer-security-incident-handler-csih/</loc>
		<lastmod>2018-05-11T20:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/it-is-not-always-necessary-to-get-user-consent-under-the-new-gdpr-regulation/</loc>
		<lastmod>2018-05-11T20:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/j-d-illiad-frazers-engineering-said/</loc>
		<lastmod>2018-05-11T21:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-grady-booch/</loc>
		<lastmod>2018-05-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-and-how-to-set-up-a-vpn-on-your-iphone-or-android-avast-essential-guide/</loc>
		<lastmod>2018-05-12T13:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/federal-government-mulling-nationalization-of-failing-energy-and-utility-provisioners/</loc>
		<lastmod>2018-05-12T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tech-support-scam-article-for-eset/</loc>
		<lastmod>2018-05-12T15:04:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/apple-and-android-news/</loc>
		<lastmod>2018-05-12T15:40:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-devon-kerrs-quantify-your-hunt-not-your-parents-red-teaming/</loc>
		<lastmod>2018-05-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-safetysat/</loc>
		<lastmod>2018-05-12T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/data-protection-officer-dos-donts-for-gdpr-challenges/</loc>
		<lastmod>2018-05-13T08:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-john-von-neumann-ph-d/</loc>
		<lastmod>2018-05-13T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-must-have-siem-features-for-advanced-threats/</loc>
		<lastmod>2018-05-13T12:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/googles-new-advanced-persistent-threat-convenience-services/</loc>
		<lastmod>2018-05-13T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-andrea-little-limbagos-internet-anarchy-the-global-march-toward-data-localization/</loc>
		<lastmod>2018-05-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/robert-m-lee-jeff-hasss-cross-agency-communication/</loc>
		<lastmod>2018-05-13T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-steal-a-million-the-memoirs-of-a-russian-hacker/</loc>
		<lastmod>2018-05-13T22:35:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-importance-of-consent-forms-when-carrying-out-a-penetration-test/</loc>
		<lastmod>2018-05-14T03:04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/five-essential-steps-for-moving-to-devops/</loc>
		<lastmod>2018-05-14T03:04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-leak-securely-for-white-house-staffers/</loc>
		<lastmod>2018-05-14T03:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-shared-security-weekly-blaze-recent-windows-vulnerabilities-exposed-passwords-credit-freeze-controversy/</loc>
		<lastmod>2018-05-14T04:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/42-percent-of-security-professionals-ignore-security-warnings/</loc>
		<lastmod>2018-05-14T09:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/securing-the-critical-infrastructure-two-lost-decades/</loc>
		<lastmod>2018-05-14T10:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/chilis-restaurants-suffered-payment-card-data-security-incident/</loc>
		<lastmod>2018-05-14T11:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-stewart-brand/</loc>
		<lastmod>2018-05-14T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/some-notes-on-efail/</loc>
		<lastmod>2018-05-14T12:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-experts-say-government-regulation-is-a-lousy-option-but-may-still-be-the-best/</loc>
		<lastmod>2018-05-14T12:41:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-essential-guide-to-shopping-online-avast/</loc>
		<lastmod>2018-05-14T13:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/glyph-perturbation-the-science-of-font-steganography/</loc>
		<lastmod>2018-05-14T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ray-ozzies-encryption-backdoor/</loc>
		<lastmod>2018-05-14T14:02:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/semafone-webinar-to-help-contact-centers-navigate-changing-regulatory-landscape-2/</loc>
		<lastmod>2018-05-14T14:45:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/vendors-educating-and-social-media-marketing/</loc>
		<lastmod>2018-05-14T14:47:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/pirates-attack-vessel-in-the-malacca-strait-for-first-time-since-2015/</loc>
		<lastmod>2018-05-14T14:51:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/detecting-cloned-cards-at-the-atm-register/</loc>
		<lastmod>2018-05-14T15:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/can-c-level-accountability-put-encryption-on-the-map/</loc>
		<lastmod>2018-05-14T15:56:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/multi-cloud-security-checklist-8-things-cisos-need-to-remember/</loc>
		<lastmod>2018-05-14T16:16:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/countdown-to-gdpr-9-how-is-spanning-preparing-for-gdpr/</loc>
		<lastmod>2018-05-14T16:23:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bens-book-of-the-month-review-of-insecurity-why-a-failure-to-attract-and-retain-women-in-cybersecurity-is-making-us-all-less-safe/</loc>
		<lastmod>2018-05-14T16:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/perception-matters-measure-perceived-performance/</loc>
		<lastmod>2018-05-14T16:46:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/significant-retail-spending-on-mothers-day-sets-a-stage-for-major-holidays-in-2018/</loc>
		<lastmod>2018-05-14T17:30:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/a-week-in-security-may-7-may-13/</loc>
		<lastmod>2018-05-14T17:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-daniel-grants-powershell-deobfuscation-putting-the-toothpaste-back-in-the-tube/</loc>
		<lastmod>2018-05-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/details-on-a-new-pgp-vulnerability/</loc>
		<lastmod>2018-05-14T18:36:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cybersecurity-2028-by-default-by-design/</loc>
		<lastmod>2018-05-14T18:36:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/advisory-efail-pgp-has-an-email-problem/</loc>
		<lastmod>2018-05-14T19:48:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/we-scan-and-we-patch-but-we-dont-do-vulnerability-management/</loc>
		<lastmod>2018-05-14T20:13:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/new-ddos-attack-method-demands-a-fresh-approach-to-amplification-assault-mitigation/</loc>
		<lastmod>2018-05-14T20:15:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr-chapter-summaries-part-3/</loc>
		<lastmod>2018-05-14T20:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-joy-of-tech-how-to-design-your-companys-digital-wellness-strategy/</loc>
		<lastmod>2018-05-14T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/6-best-practices-to-avoid-leaks-in-2018/</loc>
		<lastmod>2018-05-15T03:16:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/women-in-information-security-leila-powell/</loc>
		<lastmod>2018-05-15T03:16:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/issuance-support-for-a-wide-range-of-payment-instruments/</loc>
		<lastmod>2018-05-15T07:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/podcast-ciso-speak-policy-and-procedure/</loc>
		<lastmod>2018-05-15T07:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/whats-missing-in-your-digital-transformation-plan/</loc>
		<lastmod>2018-05-15T07:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/empowering-security-in-the-csps-iot-infrastructure-and-services/</loc>
		<lastmod>2018-05-15T07:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-fortinet-connects-with-communications-service-providers-csps/</loc>
		<lastmod>2018-05-15T07:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hacking-retro/</loc>
		<lastmod>2018-05-15T07:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/whats-so-scary-about-gdpr/</loc>
		<lastmod>2018-05-15T07:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/facebook-removes-200-suspicious-apps/</loc>
		<lastmod>2018-05-15T08:05:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/signal-app-delivers-timely-patch-for-code-injection-vulnerability-that-allows-remote-code-execution/</loc>
		<lastmod>2018-05-15T08:24:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/sending-inaudible-commands-to-voice-assistants/</loc>
		<lastmod>2018-05-15T11:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-winston-churchill/</loc>
		<lastmod>2018-05-15T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/signal-patches-code-injection-bug-that-enabled-remote-code-execution/</loc>
		<lastmod>2018-05-15T12:16:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-fbis-10-most-wanted-black-hat-hackers-5-4-and-3/</loc>
		<lastmod>2018-05-15T12:16:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/state-of-software-security-insight-into-government-sector-application-security-and-guidance-for-policy-makers/</loc>
		<lastmod>2018-05-15T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-create-an-information-security-policy-for-iso-27001/</loc>
		<lastmod>2018-05-15T13:27:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/us-senators-demand-ftc-investigate-googles-gps-data-collection/</loc>
		<lastmod>2018-05-15T13:37:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/vpn-much-avast-just-made-vpn-easier-for-mac-users-avast/</loc>
		<lastmod>2018-05-15T13:40:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fixstream-launches-industrys-first-visual-artificial-intelligence-platform-to-predict-business-application-issues-across-hybrid-it/</loc>
		<lastmod>2018-05-15T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/microsoft-now-supports-cryptomining-in-excel/</loc>
		<lastmod>2018-05-15T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr-in-action-even-facebook-impacted/</loc>
		<lastmod>2018-05-15T14:17:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/information-security-a-strategy-for-small-business/</loc>
		<lastmod>2018-05-15T14:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/two-romanian-threat-actors-extradited-to-us-after-18m-fraud-scheme/</loc>
		<lastmod>2018-05-15T14:26:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/java-deserialization-vulnerability-found-to-be-widespread-across-saas-vendor-sdks/</loc>
		<lastmod>2018-05-15T15:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/governments-worldwide-appear-to-be-hearing-the-calls-for-improved-cyber-security/</loc>
		<lastmod>2018-05-15T16:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/amazon-guardduty-and-automating-cloud-security-with-the-security-fabric/</loc>
		<lastmod>2018-05-15T17:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-russell-mosley-and-ryan-st-germains-effective-monitoring-for-operational-security/</loc>
		<lastmod>2018-05-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr-causes-a-flood-of-new-policies/</loc>
		<lastmod>2018-05-15T18:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/infosec-institute-named-a-2018-gartner-peer-insights-customers-choice-for-security-awareness-computer-based-training/</loc>
		<lastmod>2018-05-15T19:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/learning-curve-security-awareness-in-education/</loc>
		<lastmod>2018-05-15T19:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-prevent-your-laptop-from-overheating/</loc>
		<lastmod>2018-05-15T20:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/adobe-reader-zero-day-discovered-alongside-windows-vulnerability/</loc>
		<lastmod>2018-05-15T20:04:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tls-threats-uncovered-how-small-errors-revealed-code-signing-abuse-by-winnti-umbrella-group/</loc>
		<lastmod>2018-05-15T20:23:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-fatal-crash-rate/</loc>
		<lastmod>2018-05-15T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cmu-sei-blockchain-your-questions-our-answers/</loc>
		<lastmod>2018-05-15T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-the-fortinet-veterans-program-is-helping-to-bridge-the-cybersecurity-skills-gap/</loc>
		<lastmod>2018-05-16T01:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-impacts-of-a-data-breach/</loc>
		<lastmod>2018-05-16T01:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/to-ensure-cloud-security-for-the-future-employee-education-must-improve-today/</loc>
		<lastmod>2018-05-16T03:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/video-the-new-eh-net-advancing-your-infosec-career-with-rafal-los/</loc>
		<lastmod>2018-05-16T06:40:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/aid-worker-kidnapping-in-somalia-is-a-reminder-of-an-enduring-threat/</loc>
		<lastmod>2018-05-16T06:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/16-year-old-arrested-after-phishing-scheme-against-teachers-to-change-grades/</loc>
		<lastmod>2018-05-16T06:55:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/chilis-hit-by-malware-payment-card-data-stolen/</loc>
		<lastmod>2018-05-16T08:39:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/my-take-why-the-unfolding-siems-renaissance-fits-hand-in-glove-with-digital-transformation/</loc>
		<lastmod>2018-05-16T08:53:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/most-companies-willing-to-spend-more-on-app-security-only-after-a-breach-ponemon-study-shows/</loc>
		<lastmod>2018-05-16T09:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tripwire-patch-priority-index-for-april-2018/</loc>
		<lastmod>2018-05-16T10:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-anil-dash/</loc>
		<lastmod>2018-05-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cryptojacking-affected-a-quarter-of-organizations-in-the-cloud-finds-report/</loc>
