<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2020/07/cybersecurity-market-expected-to-grow-by-2-5-in-worst-case-scenario/</loc>
		<lastmod>2020-07-24T10:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/update-on-nists-post-quantum-cryptography-program/</loc>
		<lastmod>2020-07-24T11:36:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/using-ai-ethics-for-good-avast/</loc>
		<lastmod>2020-07-24T11:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/a-comprehensive-checklist-for-privacy-savvy-parents/</loc>
		<lastmod>2020-07-24T11:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-twitter-attack-says-on-human-nature-social-engineering/</loc>
		<lastmod>2020-07-24T12:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/garmin-systems-knocked-offline-early-reports-suggest-targeted-cyber-attack/</loc>
		<lastmod>2020-07-24T12:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/automating-attampck-testing-with-soar-and-atomic-red-team/</loc>
		<lastmod>2020-07-24T12:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/automating-attampck-testing-with-soar-and-atomic-red-team-2/</loc>
		<lastmod>2020-07-24T12:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-zero-trust-reflects-todays-challenges/</loc>
		<lastmod>2020-07-24T12:46:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/on-the-road-to-devsecops-securing-the-software-driving-mobility/</loc>
		<lastmod>2020-07-24T13:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bimi-for-gmail-google-makes-email-identity-indicators-part-of-its-new-security-updates/</loc>
		<lastmod>2020-07-24T13:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/a-third-of-internet-users-are-actively-targeted-by-covid-19-fraud/</loc>
		<lastmod>2020-07-24T13:57:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/uk-national-cyber-security-centre-warns-sports-organizations-of-ransomware-and-bec-attacks/</loc>
		<lastmod>2020-07-24T14:06:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/managing-security-compliance-for-remote-work/</loc>
		<lastmod>2020-07-27T07:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto32934910.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32934910]]></image:title>
			<image:caption><![CDATA[remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/manage-your-vendors-efficiently-top-features-for-remote-access-software/</loc>
		<lastmod>2020-07-24T15:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/application-risk-is-1-7x-higher-for-organizations-that-fail-to-manage-security-debt/</loc>
		<lastmod>2020-07-24T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-kavya-pearlmans-virtual-reality-brings-real-risks-are-we-ready/</loc>
		<lastmod>2020-07-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/privacy-settings-for-amazon-echo-and-google-home/</loc>
		<lastmod>2020-07-24T16:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/david-vs-goliath-are-16000-banks-insecure/</loc>
		<lastmod>2020-07-24T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-joy-of-tech-apples-secret-periscope-lens/</loc>
		<lastmod>2020-07-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/webinars-developing-track-and-trace-apps-integrating-sast-into-devsecops/</loc>
		<lastmod>2020-07-24T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/garmin-users-furious-as-ransomware-freezes-firm/</loc>
		<lastmod>2020-07-24T17:42:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/cyclist-mabel-amber-pixabay.jpg</image:loc>
			<image:title><![CDATA[cyclist--mabel-amber--pixabay]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/week-six-featuring-research-from-forrester-are-these-industries-undermining-their-security-posture/</loc>
		<lastmod>2020-07-24T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/two-chinese-hackers-accused-of-targeting-covid-19-research-avast/</loc>
		<lastmod>2020-07-24T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/routers-are-full-of-vulnerabilities-but-what-if-isps-could-fix-that/</loc>
		<lastmod>2020-07-24T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-nicolas-papernots-what-does-it-mean-for-machine-learning-to-be-trustworthy/</loc>
		<lastmod>2020-07-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-panel-justin-schuhs-tanvi-vyas-yan-zhus-eric-lawrences-and-dr-lea-kissners-moderator-browser-privacy-opportunities-and-tradeoffs/</loc>
		<lastmod>2020-07-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/transcription-virsec-featured-on-techstrong-tv/</loc>