		<lastmod>2018-05-16T12:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/new-state-of-online-retail-performance-report-available/</loc>
		<lastmod>2018-05-16T13:08:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/rogue-wifi-access-points-would-you-know-the-difference/</loc>
		<lastmod>2018-05-16T13:51:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/googles-litany-of-chrome-fail-malicious-extensions-burgeon-out-of-control/</loc>
		<lastmod>2018-05-16T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/former-cia-engineer-allegedly-leaked-vault-7-hacking-tools/</loc>
		<lastmod>2018-05-16T14:17:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hacking-ilo-take-a-moment-to-secure-your-servers-avast/</loc>
		<lastmod>2018-05-16T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/federal-ciso-superhero-needed/</loc>
		<lastmod>2018-05-16T14:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/72-hours-understanding-the-gdpr-data-breach-reporting-timeline/</loc>
		<lastmod>2018-05-16T14:47:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ripe-76-selected-talks/</loc>
		<lastmod>2018-05-16T14:49:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/iot-and-hardware-security-how-bad-will-it-get/</loc>
		<lastmod>2018-05-16T14:49:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fortinet-threat-report-reveals-an-evolution-of-malware-to-exploit-cryptocurrencies/</loc>
		<lastmod>2018-05-16T14:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/21-infosec-and-aws-experts-reveal-the-1-mistake-companies-make-when-it-comes-to-aws-security-and-how-to-avoid-it/</loc>
		<lastmod>2018-05-16T16:08:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/nist-updates-cybersecurity-framework/</loc>
		<lastmod>2018-05-16T17:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/forget-c-i-a-availability-is-king/</loc>
		<lastmod>2018-05-16T17:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/election-readiness-2018/</loc>
		<lastmod>2018-05-16T17:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-anjum-ahujas-plight-at-the-end-of-the-tunnel/</loc>
		<lastmod>2018-05-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/certificate-enrollment-what-you-should-know-expert-insights/</loc>
		<lastmod>2018-05-16T18:08:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr/</loc>
		<lastmod>2018-05-16T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-rowhammer-the-evolution-of-a-dangerous-attack-over-the-years/</loc>
		<lastmod>2018-05-16T21:40:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/4-tips-to-secure-your-online-gaming-accounts/</loc>
		<lastmod>2018-05-16T22:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/dod-8570-iam-certification-and-requirements/</loc>
		<lastmod>2018-05-17T00:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-ultimate-guide-to-ethical-hacking/</loc>
		<lastmod>2018-05-17T00:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/seven-security-tips-for-staying-safe-on-an-iphone/</loc>
		<lastmod>2018-05-17T00:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ransomware-as-a-service-raas-how-it-works/</loc>
		<lastmod>2018-05-17T03:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/rail-europe-data-breach-lasted-almost-three-months/</loc>
		<lastmod>2018-05-17T06:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fake-fortnite-apps-scamming-and-spying-on-android-gamers/</loc>
		<lastmod>2018-05-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/secure-cloud-migration-and-the-cloud-security-alliance/</loc>
		<lastmod>2018-05-17T07:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/psd2-which-door-are-you-choosing/</loc>
		<lastmod>2018-05-17T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/a-wicked-family-of-bots/</loc>
		<lastmod>2018-05-17T08:04:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/half-of-alerts-signaled-by-edr-tools-are-false-alarms-lack-of-personnel-prevents-rapid-detection-and-response/</loc>
		<lastmod>2018-05-17T08:04:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/russian-hacker-gets-35-years-in-prison-for-running-counter-av-service/</loc>
		<lastmod>2018-05-17T08:32:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/my-take-why-ddos-attacks-continue-to-escalate-and-how-businesses-need-to-respond/</loc>
		<lastmod>2018-05-17T08:35:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/dissecting-the-pop-ss-vulnerability/</loc>
		<lastmod>2018-05-17T09:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hackers-siphon-hundreds-of-millions-of-pesos-out-of-mexican-banks-through-shadow-transactions/</loc>
		<lastmod>2018-05-17T11:22:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/federal-jury-convicts-operator-of-scan4you-counter-antivirus-service/</loc>
		<lastmod>2018-05-17T11:22:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-leslie-poles-hartley-cbe/</loc>
		<lastmod>2018-05-17T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/advisory-red-hat-dhcp-client-command-injection-trouble/</loc>
		<lastmod>2018-05-17T12:05:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/secmon-state-of-the-union-focusing-on-use-cases/</loc>
		<lastmod>2018-05-17T12:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/zipperdown-programming-vulnerability-could-let-hackers-execute-code-in-ios-apps/</loc>
		<lastmod>2018-05-17T13:04:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/av-comparatives-awards-avast-top-ranking-avast/</loc>
		<lastmod>2018-05-17T13:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/att-verizon-t-mobile-att-sprint-were-selling-your-location-data-to-prison-tech-company-nothing-to-see-here/</loc>
		<lastmod>2018-05-17T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/single-sign-on-in-the-eyes-of-a-hacker/</loc>
		<lastmod>2018-05-17T14:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/pti-2018-the-biggest-key-findings-and-how-to-defend-against-them/</loc>
		<lastmod>2018-05-17T14:11:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/smart-homes-of-tomorrow-this-is-why-we-cant-have-nice-things/</loc>
		<lastmod>2018-05-17T14:46:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/secure-your-buckets/</loc>
		<lastmod>2018-05-17T14:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/building-an-adaptive-and-secure-sd-wan-framework/</loc>
		<lastmod>2018-05-17T14:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-dark-overlord-suspected-hacking-group-member-arrested-in-serbia/</loc>
		<lastmod>2018-05-17T15:08:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ferruh-mavituna-talks-about-security-in-the-sdlc-on-pauls-security-weekly-podcast/</loc>
		<lastmod>2018-05-17T15:27:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/resources-for-the-community-usa-todays-homeland-security-edition-2018/</loc>
		<lastmod>2018-05-17T16:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/exploring-the-virtual-worlds-of-advergaming/</loc>
		<lastmod>2018-05-17T16:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fake-malwarebytes-helpline-scammer-caught-in-the-act/</loc>
		<lastmod>2018-05-17T16:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/yin-and-yang-of-the-zero-trust-model/</loc>
		<lastmod>2018-05-17T17:37:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-josh-grunzweigs-rise-of-the-miners/</loc>
		<lastmod>2018-05-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tracking-firm-locationsmart-leaked-location-data-for-customers-of-all-major-u-s-mobile-carriers-without-consent-in-real-time-via-its-web-site/</loc>
		<lastmod>2018-05-17T18:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gemalto-and-ibm-secure-everything-from-data-to-applications-wherever-you-are-in-the-cloud/</loc>
		<lastmod>2018-05-17T19:20:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/deserialization-vulnerability-confirmed-in-nexmo-3-4-0-sdk/</loc>
		<lastmod>2018-05-17T19:59:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/dont-give-social-media-hackers-a-chance/</loc>
		<lastmod>2018-05-17T20:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/now-google-assistant-can-call-your-parents/</loc>
		<lastmod>2018-05-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-repairs/</loc>
		<lastmod>2018-05-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/webinar-replay-opportunities-in-siem-analytics/</loc>
		<lastmod>2018-05-17T21:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/3-fresh-tips-to-book-your-vacation-securely/</loc>
		<lastmod>2018-05-17T21:46:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/escaping-the-whale-things-you-probably-shouldnt-do-with-docker-part-1/</loc>
		<lastmod>2018-05-17T22:19:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/confessions-of-a-risk-assessor-6-things-to-know-before-a-cyber-security-assessment/</loc>
		<lastmod>2018-05-17T22:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/trusted-computing-primary-use-cases/</loc>
		<lastmod>2018-05-17T23:10:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/3-ways-efail-parallels-the-need-for-machine-identity-protection/</loc>
		<lastmod>2018-05-18T00:15:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/jumpstarting-your-cyberdefense-machine-with-cis-controls-v7/</loc>
		<lastmod>2018-05-18T03:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/an-analysis-of-microsoft-edge-chakra-newscobjectnoctor-array-type-confusion-cve-2018-0838/</loc>
		<lastmod>2018-05-18T08:16:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/despite-cloud-popularity-enterprises-still-struggle-with-compliance-and-security/</loc>
		<lastmod>2018-05-18T08:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/yanny-or-laurel-integrated-risk-management-or-grc/</loc>
		<lastmod>2018-05-18T11:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/may-vulnerability-of-the-month-java-deserialization-everywhere/</loc>
		<lastmod>2018-05-18T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-ian-flemings-james-bond/</loc>
		<lastmod>2018-05-18T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/lmx-ot-nosj-interchanging-classic-data-formats-with-single-blackmagic-incantations/</loc>
		<lastmod>2018-05-18T12:20:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/is-it-a-phish-slightly-delayed-mothers-day-edition/</loc>
		<lastmod>2018-05-18T12:32:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/suspected-syrian-electronic-army-hackers-indicted-for-conspiracy-and-identity-theft/</loc>
		<lastmod>2018-05-18T12:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/sldc-soc-2-and-other-four-letter-words/</loc>
		<lastmod>2018-05-18T12:45:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/malware-actors-targeting-north-korean-defectors-using-facebook-and-google-play/</loc>
		<lastmod>2018-05-18T13:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/victory-for-net-neutrality-and-trouble-for-telegram-messenger-avast/</loc>
		<lastmod>2018-05-18T13:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hardware-envelope-a-secure-conveyance/</loc>
		<lastmod>2018-05-18T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/facebook-gdpr-and-the-right-to-privacy-threes-a-crowd/</loc>
		<lastmod>2018-05-18T15:06:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/a-look-into-the-drupalgeddon-client-side-attacks/</loc>
		<lastmod>2018-05-18T15:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-tech-companies-wanted-senate-bill-315-vetoed/</loc>
		<lastmod>2018-05-18T16:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-antivirus-has-endured-as-a-primary-layer-of-defense-30-years-into-the-cat-vs-mouse-chase/</loc>
		<lastmod>2018-05-18T17:50:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-erika-noerenbergs-malware-analysis-and-automation-using-binary-ninja/</loc>
		<lastmod>2018-05-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/our-threat-testing-and-bas-papers-are-out/</loc>
		<lastmod>2018-05-18T18:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/t-mobile-employee-made-unauthorized-sim-swap-to-steal-instagram-account/</loc>
		<lastmod>2018-05-18T18:35:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-joy-of-tech-mindfulness-exercise/</loc>
		<lastmod>2018-05-18T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-integrate-cybersecurity-with-digital-transformation/</loc>
		<lastmod>2018-05-18T21:08:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/over-one-million-symantec-certificates-still-havent-been-replaced/</loc>
		<lastmod>2018-05-18T21:23:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/referral-program-update-now-offering-agency-plan/</loc>
		<lastmod>2018-05-19T01:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/quantum-computation-breaks-crypto-unlikely/</loc>
		<lastmod>2018-05-19T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-shawn-thomas-andrew-marini-james-callahan-and-dustin-shirleys-between-a-soc-and-a-hard-place/</loc>
		<lastmod>2018-05-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/create-code-metrics-with-cloc/</loc>
		<lastmod>2018-05-19T18:31:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-mc-hammer-age/</loc>
		<lastmod>2018-05-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/avoid-these-failures-with-siem-tools-at-all-costs/</loc>
		<lastmod>2018-05-20T12:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/magnetic-attraction-the-vetting-of-the-magstripe/</loc>
		<lastmod>2018-05-20T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsides-charm-2018-adam-mathis-using-atomic-red-team-to-test-endpoint-solutions/</loc>
		<lastmod>2018-05-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/disconcerting-android-stories-and-one-bit-of-good-news/</loc>