		<lastmod>2020-07-24T18:56:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-think-about-gdpr-as-a-security-vendor/</loc>
		<lastmod>2020-07-24T21:09:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/aligning-the-dots-on-covid-prison-waffles/</loc>
		<lastmod>2020-07-24T21:25:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/thinking-of-a-cybersecurity-career-read-this/</loc>
		<lastmod>2020-07-24T22:20:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/archeologists-reveal-enigma-sloppy-cryptography/</loc>
		<lastmod>2020-07-25T00:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/getting-to-the-next-normal-in-government-technology/</loc>
		<lastmod>2020-07-25T03:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/managing-certificate-lifecycles-for-container-based-implementations/</loc>
		<lastmod>2020-07-25T09:12:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-sadia-afrozs-how-to-build-realistic-machine-learning-systems-for-security/</loc>
		<lastmod>2020-07-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/robert-m-lees-jeff-haas-little-bobby-comics-week-94-via-the-archive/</loc>
		<lastmod>2020-07-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-annalisa-nash-fernandezs-data-as-a-social-science-cultural-elements-in-privacy-and-security/</loc>
		<lastmod>2020-07-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-ransomware-tsunami-continues-slamming-healthcare-banks/</loc>
		<lastmod>2020-07-25T21:11:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/analyzing-an-instance-of-meterpreters-shellcode/</loc>
		<lastmod>2020-07-26T01:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/dynamic-swagger-support-comes-to-imperva/</loc>
		<lastmod>2020-07-26T05:26:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/weekly-news-roundup-july-19-24-2020/</loc>
		<lastmod>2020-07-26T06:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/insider-threat-the-biggest-contributor-to-cyber-attacks/</loc>
		<lastmod>2020-07-26T08:08:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-l-jean-camps-all-security-is-goods-design-guidance-for-economics/</loc>
		<lastmod>2020-07-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-asterisk-corrections/</loc>
		<lastmod>2020-07-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-steven-buccinis-platform-data-privacy-security-strategies-for-public-interest-research/</loc>
		<lastmod>2020-07-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/is-a-new-quantum-internet-coming/</loc>
		<lastmod>2020-07-26T18:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/a-better-than-remote-chance-more-people-work-from-home-in-post-covid-world/</loc>
		<lastmod>2020-07-27T03:44:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/chinese-hacking-campaign-exposed-badpower-fast-charger-attack-instacart-data-leak/</loc>
		<lastmod>2020-07-27T04:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/this-day-in-history-1947-u-s-national-security-act/</loc>
		<lastmod>2020-07-27T04:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/google-chrome-aims-to-keep-its-edge-over-other-browsers-with-its-latest-privacy-and-security-features/</loc>
		<lastmod>2020-07-27T04:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/staying-up-to-date-with-todays-evolving-cyber-threat-landscape/</loc>
		<lastmod>2020-07-27T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/security-alerts-double-and-security-teams-cant-get-to-them-all/</loc>
		<lastmod>2020-07-27T07:26:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/back-to-wfh-lessons-learned-to-improve-security/</loc>
		<lastmod>2020-07-28T06:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/workfromhome.jpg</image:loc>
			<image:title><![CDATA[workfromhome]]></image:title>
			<image:caption><![CDATA[WFH security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cash-advance-service-dave-com-reports-data-breach/</loc>
		<lastmod>2020-07-27T11:20:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/acunetix-exhibiting-at-black-hat-usa-2020/</loc>
		<lastmod>2020-07-27T11:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mcafee-mvision-cloud-becomes-first-casb-to-map-cloud-threats-to-mitre-attck/</loc>
		<lastmod>2020-07-27T12:36:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bitglass-security-spotlight-over-200k-instacart-users-data-is-being-sold-on-dark-web/</loc>
		<lastmod>2020-07-27T12:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/addressing-the-security-of-in-memory-computing/</loc>