		<lastmod>2018-05-20T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/robert-m-lee-jeff-hasss-little-bobby-comics-threat-hunting/</loc>
		<lastmod>2018-05-20T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/masscan-macos-and-firewall/</loc>
		<lastmod>2018-05-20T21:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-shared-security-weekly-blaze-efail-vulnerabilities-and-pgp-encryption-facebooks-app-investigation-nest-password-notifications/</loc>
		<lastmod>2018-05-21T04:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/3-key-challenges-to-being-pci-3-2-compliant-and-how-to-resolve-them/</loc>
		<lastmod>2018-05-21T04:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-common-devops-transition-mistakes-to-avoid/</loc>
		<lastmod>2018-05-21T04:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/guest-essay-how-data-science-and-cybersecurity-will-secure-digital-transformation/</loc>
		<lastmod>2018-05-21T08:02:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/loopholes-in-cloud-security-exposed-online-50-of-corporate-databases/</loc>
		<lastmod>2018-05-21T08:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/maritime-kidnappings-in-west-africa-increase-significantly-in-2018/</loc>
		<lastmod>2018-05-21T10:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/kid-monitoring-app-teensafe-exposes-user-data/</loc>
		<lastmod>2018-05-21T11:10:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/secure-payments-of-the-future/</loc>
		<lastmod>2018-05-21T11:40:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/pci-dss-version-3-2-1-published-by-pci-security-standards-council/</loc>
		<lastmod>2018-05-21T11:40:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/senatorial-commands-doj-cough-it-up/</loc>
		<lastmod>2018-05-21T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-tips-for-ultimate-online-security-and-privacy-avast-infographic/</loc>
		<lastmod>2018-05-21T14:04:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-university-of-greenwich-fined-by-ico-for-leaking-20000-records/</loc>
		<lastmod>2018-05-21T14:06:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/are-governments-getting-smarter-about-encryption-new-bill-could-prohibit-government-backdoors/</loc>
		<lastmod>2018-05-21T14:48:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/small-businesses-face-uncertainty-and-risk-over-gdpr/</loc>
		<lastmod>2018-05-21T15:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/guest-essay-the-facebook-factor-zuckerbergs-mea-culpa-reveals-intolerable-privacy-practices/</loc>
		<lastmod>2018-05-21T15:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/learn-how-billions-of-dns-requests-help-improve-security/</loc>
		<lastmod>2018-05-21T15:18:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/privilege-escalation-on-linux-with-live-examples/</loc>
		<lastmod>2018-05-21T15:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/layer-seven-ddos-attacks/</loc>
		<lastmod>2018-05-21T15:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/memory-forensics-and-analysis-using-volatility/</loc>
		<lastmod>2018-05-21T16:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-is-an-xxe-attack/</loc>
		<lastmod>2018-05-21T16:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/top-6-siem-use-cases/</loc>
		<lastmod>2018-05-21T16:52:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hacking-communities-in-the-deep-web/</loc>
		<lastmod>2018-05-21T16:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/top-20-security-awareness-posters-with-messages-that-stick/</loc>
		<lastmod>2018-05-21T16:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/7-best-computer-forensics-tools/</loc>
		<lastmod>2018-05-21T16:52:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/restoring-salesforce-data-from-a-backup-if-you-cant-access-your-salesforce-production-org/</loc>
		<lastmod>2018-05-21T17:07:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-brian-andrzejewskis-exercise-your-soc-how-to-run-an-effective-soc-response-simulation/</loc>
		<lastmod>2018-05-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/a-week-in-security-may-14-may-20/</loc>
		<lastmod>2018-05-21T18:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/vote-for-malwarebytes-labs-european-security-blogger-awards-2018/</loc>
		<lastmod>2018-05-21T18:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/realizing-the-full-potential-of-secure-sd-wan/</loc>
		<lastmod>2018-05-21T18:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cyberark-shows-how-shadow-admins-can-be-created-in-cloud-environments/</loc>
		<lastmod>2018-05-21T18:05:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/secure-your-industrial-iot-sensors-or-else/</loc>
		<lastmod>2018-05-21T18:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/next-research-soc-siem-and-again-overall-detection-and-response/</loc>
		<lastmod>2018-05-21T18:38:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/j-d-illiad-frazers-user-friendly-nick/</loc>
		<lastmod>2018-05-21T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cipher-selected-as-one-of-2018-worlds-hottest-most-innovative-cybersecurity-companies/</loc>
		<lastmod>2018-05-21T21:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/public-and-personal-best-practices-essential-for-a-free-internet-avast/</loc>
		<lastmod>2018-05-22T00:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/protecting-your-enterprise-from-business-email-compromise/</loc>
		<lastmod>2018-05-22T02:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/preventing-unexpected-change-syndrome-with-change-management/</loc>
		<lastmod>2018-05-22T03:34:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/women-in-information-security-veronica-schmitt/</loc>
		<lastmod>2018-05-22T03:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hacking-hackers-and-their-hacks-2018/</loc>
		<lastmod>2018-05-22T03:36:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ransomware-an-enterprise-perspective/</loc>
		<lastmod>2018-05-22T07:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/you-cannot-buy-security-operations-maturity-but-you-can-ruin-it/</loc>
		<lastmod>2018-05-22T07:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/europe-hit-with-80-million-fraud-attempts-in-q1-2018-as-merchants-favor-low-friction-experiences-over-security/</loc>
		<lastmod>2018-05-22T08:10:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/comptia-cyber-roundtable-nyc/</loc>
		<lastmod>2018-05-22T09:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cast-your-vote-for-hotforsecurity-at-the-european-security-bloggers-awards/</loc>
		<lastmod>2018-05-22T09:56:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/greenwich-university-fined-120000-by-ico-for-serious-security-breach/</loc>
		<lastmod>2018-05-22T11:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-areas-where-multi-factor-authentication-keeps-secure-access-secure/</loc>
		<lastmod>2018-05-22T11:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/native-structured-query-language/</loc>
		<lastmod>2018-05-22T11:50:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/are-phishing-simulations-a-replacement-for-training-no/</loc>
		<lastmod>2018-05-22T12:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/avast-mobile-security-for-android-put-to-the-test-avast/</loc>
		<lastmod>2018-05-22T13:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr-what-compliance-says-vs-what-devops-hears/</loc>
		<lastmod>2018-05-22T13:22:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cast-your-vote-for-bitdefender-business-insights-at-the-european-security-bloggers-awards/</loc>
		<lastmod>2018-05-22T13:22:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fortinet-fabric-connectors-enabling-deep-fabric-integration-with-third-party-solutions/</loc>
		<lastmod>2018-05-22T13:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/consequences/</loc>
		<lastmod>2018-05-22T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cybersecurity-the-customer-experience-the-perfect-combination/</loc>
		<lastmod>2018-05-22T14:10:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-tipping-point-for-https-is-closing-in-marketers-are-you-ready/</loc>
		<lastmod>2018-05-22T14:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/phdays-8-etherhack-contest-writeup/</loc>
		<lastmod>2018-05-22T15:02:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/zobrio-views-managed-workplace-as-multi-faceted-diamond-for-managed-security-avast/</loc>
		<lastmod>2018-05-22T15:46:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/suspicious-group-of-adware-apps-removed-from-the-google-play-store/</loc>
		<lastmod>2018-05-22T15:46:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mobile-giants-please-dont-share-the-where/</loc>
		<lastmod>2018-05-22T16:05:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/new-mac-cryptominer-uses-xmrig/</loc>
		<lastmod>2018-05-22T16:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/proactivity-and-speed-have-become-essential-components-of-cybersecurity/</loc>
		<lastmod>2018-05-22T16:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/rachel-mcbride-talks-online-cism-training-with-infosec-institute/</loc>
		<lastmod>2018-05-22T16:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ssd-advisory-vigor-acs-unsafe-flex-amf-java-object-deserialization/</loc>
		<lastmod>2018-05-22T16:47:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/malwarebytes-crackme-2-contest-summary/</loc>
		<lastmod>2018-05-22T17:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/priority-1-for-iot-in-healthcare-you-better-lock-it-down/</loc>
		<lastmod>2018-05-22T17:49:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-chris-myers-and-barrett-adams-adding-simulated-users-to-your-pentesting-lab-with-powershell/</loc>
		<lastmod>2018-05-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/frost-sullivan-recognizes-cipher-with-2018-managed-security-services-market-leadership-award/</loc>
		<lastmod>2018-05-22T18:34:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/database-activity-monitoring-configuring-a-cluster-in-four-easy-steps/</loc>
		<lastmod>2018-05-22T18:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/an-old-trick-with-a-new-twist-cryptomining-through-disguised-url-shorteners/</loc>
		<lastmod>2018-05-22T19:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/zipperdown-remote-code-execution-attack-on-ios-apps/</loc>
		<lastmod>2018-05-22T20:03:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cybersecurity-ventures-places-cipher-on-list-of-top-global-mssps/</loc>
		<lastmod>2018-05-22T20:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/spectre-and-meltdown-still-haunting-intel-amd/</loc>
		<lastmod>2018-05-22T20:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-joy-of-tech-delete-facebook-fail/</loc>
		<lastmod>2018-05-22T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/advanced-encryption-that-locks-down-underlying-data-arrives-to-support-digital-transformation/</loc>
		<lastmod>2018-05-22T22:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-all-or-nothing-cyber-security-paradox/</loc>
		<lastmod>2018-05-22T23:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-modern-day-hacker-a-cautionary-tale/</loc>
		<lastmod>2018-05-23T03:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/electronic-health-records-under-attack-how-to-protect-and-secure-these-critical-assets/</loc>
		<lastmod>2018-05-23T04:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/understanding-the-primary-threats-and-security-concerns-to-container-environments/</loc>
		<lastmod>2018-05-23T04:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/most-companies-still-unprotected-against-10-year-old-wireless-vulnerabilities/</loc>
		<lastmod>2018-05-23T08:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/guest-essay-dhs-tackles-supply-chain-issues-over-malware-laden-smartphones/</loc>
		<lastmod>2018-05-23T09:47:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/web-application-scanning-on-prem-now-available/</loc>
		<lastmod>2018-05-23T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gemalto-evolution-helping-businesses-adapt-to-digital-transformation/</loc>
		<lastmod>2018-05-23T12:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mozilla-rolls-out-two-step-verification-for-firefox-accounts/</loc>
		<lastmod>2018-05-23T12:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/edr-and-cloud-workload-security-on-the-agenda-for-bitdefender-at-infosecurity-europe/</loc>
		<lastmod>2018-05-23T12:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/10-best-practices-to-secure-and-protect-passwords/</loc>
		<lastmod>2018-05-23T13:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/detecting-malware-apt-through-automatic-log-analysis/</loc>
		<lastmod>2018-05-23T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/comcast-a-litany-of-incompetence/</loc>
		<lastmod>2018-05-23T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/healthcare-it-leaders-most-concerned-about-ransomware-and-insider-threats-survey/</loc>
		<lastmod>2018-05-23T14:09:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/rsa-report-mobile-app-fraud-transactions-increased-over-600-percent-in-three-years/</loc>
		<lastmod>2018-05-23T14:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ive-got-trickbot-under-my-screen/</loc>
		<lastmod>2018-05-23T14:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/defending-against-the-new-vpnfilter-botnet/</loc>
		<lastmod>2018-05-23T14:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mac-cryptomining/</loc>
		<lastmod>2018-05-23T15:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-transform-alert-fatigue-into-proactive-security-management-4-must-read-blog-posts/</loc>