		<lastmod>2020-07-28T07:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/in-memory-computing.jpg</image:loc>
			<image:title><![CDATA[in-memory computing]]></image:title>
			<image:caption><![CDATA[in-memory computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/forcepoint-launches-suite-to-reduce-remote-access-security-costs/</loc>
		<lastmod>2020-07-27T13:30:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cybersecurity-Challenges.jpg</image:loc>
			<image:caption><![CDATA[Styra]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/Forcepoint.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-importance-of-nonverbals-in-a-masked-world/</loc>
		<lastmod>2020-07-27T13:36:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/revil-ransomware-gang-claims-spanish-state-owned-railway-infrastructure-manager-as-new-victim/</loc>
		<lastmod>2020-07-27T13:39:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/hacknos-player-1-1-ctf-walkthrough/</loc>
		<lastmod>2020-07-27T13:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/coronavirus-predictions-what-are-the-long-term-workplace-implications-of-covid-19/</loc>
		<lastmod>2020-07-27T13:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/over-1000-twitter-staff-and-contractors-had-access-to-internal-tools-that-helped-hackers-hijack-accounts/</loc>
		<lastmod>2020-07-27T14:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/poor-privacy-practices-sharply-boost-likelihood-of-a-data-breach-study-shows/</loc>
		<lastmod>2020-07-27T14:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cisa-nsa-lay-out-recommendations-for-protecting-ot-assets/</loc>
		<lastmod>2020-07-27T14:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-is-the-cybersecurity-maturity-model-certification-2/</loc>
		<lastmod>2020-07-27T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/digicert-helps-drive-5g-network-transformation-with-new-iot-device-manager-features/</loc>
		<lastmod>2020-07-27T15:04:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-matt-bishops-how-anonymous-is-my-anonymized-data/</loc>
		<lastmod>2020-07-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/robert-m-lees-jeff-haas-little-bobby-comics-week-287/</loc>
		<lastmod>2020-07-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/modern-siem-mysteries/</loc>
		<lastmod>2020-07-27T17:23:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/major-vulnerability-in-windows-dns-servers-responding-to-cve-2020-1350-sigred/</loc>
		<lastmod>2020-07-27T17:23:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/my-take-even-google-ceo-sundar-pichai-agrees-that-it-is-imperative-to-embed-ethics-into-ai/</loc>
		<lastmod>2020-07-27T17:26:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/secure-sdlc-101/</loc>
		<lastmod>2020-07-27T17:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-hide-wordpress-admin-bar/</loc>
		<lastmod>2020-07-27T17:50:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-pivoting-in-a-crisis-may-actually-energize-secure-devops/</loc>
		<lastmod>2020-07-27T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-dr-lea-kissners-stop-failing-start-building-for-humanity/</loc>
		<lastmod>2020-07-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/hack-of-payday-lender-dave-all-7-5m-users-breached/</loc>
		<lastmod>2020-07-27T18:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/dollars-nikolay-frolochkin-pixabay.jpg</image:loc>
			<image:title><![CDATA[dollars--nikolay-frolochkin--pixabay]]></image:title>
			<image:caption><![CDATA[Dave breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/prcs-dji-drone-android-app-stealing-sensitive-information-storing-data-on-mainland-china-servers/</loc>
		<lastmod>2020-07-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/powerful-complete-protection-for-small-businesses-avast/</loc>
		<lastmod>2020-07-27T19:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/zero-trust-security-model-what-you-need-to-know/</loc>
		<lastmod>2020-07-27T20:17:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/visual-learner-look-no-further/</loc>
		<lastmod>2020-07-28T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/reverse-string-woocommerce-wordpress-credit-card-swiper/</loc>
		<lastmod>2020-07-27T20:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/3-templates-for-a-comprehensive-cybersecurity-risk-assessment/</loc>
		<lastmod>2020-07-27T20:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/doing-cloud-in-china/</loc>
		<lastmod>2020-07-27T21:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/business-id-theft-soars-amid-covid-closures/</loc>
		<lastmod>2020-07-27T22:50:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-use-applocker-in-windows-10/</loc>
		<lastmod>2020-07-28T00:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/wearedelphix-meet-mindy-parker/</loc>
		<lastmod>2020-07-28T02:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/using-good-cyber-practices-to-frame-your-personal-cyber-narrative/</loc>
		<lastmod>2020-07-28T06:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bridging-the-cybersecurity-skills-gap-as-cyber-risk-increases/</loc>
		<lastmod>2020-07-28T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/5-assumptions-on-how-data-centers-of-the-future-will-probably-look-like/</loc>
		<lastmod>2020-07-28T08:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/deep-dive-how-much-time-do-security-teams-spend-labeling-with-supervised-learning/</loc>
		<lastmod>2020-07-28T09:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/survey-whats-the-top-security-stressor-lack-of-support/</loc>
		<lastmod>2020-07-29T06:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/heavy-load.jpg</image:loc>
			<image:title><![CDATA[heavy load]]></image:title>
			<image:caption><![CDATA[security stressor]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/meeting-consumer-needs-through-product-evolution-avast/</loc>
		<lastmod>2020-07-28T10:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/product-update-hybrid-learning-attendance-with-google-meet/</loc>
		<lastmod>2020-07-28T11:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/all-you-need-to-know-about-hipaa-requirements/</loc>
		<lastmod>2020-07-29T07:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Compliant-With-NIST.jpg</image:loc>
			<image:title><![CDATA[Compliant-With-NIST]]></image:title>
			<image:caption><![CDATA[HIPAA]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/promo-com-announces-data-breach-after-22-million-user-records-are-published-online/</loc>
		<lastmod>2020-07-28T11:35:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/survey-of-supply-chain-attacks/</loc>
		<lastmod>2020-07-28T11:40:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bitdefender-accounts-for-12-of-the-632-million-stopped-by-no-more-ransom-in-four-years/</loc>
		<lastmod>2020-07-28T11:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/study-links-cybersecurity-directly-to-employee-stress-and-exhaustion/</loc>
		<lastmod>2020-07-28T11:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cisos-who-close-critical-skills-gaps-stand-the-best-chance-of-minimizing-the-impact-of-cyberattacks/</loc>
		<lastmod>2020-07-28T11:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/phishers-using-fake-sharepoint-messages-to-target-office-365-details/</loc>
		<lastmod>2020-07-28T11:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-eu-gdpr-fines-tell-us-about-privacy-management/</loc>
		<lastmod>2020-07-28T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/from-the-ashes-of-disruption-emerges-innovation-and-new-ways-to-work/</loc>
		<lastmod>2020-07-28T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/reimagining-the-soc-for-the-future-of-work/</loc>
		<lastmod>2020-07-28T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/rangeforce-raises-16-million-to-help-enterprises-build-highly-skilled-cybersecurity-teams/</loc>
		<lastmod>2020-07-28T12:44:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/is-age-a-factor-in-how-you-view-the-security-of-your-data/</loc>
		<lastmod>2020-07-28T12:51:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/introduction-to-sql-examples-best-practices-and-pitfalls/</loc>
		<lastmod>2020-07-28T12:51:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bank-of-ireland-fined-e1-66-million-after-being-tricked-by-fraudster/</loc>
		<lastmod>2020-07-28T13:15:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/setting-the-foundation-for-a-cyber-resilient-future-qa-with-peter-schawacker-of-blinktag-solutions/</loc>
		<lastmod>2020-07-28T13:20:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/breaking-down-serverless-anti-patterns/</loc>
		<lastmod>2020-07-28T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/work-from-home-was-the-sprint-now-comes-the-security-marathon/</loc>
		<lastmod>2020-07-28T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/untangle-extends-partnership-with-bitdefender-to-facilitate-endpoint-management/</loc>