		<lastmod>2018-05-23T16:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-importance-of-log-reviews/</loc>
		<lastmod>2018-05-23T17:52:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/buffer-overflow-attack-targeting-microsoft-iis-6-0-returns/</loc>
		<lastmod>2018-05-23T17:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-wes-connells-building-a-predictive-pipeline-to-rapidly-detect-phishing-domains/</loc>
		<lastmod>2018-05-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/c-is-too-low-level/</loc>
		<lastmod>2018-05-23T18:39:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-ways-machine-identities-are-being-used-in-your-organization-why-you-should-protect-them/</loc>
		<lastmod>2018-05-23T19:03:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/repost-hacking-the-power-grid-through-air-conditioners/</loc>
		<lastmod>2018-05-23T19:11:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cgeit-domain-4-risk-optimization/</loc>
		<lastmod>2018-05-23T20:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-morning-news/</loc>
		<lastmod>2018-05-23T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/trusted-computing-group-launches-embedded-iot-developer-website-to-accelerate-implementation-of-foundational-security/</loc>
		<lastmod>2018-05-23T21:34:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-devil-wears-pravda/</loc>
		<lastmod>2018-05-23T22:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr-is-coming-heres-why-you-dont-need-to-panic-avast/</loc>
		<lastmod>2018-05-23T23:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/webinar-times-up-gdpr-is-here-now-what/</loc>
		<lastmod>2018-05-24T03:34:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-you-need-to-master-the-basics-a-three-step-campaign/</loc>
		<lastmod>2018-05-24T03:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/eliminating-the-attackers-advantage-why-original-research-matters/</loc>
		<lastmod>2018-05-24T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/quantifying-the-attackers-first-mover-advantage/</loc>
		<lastmod>2018-05-24T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/can-cisco-fbi-stop-russia-from-deploying-vpnfilter-to-interfere-with-u-s-elections/</loc>
		<lastmod>2018-05-24T04:47:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/2018-is-the-worst-year-for-corporate-security-executives-lack-cohesive-security-plan/</loc>
		<lastmod>2018-05-24T07:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/will-cyber-ransoms-increase-after-gdpr/</loc>
		<lastmod>2018-05-24T10:49:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/vpnfilter-botnet-has-hacked-500000-routers-reboot-and-patch-now/</loc>
		<lastmod>2018-05-24T11:46:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/highlights-from-cloud-expo-asia-hong-kong-2018/</loc>
		<lastmod>2018-05-24T12:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/android-devices-ship-with-pre-installed-malware/</loc>
		<lastmod>2018-05-24T12:22:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/apple-users-can-download-all-the-data-the-company-has-on-them/</loc>
		<lastmod>2018-05-24T12:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-configure-azure-active-directory-single-sign-on-integration-with-saml/</loc>
		<lastmod>2018-05-24T13:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-configure-microsoft-active-directory-federation-services-single-sign-on-integration-with-saml/</loc>
		<lastmod>2018-05-24T13:03:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-configure-okta-single-sign-on-integration-with-saml/</loc>
		<lastmod>2018-05-24T13:03:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-configure-pingidentity-single-sign-on-integration-with-saml/</loc>
		<lastmod>2018-05-24T13:03:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-configure-google-single-sign-on-integration-with-saml/</loc>
		<lastmod>2018-05-24T13:03:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/netsparker-and-single-sign-on-support/</loc>
		<lastmod>2018-05-24T13:03:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mobile-adoption-is-setting-security-awareness-training-back/</loc>
		<lastmod>2018-05-24T13:03:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/netsparker-plans-editions-integration/</loc>
		<lastmod>2018-05-24T13:03:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/may-2018-netsparker-update-new-plans-ui-single-sign-on-support/</loc>
		<lastmod>2018-05-24T13:04:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fourth-spectre-meltdown-hole-of-doom-discovered/</loc>
		<lastmod>2018-05-24T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/closing-the-sandbox-generation-gap/</loc>
		<lastmod>2018-05-24T14:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/countdown-to-gdpr-10-a-gdpr-compliance-checklist/</loc>
		<lastmod>2018-05-24T14:32:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/single-sign-on-sso-use-cases/</loc>
		<lastmod>2018-05-24T14:46:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/new-data-privacy-regulation-deadline-spawns-phishing-attack-outbreak/</loc>
		<lastmod>2018-05-24T14:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/whats-your-gdpr-readiness-personality-the-results-are-in/</loc>
		<lastmod>2018-05-24T15:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/happy-anniversary-to-dreamcastand-its-scams/</loc>
		<lastmod>2018-05-24T15:22:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-bad-coding-habits-die-hard-and-7-ways-to-kill-them/</loc>
		<lastmod>2018-05-24T15:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/expand-your-awareness-program-with-securityiq-1700-library-resources-now-available/</loc>
		<lastmod>2018-05-24T15:34:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/are-your-smb-clients-gdpr-ready-avast-business/</loc>
		<lastmod>2018-05-24T15:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hackers-and-threats-abound-for-gdpr-emperor-snoke/</loc>
		<lastmod>2018-05-24T16:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/24-devops-pros-reveal-the-most-important-characteristic-of-a-successful-devops-engineer/</loc>
		<lastmod>2018-05-24T16:49:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/3-charged-in-fatal-kansas-swatting-attack/</loc>
		<lastmod>2018-05-24T17:45:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/oakland-port-global-free-trade-and-dev-ops/</loc>
		<lastmod>2018-05-24T17:57:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/black-hills-information-security-rick-wisser-and-sierra-wards-hardware-hacking-101/</loc>
		<lastmod>2018-05-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/3-business-departments-your-cyber-security-team-should-engage-now-to-improve-information-security/</loc>
		<lastmod>2018-05-24T18:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/spectre-continues-did-we-all-trade-speed-for-security-avast/</loc>
		<lastmod>2018-05-24T18:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/unintended-consequences-as-marketing-and-new-data-privacy-regulations-collide/</loc>
		<lastmod>2018-05-24T19:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/sucuri-is-committed-to-the-protection-of-your-data/</loc>
		<lastmod>2018-05-24T19:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/see-if-youre-gdpr-ready-with-our-last-minute-checklist/</loc>
		<lastmod>2018-05-24T20:03:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qa-how-deep-instinct-uses-deep-learning-to-detect-unknown-malware-on-laptops-smartphones/</loc>
		<lastmod>2018-05-24T20:12:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr-unintended-consequences-part-1-increasing-wordpress-blog-exposure/</loc>
		<lastmod>2018-05-24T20:31:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/luke-kingma-lou-patrick-mackays-capping-the-sale/</loc>
		<lastmod>2018-05-24T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/top-down-and-bottom-up-defenses-to-secure-iot/</loc>
		<lastmod>2018-05-24T21:16:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/encryption-backdoor-proposal-not-in-the-clear/</loc>
		<lastmod>2018-05-24T22:46:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/protecting-sap-configurations/</loc>
		<lastmod>2018-05-25T01:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/knowledge18-can-you-prevent-the-breach/</loc>
		<lastmod>2018-05-25T03:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-must-adjust-as-sdn-goes-mainstream/</loc>
		<lastmod>2018-05-25T09:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/detecting-lies-through-mouse-movements/</loc>
		<lastmod>2018-05-25T11:25:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/pci-dss-requirement-3-4-a-deep-dive-into-storage-of-cardholder-data-2/</loc>
		<lastmod>2018-05-25T11:32:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/is-it-a-phish-may-25-edition/</loc>
		<lastmod>2018-05-25T12:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/shinoa-owari-mirai-whats-with-all-the-anime-references/</loc>
		<lastmod>2018-05-25T13:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mutually-agreed-norms-for-routing-security-manrs/</loc>
		<lastmod>2018-05-25T15:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/malware-analysis-decoding-emotet-part-1/</loc>
		<lastmod>2018-05-25T15:46:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/preempt-stakes-out-turf-as-supplier-of-continuous-adaptive-risk-and-trust-assessment-technology/</loc>
		<lastmod>2018-05-25T16:23:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/are-you-treating-non-eu-customers-like-second-class-citizens-or-is-it-gdprforall/</loc>
		<lastmod>2018-05-25T17:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mdr-and-its-significance-in-digital-transformation/</loc>
		<lastmod>2018-05-25T17:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/my-gdpr-inspired-rant-privacy-wtf/</loc>
		<lastmod>2018-05-25T17:41:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/dod-iasae-overview/</loc>
		<lastmod>2018-05-25T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-ceh-v10-update-what-you-need-to-know/</loc>
		<lastmod>2018-05-25T17:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsides-detroit-2018-johnny-xmas-yes-youre-an-impostor-now-get-back-to-work/</loc>
		<lastmod>2018-05-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-malware-attacks-making-the-news-avast/</loc>
		<lastmod>2018-05-25T18:34:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-and-human-behavior-shb-2018/</loc>
		<lastmod>2018-05-25T18:57:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/meet-infosec-institute-at-gartner-security-risk-management-summit-2018/</loc>
		<lastmod>2018-05-25T19:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr-is-not-just-about-customers-but-employees-too/</loc>
		<lastmod>2018-05-25T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-ready-are-you-for-gdpr-try-our-spot-the-mistakes-game-to-find-out-avast-business/</loc>
		<lastmod>2018-05-25T20:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/dod-8570-iam-certification-level-i/</loc>
		<lastmod>2018-05-25T20:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-international-association-of-privacy-professionals-cipp-us-certification/</loc>
		<lastmod>2018-05-25T20:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/memorial-day-plans/</loc>
		<lastmod>2018-05-25T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/closing-the-gender-gap-women-in-cybersecurity/</loc>
		<lastmod>2018-05-25T21:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cgeit-domain-5-resource-optimization/</loc>
		<lastmod>2018-05-25T21:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/incomplete-patch-another-joomla-core-xss-vulnerability-is-discovered/</loc>
		<lastmod>2018-05-25T21:40:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-fbi-makes-accidental-argument-for-why-we-should-all-be-on-blackberry-phones/</loc>
		<lastmod>2018-05-25T23:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mac-and-android-updates-26th-may-2018/</loc>
		<lastmod>2018-05-26T13:52:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/proofs/</loc>
		<lastmod>2018-05-26T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-is-your-location-data-no-longer-private/</loc>
		<lastmod>2018-05-26T16:18:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsides-detroit-2018-brian-martinez-grc-what-would-you-say-you-do-here/</loc>
		<lastmod>2018-05-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/avast-updates-privacy-policy-at-gdpr-launch-avast/</loc>
		<lastmod>2018-05-26T18:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/luke-kingma-lou-patrick-mackays-self-driving-crowd-sourced-tech-support/</loc>
		<lastmod>2018-05-26T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-power-of-standards-and-consistency/</loc>
		<lastmod>2018-05-27T04:32:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/3-reasons-why-you-might-consider-managed-siem/</loc>
		<lastmod>2018-05-27T13:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/decoration-day-the-origin-of-memorial-day/</loc>
		<lastmod>2018-05-27T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cisa-domain-1-the-process-of-auditing-information-systems/</loc>
		<lastmod>2018-05-27T16:16:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cisa-study-resources/</loc>
		<lastmod>2018-05-27T16:16:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/using-cloud-infrastructure-to-gain-privacy-and-anonymity/</loc>
		<lastmod>2018-05-27T16:16:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/android-penetration-tools-walkthrough-series-androbugs-framework/</loc>
		<lastmod>2018-05-27T17:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-ways-to-identify-a-spear-phishing-email/</loc>