		<lastmod>2020-07-28T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/a-focus-on-teaching-non-technical-beginners-about-wordpress/</loc>
		<lastmod>2020-07-28T15:04:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/centrify-empowers-devsecops-with-a-new-approach-to-identity-and-access-management-for-applications-and-services/</loc>
		<lastmod>2020-07-28T15:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/diy-hunting-azure-shadow-admins-like-never-before/</loc>
		<lastmod>2020-07-28T15:14:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-false-claims-act-and-cybersecurity-are-third-party-vendors-putting-you-at-risk/</loc>
		<lastmod>2020-07-28T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-apps-stealing-company-secrets-smart-device-privacy-concerns-for-businesses/</loc>
		<lastmod>2020-07-28T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/sql-injection-vulnerabilities/</loc>
		<lastmod>2020-07-28T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/data-security-in-windows-10/</loc>
		<lastmod>2020-07-28T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-dr-engin-bozdags-privacy-at-speed-privacy-by-design-for-agile-development-at-uber/</loc>
		<lastmod>2020-07-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-im-hanging-out-with-the-semperis-crew/</loc>
		<lastmod>2020-07-28T16:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/large-complex-ddos-attacks-on-the-rise-in-2020/</loc>
		<lastmod>2020-07-28T16:38:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-blurring-line-between-privileged-and-non-privileged-users/</loc>
		<lastmod>2020-07-28T16:42:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/codesonar-helps-stoneridge-achieve-safety-and-security/</loc>
		<lastmod>2020-07-28T16:54:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-is-the-cybersecurity-maturity-model-certification-cmmc/</loc>
		<lastmod>2020-07-28T16:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-better-navigate-the-world-of-devsecops-with-sonatype-and-saltworks-security/</loc>
		<lastmod>2020-07-28T16:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/european-court-of-justice-at-an-impasse-over-data-privacy-with-us-law/</loc>
		<lastmod>2020-07-28T16:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/making-infosec-jobs-easier-keeping-systems-patched/</loc>
		<lastmod>2020-07-28T16:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-joy-of-tech-a-message-from-vladimir/</loc>
		<lastmod>2020-07-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cybellum-closes-12m-in-series-a-funding-to-redefine-automotive-cybersecurity-risk-assessment-english/</loc>
		<lastmod>2020-07-28T17:08:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/newsbites-drilldown-for-the-week-ending-24-july-2020/</loc>
		<lastmod>2020-07-28T17:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mitigating-nosql-injection-attacks-part-1/</loc>
		<lastmod>2020-07-28T17:52:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ensure-dlp-protection-and-visibility-for-remote-workers/</loc>
		<lastmod>2020-07-28T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-andrs-arrietas-the-browser-privacy-arms-race-which-browsers-actually-protect-your-privacy/</loc>
		<lastmod>2020-07-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/our-most-anticipated-feature-1-click-cleanups/</loc>
		<lastmod>2020-07-28T18:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/a-guide-to-telecommuting-adjusting-to-the-new-era-of-remote-working/</loc>
		<lastmod>2020-07-28T18:23:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/tale-of-the-tape-top-5-reasons-phishing-attacks-havent-dried-up/</loc>
		<lastmod>2020-07-28T18:45:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-fuzzing-files-the-anatomy-of-a-heartbleed-3/</loc>
		<lastmod>2020-07-28T19:53:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-fuzzing-files-the-anatomy-of-a-heartbleed/</loc>
		<lastmod>2020-07-28T20:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/sonrai-security-adds-governance-engine-to-tool-based-on-graph/</loc>
		<lastmod>2020-07-28T20:35:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Insurance-Loophole-Threat.jpg</image:loc>
			<image:title><![CDATA[Insurance-Loophole-Threat]]></image:title>
			<image:caption><![CDATA[Sonrai]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/sonrai-example-graph-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/zeek-in-its-sweet-spot-detecting-f5s-big-ip-cve10-cve-2020-5902/</loc>