		<lastmod>2018-05-27T17:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/iot-firmware-analysis-firmwalker/</loc>
		<lastmod>2018-05-27T17:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/10-things-employers-need-to-know-about-workplace-privacy-laws/</loc>
		<lastmod>2018-05-27T17:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/importance-of-ip-fragmentation-in-penetration-testing/</loc>
		<lastmod>2018-05-27T17:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/android-penetration-tools-walkthrough-series-qark/</loc>
		<lastmod>2018-05-27T17:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/10-most-common-phishing-attacks/</loc>
		<lastmod>2018-05-27T17:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsides-detroit-2018-matthew-claphams-protecting-phalanges-from-processor-pressure-points/</loc>
		<lastmod>2018-05-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/robert-m-lee-jeff-hasss-little-bobby-in-free-incidents/</loc>
		<lastmod>2018-05-27T21:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/giac-certifications-overview/</loc>
		<lastmod>2018-05-27T21:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/linux-certification-and-infosec-institutes-linux-related-training-and-courses/</loc>
		<lastmod>2018-05-27T21:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mobile-applications-security-problems-as-a-result-of-insufficient-attention-of-developers/</loc>
		<lastmod>2018-05-27T21:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/sscp-certification-overview-and-career-path/</loc>
		<lastmod>2018-05-27T21:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/a-brief-guide-to-gdpr-compliance/</loc>
		<lastmod>2018-05-27T21:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-security-awareness-tips-for-hipaa-compliance/</loc>
		<lastmod>2018-05-27T21:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/infosecurity-europe-preview-shifting-left-integrated-container-security-and-devsecops/</loc>
		<lastmod>2018-05-28T03:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-shared-security-podcast-weekly-blaze-real-time-location-tracking-vpnfilter-router-malware-apples-gdpr-updates/</loc>
		<lastmod>2018-05-28T04:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-you-need-to-know-about-samsam-ransomware-hackers-paint-target-on-healthcare/</loc>
		<lastmod>2018-05-28T07:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/memorial-day-2018/</loc>
		<lastmod>2018-05-28T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ssd-advisory-qradar-remote-command-execution/</loc>
		<lastmod>2018-05-28T11:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/affiliate-movie-streaming-scam-service/</loc>
		<lastmod>2018-05-28T13:55:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/whos-tracking-you-avast/</loc>
		<lastmod>2018-05-28T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/week-21-cyberattack-digest-2018-verge-cryptocurrency-manuel-delia-and-others/</loc>
		<lastmod>2018-05-28T14:35:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/collect-ntfs-forensic-information-with-osquery/</loc>
		<lastmod>2018-05-28T16:06:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsides-detroit-2018-lucas-gorczycas-nowhere-to-hide/</loc>
		<lastmod>2018-05-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fbi-kindly-reboot-your-router-now-please/</loc>
		<lastmod>2018-05-28T18:54:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/survey-27-percent-of-it-professionals-receive-more-than-1-million-security-alerts-daily/</loc>
		<lastmod>2018-05-28T19:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-gdpr/</loc>
		<lastmod>2018-05-28T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/arlington-national-cemetary-taps/</loc>
		<lastmod>2018-05-28T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/women-in-information-security-anna-westelius/</loc>
		<lastmod>2018-05-29T04:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/dont-be-gdpr-complacent-its-time-to-get-compliant/</loc>
		<lastmod>2018-05-29T06:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/harnessing-ai-to-combat-fraud-and-abuse-part-1-why-ai-is-the-key-to-robust-defenses/</loc>
		<lastmod>2018-05-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/machine-learning-might-just-save-your-business-from-a-breach/</loc>
		<lastmod>2018-05-29T07:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/shadow-it-and-the-cloud/</loc>
		<lastmod>2018-05-29T08:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/challenges-faced-while-training-an-ai-to-combat-abuse/</loc>
		<lastmod>2018-05-29T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-handle-mistakes-while-using-ai-to-block-attacks/</loc>
		<lastmod>2018-05-29T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mapping-the-threat-an-insight-into-data-breaches-across-europe/</loc>
		<lastmod>2018-05-29T09:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-is-a-target/</loc>
		<lastmod>2018-05-29T10:10:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-upgrade-my-acunetix-installation-to-acunetix-v12/</loc>
		<lastmod>2018-05-29T10:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-upgrade-a-multi-engine-installation-from-v11-to-v12/</loc>
		<lastmod>2018-05-29T10:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/whats-new-in-acunetix-v12/</loc>
		<lastmod>2018-05-29T10:10:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/acunetix-v12-more-comprehensive-more-accurate-and-now-2x-faster/</loc>
		<lastmod>2018-05-29T10:10:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/visit-us-at-cebit-2018/</loc>
		<lastmod>2018-05-29T10:10:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/preparing-for-artificial-intelligence-ai-ddos-attacks-part-2/</loc>
		<lastmod>2018-05-29T10:10:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/a-week-in-security-may-21-may-27/</loc>
		<lastmod>2018-05-29T10:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/weekly-cyber-risk-roundup-fbi-advises-home-router-resets/</loc>
		<lastmod>2018-05-29T10:35:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/manage-santa-within-osquery/</loc>
		<lastmod>2018-05-29T11:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/five-ways-imperva-attack-analytics-helps-you-cut-through-the-event-noise/</loc>
		<lastmod>2018-05-29T12:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bromium-partners-first-strategy-gains-momentum/</loc>
		<lastmod>2018-05-29T12:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/two-canadian-banks-contacted-by-fraudsters-about-potential-data-theft/</loc>
		<lastmod>2018-05-29T12:10:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-fix-is-in-finding-infix-functions-inside-contributed-r-package-utilities-files/</loc>
		<lastmod>2018-05-29T12:42:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-metropolitan-school-district-of-wayne-township-combats-ransomware-with-securityiq/</loc>
		<lastmod>2018-05-29T13:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qa-with-pat-cable-how-threat-stack-secures-evolving-infrastructure/</loc>
		<lastmod>2018-05-29T13:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bad-news-beemer-the-flaw-tales/</loc>
		<lastmod>2018-05-29T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-infosec-institute-alum-rexson-serrao-earned-the-worlds-highest-cgeit-score/</loc>
		<lastmod>2018-05-29T14:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/four-gemalto-women-recognized-as-crns-2018-women-of-the-channel/</loc>
		<lastmod>2018-05-29T15:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tips-from-gil-owens-on-how-to-pass-the-cissp-cat-exam-on-the-first-attempt/</loc>
		<lastmod>2018-05-29T15:46:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-services-bridge-gaps-caused-by-fragmented-network-environments/</loc>
		<lastmod>2018-05-29T16:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/will-the-real-jokers-stash-come-forward/</loc>
		<lastmod>2018-05-29T16:33:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/report-many-companies-taking-status-quo-approach-to-cyber-security-at-their-own-peril/</loc>
		<lastmod>2018-05-29T16:46:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-human-sensor-continuum/</loc>
		<lastmod>2018-05-29T16:50:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/a-deep-dive-on-aws-cloudformation-custom-resources-learn-how-to-implement-serverless-authentication-the-custom-way/</loc>
		<lastmod>2018-05-29T17:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fortimail-6-0-keeps-organizations-ahead-of-evolving-email-threats/</loc>
		<lastmod>2018-05-29T17:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsides-detroit-2018-nir-yoshas-know-the-enemy-how-to-make-threat-intelligence-work/</loc>
		<lastmod>2018-05-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-salesforce-admins-and-developers-can-restore-backed-up-metadata-in-3-easy-steps/</loc>
		<lastmod>2018-05-29T19:21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/new-guide-on-how-to-position-website-security-for-customers/</loc>
		<lastmod>2018-05-29T19:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/two-major-canadian-banks-hacked-and-blackmailed/</loc>
		<lastmod>2018-05-29T20:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/seo-poisoning-is-it-worth-it/</loc>
		<lastmod>2018-05-29T20:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/addressing-the-cybersecurity-talent-shortage-at-the-undergraduate-level/</loc>
		<lastmod>2018-05-29T20:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-military-veterans-make-good-cybersecurity-professionals/</loc>
		<lastmod>2018-05-29T20:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/minorities-in-cybersecurity-the-importance-of-a-diverse-security-workforce/</loc>
		<lastmod>2018-05-29T20:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/free-your-android-from-google-tracking-avast/</loc>
		<lastmod>2018-05-29T20:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-joy-of-tech-animal-translator/</loc>
		<lastmod>2018-05-29T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-things-to-do-for-encryption-enthusiasts-at-infosecurity-europe-2018/</loc>
		<lastmod>2018-05-29T22:06:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/secmon-state-of-the-union-refreshing-requirements/</loc>
		<lastmod>2018-05-29T22:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/will-gdpr-usher-in-a-new-paradigm-for-how-companies-treat-consumers-online-privacy/</loc>
		<lastmod>2018-05-29T23:41:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/enterprise-wordpress-security-behaviors-everyone-can-implement/</loc>
		<lastmod>2018-05-29T23:46:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gsma-mobile-360-series-focuses-on-privacy-security-avast/</loc>
		<lastmod>2018-05-30T00:22:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/android-trojan-allows-hackers-to-steal-8000-per-day-from-russian-banks/</loc>
		<lastmod>2018-05-30T03:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-state-of-ics-one-year-into-the-cyber-executive-order/</loc>
		<lastmod>2018-05-30T03:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/6-common-misconceptions-about-the-security-of-blockchain-technology-and-smart-contracts/</loc>
		<lastmod>2018-05-30T03:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-vpnfilter-a-powerful-botnet-of-more-than-500k-devices-ready-to-attack/</loc>
		<lastmod>2018-05-30T05:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr-provides-scammers-with-a-new-golden-opportunity/</loc>
		<lastmod>2018-05-30T05:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-dhs-cybersecurity-strategy-five-pillars-of-cybersecurity-goals/</loc>
		<lastmod>2018-05-30T07:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-unexpected-fallout-of-gdpr/</loc>
		<lastmod>2018-05-30T07:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qa-how-eventtracker-breathes-new-life-into-siems-by-co-managing-company-systems/</loc>
		<lastmod>2018-05-30T08:59:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/semafone-guides-contact-centers-through-changing-regulatory-compliance-landscape-2/</loc>
		<lastmod>2018-05-30T10:22:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/insurance-software-provider-exposed-clients-data-stored-on-s3-bucket/</loc>
		<lastmod>2018-05-30T11:34:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/attacks-against-machine-learning-an-overview/</loc>
		<lastmod>2018-05-30T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/jail-for-the-man-who-helped-russia-hack-yahoos-email-accounts/</loc>
		<lastmod>2018-05-30T13:01:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/eliminate-tradeoffs-between-innovation-and-data-security-with-protegrity-7-1/</loc>
		<lastmod>2018-05-30T13:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/malicious-ai/</loc>
		<lastmod>2018-05-30T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/infrastructure-in-transition-securing-containers/</loc>
		<lastmod>2018-05-30T14:06:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-must-have-ddos-protection-technologies/</loc>
		<lastmod>2018-05-30T14:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fortinet-expands-its-global-mssp-programs/</loc>
		<lastmod>2018-05-30T14:22:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/manage-your-fleets-firewalls-with-osquery/</loc>
		<lastmod>2018-05-30T15:06:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-sevillage-at-def-con-26/</loc>
		<lastmod>2018-05-30T15:36:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/optimizing-your-approach-to-securing-software-components/</loc>
		<lastmod>2018-05-30T15:46:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/android-penetration-tools-walkthrough-series-drozer/</loc>
		<lastmod>2018-05-30T15:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/secure-the-breach-with-gemalto-at-infosecurity-europe-2018/</loc>
		<lastmod>2018-05-30T16:19:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cissp-faqs-the-top-10/</loc>
		<lastmod>2018-05-30T16:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/finding-and-exploiting-xxe-xml-external-entities-injection/</loc>
		<lastmod>2018-05-30T16:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/os-secrets-exposed-extracting-extended-file-attributes-and-exploring-hidden-download-urls-with-the-xattrs-package/</loc>
		<lastmod>2018-05-30T17:19:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tailoring-youtube-for-your-requirements/</loc>
		<lastmod>2018-05-30T17:34:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/researchers-discover-vulnerabilities-in-smart-assistants-voice-commands/</loc>
		<lastmod>2018-05-30T17:46:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsides-detroit-2018-kent-grubers-hack-like-a-gopher/</loc>
		<lastmod>2018-05-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/serverless-security-what-are-we-up-against-our-session-at-serverless-days-tlv/</loc>
		<lastmod>2018-05-30T18:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/trojanized-android-firmware-how-to-check-android-apps-for-unencrypted-data/</loc>
		<lastmod>2018-05-30T19:10:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/major-los-angeles-government-agency-selects-whitehat-security-for-always-on-fully-managed-comprehensive-application-security-platform/</loc>
		<lastmod>2018-05-30T19:20:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-is-appmon/</loc>
		<lastmod>2018-05-30T19:34:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/user-and-entity-behavioral-analytics-ueba-overview/</loc>
		<lastmod>2018-05-30T19:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/virtual-machines-vs-containers/</loc>
		<lastmod>2018-05-30T19:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/setting-up-your-new-laptop-with-windows-10/</loc>
		<lastmod>2018-05-30T20:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/azure-active-directory-administrative-units/</loc>
		<lastmod>2018-05-30T20:08:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/10-tips-to-increase-iot-cameras-protection/</loc>
		<lastmod>2018-05-30T20:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-business-update/</loc>
		<lastmod>2018-05-30T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tripwire-patch-priority-index-for-may-2018/</loc>
		<lastmod>2018-05-30T21:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/new-paper-published-how-to-start-your-threat-detection-and-response-practice/</loc>
		<lastmod>2018-05-30T22:21:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-security-cbk-domains-information-and-updates/</loc>
		<lastmod>2018-05-30T23:34:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-ultimate-guide-to-comptias-security-certification/</loc>
		<lastmod>2018-05-30T23:34:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-data-protection-landscape-in-apac/</loc>
		<lastmod>2018-05-31T00:46:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/infosecurity-europe-2018-being-the-first-to-respond-in-the-digital-world/</loc>
		<lastmod>2018-05-31T03:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-criminals-are-leveraging-ssl-and-https/</loc>
		<lastmod>2018-05-31T04:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/data-center-and-attack-surface-visibility-top-concerns-in-cloud-computing-study-finds/</loc>
		<lastmod>2018-05-31T08:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/network-monitoring-is-dead-what-now-tls-quic-and-beyond/</loc>
		<lastmod>2018-05-31T10:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/channel-insider-interview-driving-partner-profitability-with-a-gemalto-partnership/</loc>
		<lastmod>2018-05-31T11:07:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/rewriting-history-a-brief-introduction-to-long-range-attacks/</loc>
		<lastmod>2018-05-31T11:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/dozens-of-vulnerabilities-found-under-hack-the-dts-bug-bounty-program/</loc>
		<lastmod>2018-05-31T11:34:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/multi-factor-authentication-more-secure-access-to-cloud-apps/</loc>
		<lastmod>2018-05-31T11:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cyber-security-skills-in-2018/</loc>
		<lastmod>2018-05-31T12:42:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ten-best-practices-for-outsmarting-ransomware/</loc>
		<lastmod>2018-05-31T13:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fireside-chat-with-halifax-health-protecting-patient-data-with-firewalls-and-ai/</loc>
		<lastmod>2018-05-31T13:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/google-apple-linkedin-amazon-facebook-under-eu-investigation-the-gdpr-chronicles/</loc>
		<lastmod>2018-05-31T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/it-is-finally-embracing-devsecops/</loc>
		<lastmod>2018-05-31T14:10:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-hybrid-cloud-habit-you-need-to-break/</loc>
		<lastmod>2018-05-31T14:53:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-emperors-new-clothes-threat-hunting-for-breach-prevention-is-not-working/</loc>
		<lastmod>2018-05-31T15:27:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mobile-smart-credential-supports-todays-most-popular-mobile-platforms/</loc>
		<lastmod>2018-05-31T15:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/instagram-story-spam-claims-free-apple-watch/</loc>
		<lastmod>2018-05-31T15:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fortinet-at-infosec-europe-2018/</loc>
		<lastmod>2018-05-31T16:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-questions-to-ask-about-your-pki-certificate-management/</loc>
		<lastmod>2018-05-31T16:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-need-for-healthcare-to-improve-cybersecurity/</loc>
		<lastmod>2018-05-31T16:52:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bens-book-of-the-month-review-of-zero-trust-networks-building-secure-systems-in-untrusted-networks/</loc>
		<lastmod>2018-05-31T16:53:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/a-conversation-with-america-geeks/</loc>
		<lastmod>2018-05-31T17:04:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-change-security-behaviors-identity-management/</loc>
		<lastmod>2018-05-31T17:14:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/big-time-crooks/</loc>
		<lastmod>2018-05-31T17:16:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/leveraging-imperva-solutions-for-gdpr-compliance-part-ii-pseudonymization/</loc>
		<lastmod>2018-05-31T17:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gdpr-trolls/</loc>
		<lastmod>2018-05-31T17:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsides-detroit-2018-ben-carrolls-taco_pirates-art-of-woo/</loc>
		<lastmod>2018-05-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/ios-update-11-4-security-details/</loc>
		<lastmod>2018-05-31T18:06:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/1834-the-first-cyberattack/</loc>
		<lastmod>2018-05-31T18:23:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/application-development-gdpr-compliance-guidance/</loc>
		<lastmod>2018-05-31T18:52:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-domain-2-technologies-tools/</loc>
		<lastmod>2018-05-31T18:53:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-domain-1-threats-attacks-and-vulnerabilities/</loc>
		<lastmod>2018-05-31T18:53:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/can-security-be-a-business-enabler/</loc>
		<lastmod>2018-05-31T18:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/smishing-with-punycode/</loc>
		<lastmod>2018-05-31T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/shell-logins-as-a-magento-reinfection-vector/</loc>
		<lastmod>2018-05-31T19:29:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/black-dot-of-death-locks-ios-messaging-app/</loc>
		<lastmod>2018-05-31T20:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-given-a-scenario-troubleshoot-common-security-issues/</loc>
		<lastmod>2018-05-31T20:17:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-installing-and-configuring-network-components-to-support-organizational-security/</loc>
		<lastmod>2018-05-31T20:17:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-domain-6-cryptography-and-pki/</loc>
		<lastmod>2018-05-31T20:17:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-domain-4-identity-and-access-management/</loc>
		<lastmod>2018-05-31T20:17:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cybersecurity-workforce-development-real-or-imagined-problem/</loc>
		<lastmod>2018-05-31T20:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-the-golden-age-of-cyber-espionage-is-upon-us/</loc>
		<lastmod>2018-05-31T20:41:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-joy-of-tech-so-solo/</loc>
		<lastmod>2018-05-31T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-first-ladys-bad-cyber-advice/</loc>
		<lastmod>2018-05-31T21:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/protecting-g-suite-team-drives-data-are-you-leading-or-failing/</loc>
		<lastmod>2018-05-31T21:17:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-installing-and-configuring-wireless-security-settings/</loc>
		<lastmod>2018-05-31T21:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-basic-characteristics-of-cryptography-algorithms/</loc>
		<lastmod>2018-05-31T21:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-implementing-identity-and-access-management-iam-controls/</loc>
		<lastmod>2018-05-31T21:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-implementing-secure-protocols/</loc>
		<lastmod>2018-05-31T21:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/security-implementing-public-key-infrastructure/</loc>
		<lastmod>2018-05-31T21:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/one-organizations-dilemma-adding-security-for-cloud-apps-with-less-user-disruption/</loc>
		<lastmod>2018-05-31T22:16:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/poisonous-pi-the-execution-of-a-raspberry-pi-hacking-workshop/</loc>
		<lastmod>2018-06-01T00:04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/lagging-legacy-systems-how-federal-agencies-are-tackling-old-it/</loc>
		<lastmod>2018-06-01T04:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/exam-pass-guarantee-training-promo-june-only/</loc>
		<lastmod>2018-06-01T06:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/do-breaches-drive-biometrics-investment/</loc>
		<lastmod>2018-06-01T08:16:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/devcentrals-featured-member-for-june-jie-gao/</loc>
		<lastmod>2018-06-01T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/icann-files-lawsuit-to-clarify-whois-data-collection-under-gdpr/</loc>
		<lastmod>2018-06-01T11:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/50-essential-cloud-security-blogs-for-it-professionals-and-cloud-enthusiasts/</loc>
		<lastmod>2018-06-01T13:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/breaking-randomness-in-the-ethereum-universe-part-1/</loc>
		<lastmod>2018-06-01T13:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/certified-ethical-hacker-job-outlook/</loc>
		<lastmod>2018-06-01T13:52:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/facebook-still-hosting-social-security-numbers-stolen-identities/</loc>
		<lastmod>2018-06-01T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/fortinet-showcases-advanced-security-solutions-at-the-2018-gartner-security-and-risk-management-summit/</loc>
		<lastmod>2018-06-01T14:04:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-avast-cleanup-boosts-your-phones-performance-avast-blog/</loc>
		<lastmod>2018-06-01T14:04:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/is-your-google-groups-leaking-data/</loc>
		<lastmod>2018-06-01T14:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/prepare-or-repair-pointers-for-both-sides-of-a-ransomware-attack/</loc>
		<lastmod>2018-06-01T14:36:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/senator-asks-are-all-doors-open-at-the-dod/</loc>
		<lastmod>2018-06-01T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/new-research-shows-75-of-open-redis-servers-infected/</loc>
		<lastmod>2018-06-01T15:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/routers-at-risk-canadian-chaos-and-a-hidden-cobra-avast/</loc>
		<lastmod>2018-06-01T15:16:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/blocks-for-flash-and-others-coming-to-office-365/</loc>
		<lastmod>2018-06-01T15:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/highlights-of-ai-village-defcon-china-2018/</loc>
		<lastmod>2018-06-01T16:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/monthly-blog-round-up-may-2018/</loc>
		<lastmod>2018-06-01T16:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-detroit-2018-michael-morgeses-saving-all-the-money-to-buy-all-the-booze-learning-to-hack-all-the-things-on-a-budget/</loc>
		<lastmod>2018-06-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-ios-failed-passcode-option-plus-security-update-11-4/</loc>
		<lastmod>2018-06-01T18:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/like-us-and-win-an-infosec-institute-boot-camp/</loc>
		<lastmod>2018-06-01T19:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/unveiling-tenables-new-technical-support-plan/</loc>
		<lastmod>2018-06-01T19:37:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/malware-hits-500k-iot-devices-talos-reports/</loc>
		<lastmod>2018-06-01T20:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/xkcd-selection-process/</loc>
		<lastmod>2018-06-01T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/friday-squid-blogging-do-cephalopods-contain-alien-dna/</loc>
		<lastmod>2018-06-01T21:24:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-future-of-nano-iot-security/</loc>
		<lastmod>2018-06-02T03:46:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/4-key-drivers-for-network-automation-gartners-market-guide-for-network-automation/</loc>
		<lastmod>2018-06-02T04:39:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tufin-takes-home-a-cyber-defense-magazine-infosec-award-for-most-innovative/</loc>
		<lastmod>2018-06-02T04:43:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-conference-2018-recap-takeaways-and-whats-next/</loc>
		<lastmod>2018-06-02T04:43:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-for-a-devops-world/</loc>
		<lastmod>2018-06-02T04:43:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tufin-launches-technology-alliance-partner-tap-program/</loc>
		<lastmod>2018-06-02T04:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-advanced-ai-aka-deep-learning-is-being-used-to-detect-malware-on-endpoints/</loc>
		<lastmod>2018-06-02T09:50:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/greg-ferensteins-the-birth-and-death-of-privacy/</loc>
		<lastmod>2018-06-02T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-detroit-2018-kevin-murphy-stefano-maccaglias-practical-incident-response-in-heterogenous-environment/</loc>
		<lastmod>2018-06-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-joy-of-tech-alien-ultimatum/</loc>
		<lastmod>2018-06-02T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-importance-of-using-siem-for-gdpr-compliance/</loc>
		<lastmod>2018-06-03T12:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cissp-official-study-guide-8th-edition-whats-new/</loc>
		<lastmod>2018-06-03T13:46:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/lurking-another-credit-reporting-agency-managed-by-equifax/</loc>
		<lastmod>2018-06-03T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-detroit-2018-steven-aiellos-security-kpis-measuring-improvement-in-your-security-program/</loc>
		<lastmod>2018-06-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/xkcd-the-xkcd-phone-2000/</loc>
		<lastmod>2018-06-03T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/hello-dorling-creating-dorling-cartograms-from-r-spatial-objects-introducing-prism-skeleton/</loc>
		<lastmod>2018-06-04T02:42:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-shared-security-podcast-weekly-blaze-telegram-messenger-in-russia-amazons-facial-recognition-technology-digital-license-plates/</loc>
		<lastmod>2018-06-04T04:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-gdpr-deadline-has-passed-now-what/</loc>
		<lastmod>2018-06-04T04:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-protect-your-organization-from-within/</loc>
		<lastmod>2018-06-04T04:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/looking-beyond-the-endpoint-its-time-to-quit-spending-on-ineffective-security-solutions/</loc>
		<lastmod>2018-06-04T06:01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-can-edr-tools-help-cisos-increase-security-budgets/</loc>
		<lastmod>2018-06-04T07:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cybersecurity-and-safety-of-ai-and-robots/</loc>
		<lastmod>2018-06-04T10:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/they-are-looking-at-what-service-provider-monitoring/</loc>
		<lastmod>2018-06-04T11:22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ovum-on-business-driven-security/</loc>
		<lastmod>2018-06-04T11:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/convergence-of-iot-and-access-control-technology/</loc>
		<lastmod>2018-06-04T13:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/fighting-malware-with-machine-learning-avast/</loc>
		<lastmod>2018-06-04T13:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/secmon-state-of-the-union-the-buying-process/</loc>
		<lastmod>2018-06-04T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/telegram-updated-amidst-kremlin-capers-apple-angst/</loc>
		<lastmod>2018-06-04T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/scammers-targeting-booking-com-users-with-phishing-messages/</loc>
		<lastmod>2018-06-04T14:10:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-is-the-gcfe/</loc>
		<lastmod>2018-06-04T14:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/week-22-cyberattack-digest-2018-bank-of-montreal-ticketfly-and-others/</loc>
		<lastmod>2018-06-04T14:55:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-l0pht-legacy/</loc>
		<lastmod>2018-06-04T15:10:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/infosec-institute-unveils-largest-role-based-security-awareness-training-library/</loc>
		<lastmod>2018-06-04T15:22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/mobile-menace-monday-a-race-to-hidden-ads/</loc>
		<lastmod>2018-06-04T16:22:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/continuing-professional-education-cpe-opportunities-requirements-by-certifying-body/</loc>
		<lastmod>2018-06-04T16:34:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/2018-vert-iot-hack-lab-training/</loc>
		<lastmod>2018-06-04T16:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/between-the-lines-takeaways-from-rsa-conference-2018-and-how-they-apply-to-the-future-of-enterprise-security/</loc>
		<lastmod>2018-06-04T16:46:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/biometrics-finally-gaining-widespread-acceptance/</loc>
		<lastmod>2018-06-04T17:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/android-spyware-now-dropping-legit-apps/</loc>
		<lastmod>2018-06-04T17:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/a-week-in-security-may-28-june-3/</loc>
		<lastmod>2018-06-04T17:46:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-stefano-maccaglias-chasing-the-adder-a-tale-from-the-apt-world/</loc>
		<lastmod>2018-06-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-prepare-your-aws-environment-in-advance-of-a-cyber-security-incident/</loc>
		<lastmod>2018-06-04T18:40:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-are-man-in-the-middle-attacks/</loc>
		<lastmod>2018-06-04T18:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/robert-m-lee-and-jeff-hass-little-bobby-in-its-classified/</loc>
		<lastmod>2018-06-04T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cross-site-scripting-attack-client-side-injection-attacks/</loc>
		<lastmod>2018-06-04T23:17:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/women-in-information-security-virginia-robbins/</loc>
		<lastmod>2018-06-05T03:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/rumms-malware-is-backwith-enhancements-2/</loc>
		<lastmod>2018-06-05T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-defend-against-insider-threats/</loc>
		<lastmod>2018-06-05T07:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/eldon-ensures-payments-compliance-with-semafone-and-blackstar-solutions/</loc>
		<lastmod>2018-06-05T07:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cryptocurrency-are-you-ready-for-next-big-hack/</loc>
		<lastmod>2018-06-05T07:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/adding-enhanced-shields-to-strengthen-the-last-front-encryption-and-patch-management/</loc>
		<lastmod>2018-06-05T07:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-secure-public-cloud-and-devops-get-unified-visibility/</loc>
		<lastmod>2018-06-05T07:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/untold-stories-of-the-noc-network-operations-center/</loc>
		<lastmod>2018-06-05T08:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/beat-the-odds-why-its-not-too-late-to-start-gdpr-compliance/</loc>
		<lastmod>2018-06-05T08:17:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-are-my-options-session-encryption-protocols-looking-forward/</loc>
		<lastmod>2018-06-05T10:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/why-the-world-needs-a-global-data-security-standard-an-open-call-2/</loc>
		<lastmod>2018-06-05T11:19:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/atlanta-ransomware-attack-wiped-out-years-of-police-dashcam-footage/</loc>
		<lastmod>2018-06-05T11:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/facebook-exposed-users-personal-data-in-data-sharing-partnership/</loc>
		<lastmod>2018-06-05T12:26:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/fbis-ic3-report-reconfirms-impact-of-phishing-on-consumers/</loc>
		<lastmod>2018-06-05T12:41:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/akamai-edge-security-intelligent-protection-coming-to-a-city-near-you/</loc>
		<lastmod>2018-06-05T12:42:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-develop-an-incident-response-plan-for-your-saas-business/</loc>
		<lastmod>2018-06-05T12:45:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/fortiweb-release-6-0-ai-based-machine-learning-for-advanced-threat-detection/</loc>
		<lastmod>2018-06-05T13:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/dread-the-pirate-approach/</loc>
		<lastmod>2018-06-05T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/it-managed-service-provider-chooses-cloudcare-for-security-platform-avast-business/</loc>
		<lastmod>2018-06-05T14:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/new-attack-vector-serverless-crypto-mining/</loc>
		<lastmod>2018-06-05T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/2018-snapshot-of-the-most-important-worldwide-cybersecurity-laws-regulations-directives-and-standards/</loc>
		<lastmod>2018-06-05T14:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/is-mexico-at-its-most-violent/</loc>
		<lastmod>2018-06-05T15:21:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-the-ca-veracode-verified-team-tier-looks-like/</loc>
		<lastmod>2018-06-05T16:05:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/scaling-network-security-rip-moat/</loc>
		<lastmod>2018-06-05T16:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/zero-to-account-takeover-how-i-impersonated-someone-else-using-auth0/</loc>
		<lastmod>2018-06-05T16:56:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/google-chrome-will-flag-all-remaining-http-pages-as-not-secure/</loc>
		<lastmod>2018-06-05T17:40:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-john-sonnenscheins-aww-ship-navigating-the-vulnerabilities-and-attack-surface-of-the-maritime-industry/</loc>
		<lastmod>2018-06-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/social-media-a-treasure-trove-of-spam-and-scams/</loc>
		<lastmod>2018-06-05T18:10:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/android-security-update-june-2018/</loc>
		<lastmod>2018-06-05T18:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-start-up-deploys-advanced-ai-aka-deep-learning-to-detect-malware-on-endpoints/</loc>
		<lastmod>2018-06-05T18:23:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/digital-transformation-and-security-transformation-need-to-walk-hand-in-hand/</loc>
		<lastmod>2018-06-05T19:16:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/social-engineer-newsletter-vol-08-issue-105/</loc>
		<lastmod>2018-06-05T19:45:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/researcher-finds-credentials-for-92-million-users-of-dna-testing-firm-myheritage/</loc>
		<lastmod>2018-06-05T19:50:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-bright-side-of-saas-backup/</loc>
		<lastmod>2018-06-05T20:26:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-apis-can-streamline-your-operations/</loc>
		<lastmod>2018-06-05T20:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/xkcd-clickbait-corrected-p-value/</loc>
		<lastmod>2018-06-05T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/clustering-app-attacks-with-machine-learning-part-1-a-walk-outside-the-lab/</loc>
		<lastmod>2018-06-05T21:20:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/strata-london-perfectly-timed-with-new-era-of-data-privacy/</loc>
		<lastmod>2018-06-05T22:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-zero-trust-model-provides-a-more-proactive-approach-to-security/</loc>
		<lastmod>2018-06-06T01:04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/can-vpns-really-be-trusted/</loc>
		<lastmod>2018-06-06T03:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/d-day-operation-overlord-june-6-1944/</loc>
		<lastmod>2018-06-06T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/managing-digital-security-as-risk-and-complexity-rise/</loc>
		<lastmod>2018-06-06T07:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/three-ways-devops-teams-can-step-up-github-security/</loc>
		<lastmod>2018-06-06T07:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tripwire-survey-energy-it-and-ot-pros-collaborating-more-effectively-on-ics-security/</loc>
		<lastmod>2018-06-06T09:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-forgotten-human-factor-driving-web-application-security-flaws/</loc>
		<lastmod>2018-06-06T09:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-shifting-maritime-threat-off-east-africa-yemen/</loc>
		<lastmod>2018-06-06T09:12:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/are-vpns-a-thing-of-the-past/</loc>
		<lastmod>2018-06-06T10:54:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/hr-software-provider-says-malware-infection-might-have-exposed-user-data/</loc>
		<lastmod>2018-06-06T11:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/why-customers-have-switched-from-rsa-securid-to-gemaltos-idaas/</loc>
		<lastmod>2018-06-06T13:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/group-fines-under-the-gdpr/</loc>
		<lastmod>2018-06-06T13:22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/new-threats-old-threats-a-deeper-look/</loc>
		<lastmod>2018-06-06T13:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/online-shoppers-and-bankers-rejoice-avast-secure-browser-is-here-avast/</loc>
		<lastmod>2018-06-06T13:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/maximum-privileged-account-protection-with-multi-factor-authentication/</loc>
		<lastmod>2018-06-06T13:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/australia-to-force-tech-companies-to-allow-government-access-to-encrypted-messages/</loc>
		<lastmod>2018-06-06T14:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ios-and-android-developments-and-all-those-apple-updates/</loc>
		<lastmod>2018-06-06T14:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/further-down-the-trello-rabbit-hole/</loc>
		<lastmod>2018-06-06T14:45:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/malicious-cryptocurrency-mining-the-shooting-star-in-the-cybercrime-domain/</loc>
		<lastmod>2018-06-06T15:16:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/u-k-msp-protects-and-manages-clients-networks-with-ng-firewall-and-command-center-2/</loc>
		<lastmod>2018-06-06T15:53:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/social-media-users-the-pitfalls-passwords-that-put-your-organization-at-risk/</loc>
		<lastmod>2018-06-06T16:04:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/last-watchdogs-coverage-of-cybersecurity-and-privacy-earns-4th-top-blog-award/</loc>
		<lastmod>2018-06-06T16:32:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/u-k-msp-protects-and-manages-clients-networks-with-ng-firewall-and-command-center/</loc>
		<lastmod>2018-06-06T16:41:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/psa-users-with-landlines-are-more-vulnerable-to-scams/</loc>
		<lastmod>2018-06-06T17:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/5-machine-identity-risks-youll-want-to-avoid/</loc>
		<lastmod>2018-06-06T18:11:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/zip-slip-critical-archive-extraction-vulnerability/</loc>
		<lastmod>2018-06-06T19:40:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/flash-to-be-stopped-in-office-365/</loc>
		<lastmod>2018-06-06T20:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/vpnfilter-malware-critical-update/</loc>
		<lastmod>2018-06-06T20:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/redeye-ransomware-theres-more-than-meets-the-eye/</loc>
		<lastmod>2018-06-06T22:37:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/giac-penetration-tester-gpen-certification/</loc>
		<lastmod>2018-06-06T23:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-international-association-of-privacy-professionals-cipm-certification/</loc>
		<lastmod>2018-06-06T23:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-international-association-of-privacy-professionals-cipp-e-certification/</loc>
		<lastmod>2018-06-06T23:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/dod-looks-to-the-cloud-for-browser-security/</loc>
		<lastmod>2018-06-07T00:12:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-value-of-capture-the-flag-competitions/</loc>
		<lastmod>2018-06-07T03:47:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/is-it-cheaper-to-pay-for-cybersecurity-now-or-to-pay-ransom-to-criminals-later/</loc>
		<lastmod>2018-06-07T08:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/making-sense-of-tomorrows-cybersecurity-trends/</loc>
		<lastmod>2018-06-07T10:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/an-example-of-deterrence-in-cyberspace/</loc>
		<lastmod>2018-06-07T10:56:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/three-rhode-island-state-agencies-affected-by-malware-attack/</loc>
		<lastmod>2018-06-07T11:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/subscription-auto-renewal-program-new-options-to-save-you-time/</loc>
		<lastmod>2018-06-07T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/capgemini-to-acquire-leidos-cyber-the-commercial-cybersecurity-division-of-leidos/</loc>
		<lastmod>2018-06-07T13:45:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/six-years-since-world-ipv6-launch-entering-the-majority-phases/</loc>
		<lastmod>2018-06-07T13:48:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/facebookery-huawei-other-chinese-manufacturers-slurp-facebook-data/</loc>
		<lastmod>2018-06-07T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/8-questions-to-ask-in-ddos-protection/</loc>
		<lastmod>2018-06-07T14:16:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/is-cryptojacking-replacing-ransomware-as-the-next-big-threat/</loc>
		<lastmod>2018-06-07T14:16:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/australias-commonwealth-bank-leaks-data-of-10000-customers-over-domain-misspelling/</loc>
		<lastmod>2018-06-07T14:31:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bug-bounty-payouts-double-in-2018-india-reports-the-most-bugs-while-u-s-wins-highest-payouts/</loc>
		<lastmod>2018-06-07T14:32:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/why-are-software-updates-important/</loc>
		<lastmod>2018-06-07T15:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/with-passwords-here-to-stay-a-zero-trust-approach-to-authentication-makes-eminent-sense/</loc>
		<lastmod>2018-06-07T15:18:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/yep-i-suggested-monica/</loc>
		<lastmod>2018-06-07T16:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/data-brokers-you-are-being-packaged-and-sold/</loc>
		<lastmod>2018-06-07T16:20:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/adobe-patches-zero-day-flash-flaw/</loc>
		<lastmod>2018-06-07T16:37:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/introducing-gaum-an-open-source-o-rm-that-isnt-an-o-rm/</loc>
		<lastmod>2018-06-07T17:16:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/non-russian-matryoshka-russian-service-centers-under-attack/</loc>
		<lastmod>2018-06-07T17:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/whatsapp-users-targeted-by-homoglyph-attack-peddling-free-tickets-to-theme-park/</loc>
		<lastmod>2018-06-07T17:52:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-tim-medin-and-derek-banks-hacking-dumberly-just-like-the-bad-guys/</loc>
		<lastmod>2018-06-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-top-6-pci-compliance-myths/</loc>
		<lastmod>2018-06-07T18:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-cspi-helped-broward-college-get-out-of-the-it-business/</loc>
		<lastmod>2018-06-07T19:04:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/top-five-securityiq-phishing-templates-may-edition/</loc>
		<lastmod>2018-06-07T20:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/luke-kingma-lou-patrick-mackays-the-wash/</loc>
		<lastmod>2018-06-07T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/certified-ethical-hacker-ceh-study-resources/</loc>
		<lastmod>2018-06-07T21:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/making-world-tile-grid-grids/</loc>
		<lastmod>2018-06-07T22:01:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/encryption-backdoor-debate-why-would-the-fbi-exaggerate-the-number-of-criminal-devices/</loc>
		<lastmod>2018-06-07T22:11:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/adobe-flash-player-has-another-critical-zero-day-vulnerability/</loc>
		<lastmod>2018-06-07T22:54:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/travel-site-phishing-scam-and-genealogy-site-data-breach-avast/</loc>
		<lastmod>2018-06-08T08:16:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/emergence-of-the-internet-of-things-and-other-issues-are-raising-concerns-about-the-security-of-wi-fi-networks/</loc>
		<lastmod>2018-06-08T08:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/booking-com-partners-customers-hit-by-phishing-scam/</loc>
		<lastmod>2018-06-08T09:48:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/malware-analysis-decoding-emotet-part-2/</loc>
		<lastmod>2018-06-08T11:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/querycon-2018-our-talks-and-takeaways/</loc>
		<lastmod>2018-06-08T11:50:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/apples-privacy-ambivalence/</loc>
		<lastmod>2018-06-08T12:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/facebook-says-bug-automatically-suggested-public-visibility-for-new-user-posts/</loc>
		<lastmod>2018-06-08T12:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/hr-software-pageup-breached-faces-class-action-in-australia/</loc>
		<lastmod>2018-06-08T12:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-develop-an-incident-response-checklist-for-your-saas-business/</loc>
		<lastmod>2018-06-08T13:17:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/is-it-a-phish-office-365-edition/</loc>
		<lastmod>2018-06-08T13:42:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/27-million-ticketfly-accounts-compromised-in-data-breach/</loc>
		<lastmod>2018-06-08T13:51:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/drone-forensics-the-path-of-nist/</loc>
		<lastmod>2018-06-08T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/14-million-facebook-users-notified-of-bug-turning-status-posts-public/</loc>
		<lastmod>2018-06-08T14:05:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/could-5g-mutate-the-threat-landscape/</loc>
		<lastmod>2018-06-08T14:16:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/us-lawmakers-propose-hack-back-law-to-allow-cyber-retaliation-without-permission-of-third-party-country/</loc>
		<lastmod>2018-06-08T14:49:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/patch-your-flash-player-now-zero-day-actively-exploited-in-the-wild/</loc>
		<lastmod>2018-06-08T15:12:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/critical-cisco-secure-access-control-system-acs-vulnerability/</loc>
		<lastmod>2018-06-08T16:14:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-greatest-cybersecurity-threats-are-inside-your-own-walls/</loc>
		<lastmod>2018-06-08T16:40:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/maximizing-the-bang-for-your-security-training-buck/</loc>
		<lastmod>2018-06-08T17:25:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-dan-mcinerneys-automahack-python-toolchain-for-automated-domain-admin/</loc>
		<lastmod>2018-06-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tips-for-safe-summer-travels-your-cybersecurity-checklist/</loc>
		<lastmod>2018-06-08T18:52:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/defining-the-4-cs-of-the-modern-mssp/</loc>
		<lastmod>2018-06-08T20:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-joy-of-tech-dark-mode/</loc>
		<lastmod>2018-06-08T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/vigilanteed/</loc>
		<lastmod>2018-06-09T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-joe-grays-dear-blue-team-proactive-steps-to-supercharge-your-ir/</loc>
		<lastmod>2018-06-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/luke-kingma-lou-patrick-mackays-gdpr/</loc>
		<lastmod>2018-06-09T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/securityeverafter-2018-06-02-202100/</loc>
		<lastmod>2018-06-09T23:57:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-systems-keep-you-effective/</loc>
		<lastmod>2018-06-10T00:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/facebookery-the-fourteen-million/</loc>
		<lastmod>2018-06-10T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-amanda-berlins-youll-understand-when-youre-older/</loc>
		<lastmod>2018-06-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/robert-m-lee-and-jeff-hass-little-bobby-in-paid-award/</loc>
		<lastmod>2018-06-10T22:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-foundational-controls-can-be-used-to-help-fight-back-against-digital-security-challenges/</loc>
		<lastmod>2018-06-11T03:16:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/mapping-the-attck-framework-to-cis-controls/</loc>
		<lastmod>2018-06-11T03:16:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-shared-security-weekly-blaze-myheritage-data-breach-facebooks-data-sharing-partnership-apple-ios-12-and-macos-updates/</loc>
		<lastmod>2018-06-11T04:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cisos-have-an-opportunity-to-shine-as-regulations-enforce-change-gartner-says/</loc>
		<lastmod>2018-06-11T07:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tcg4331/</loc>
		<lastmod>2018-06-11T07:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/infosec2018-from-live-hack-fails-to-password-managers-and-combating-the-rise-of-ransomware/</loc>
		<lastmod>2018-06-11T09:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/south-korean-cryptocurrency-exchange-coinrail-confirms-hacking-attempt/</loc>
		<lastmod>2018-06-11T11:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/should-you-still-prioritize-exploit-kit-vulnerabilities/</loc>
		<lastmod>2018-06-11T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/terror-attacks-demonstrate-that-militants-remain-a-credible-threat-in-indonesia/</loc>
		<lastmod>2018-06-11T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/myheritage-breach-leaks-92-million-emails-hashed-passwords/</loc>
		<lastmod>2018-06-11T13:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-and-identity-management-in-the-gaming-industry/</loc>
		<lastmod>2018-06-11T13:30:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/fabric-ready-partner-spotlight-qa-cspi/</loc>
		<lastmod>2018-06-11T13:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/eff-releases-new-privacybadger-now-at-version-2018-5-10/</loc>
		<lastmod>2018-06-11T14:00:00+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->