		<lastmod>2020-07-28T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/is-a-new-quantum-internet-coming-the-latest-doe-efforts/</loc>
		<lastmod>2020-07-28T21:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/win-at-digital-business-transformation-by-mastering-data-operations/</loc>
		<lastmod>2020-07-28T21:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-use-disk-quotas-in-windows-10/</loc>
		<lastmod>2020-07-28T21:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/achieving-psd2s-strong-customer-authentication-with-behavioral-biometrics/</loc>
		<lastmod>2020-07-28T22:15:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/securing-medical-and-hospital-devices-on-ge-healthcares-carescape-network/</loc>
		<lastmod>2020-07-29T01:09:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/a-ciso-summary-on-nsa-cisa-alert-aa20-205a-understanding-and-meeting-actions-to-secure-ot-and-infrastructure/</loc>
		<lastmod>2020-07-29T01:10:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/athlete-recruiting-software-company-discloses-data-breach-7-months-after-student-athlete-data-is-exposed/</loc>
		<lastmod>2020-07-29T05:49:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/prioritize-cybersecurity-awareness-in-reopening-plans/</loc>
		<lastmod>2020-07-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-cloud-mitigation-techniques-can-help-prevent-ransomware-and-phishing-attacks/</loc>
		<lastmod>2020-07-29T07:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/enhancing-customer-experience-in-airlines-with-loginradius/</loc>
		<lastmod>2020-07-29T09:02:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/introducing-pci-pals-summer-school-programme-offering-customer-service-professionals-a-helpful-boost-with-data-security-and-compliance-knowledge/</loc>
		<lastmod>2020-07-29T10:46:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-emotet-remains-an-active-threat-avast/</loc>
		<lastmod>2020-07-29T11:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/enterprises-see-rise-in-data-breach-costs-shift-in-security-spending-focus/</loc>
		<lastmod>2020-07-29T11:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/pci-compliance-how-to-automatically-redact-credit-card-information-from-inbound-email/</loc>
		<lastmod>2020-07-29T11:56:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/avon-cosmetics-leaks-7gb-of-personal-and-technical-information-from-unsecured-server/</loc>
		<lastmod>2020-07-29T11:59:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-critical-collaboration-cybersecurity-and-devops/</loc>
		<lastmod>2020-07-30T06:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto9837967-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto9837967]]></image:title>
			<image:caption><![CDATA[cybersecurity DevOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/diy-hunting-azure-shadow-admins-like-never-before-2/</loc>
		<lastmod>2020-07-29T12:55:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/dussman-group-subsidiary-struck-by-ransomware-that-leaked-its-data/</loc>
		<lastmod>2020-07-29T12:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/logonbox-free-wireguard-vpn-virtual-appliance/</loc>
		<lastmod>2020-07-29T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/successful-security-operations-in-the-new-normal/</loc>
		<lastmod>2020-07-30T07:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Passwords-Came-Went.jpg</image:loc>
			<image:title><![CDATA[Passwords-Came-Went]]></image:title>
			<image:caption><![CDATA[credentials]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/from-stolen-credentials-to-full-network-compromise/</loc>
		<lastmod>2020-07-29T13:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/thousands-of-websites-at-risk-from-critical-wordpress-plugin-vulnerability/</loc>
		<lastmod>2020-07-29T13:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/seven-l7-ddos-attacks-to-watch-out-for/</loc>
		<lastmod>2020-07-29T13:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/risk-register-examples-for-cybersecurity-leaders/</loc>
		<lastmod>2020-07-29T13:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ema-names-ericom-a-top-three-solution-provider-for-secure-access-to-web-services/</loc>
		<lastmod>2020-07-29T13:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/nsa-cisa-call-for-action-to-lower-ot-iot-cybersecurity-exposure-2/</loc>
		<lastmod>2020-07-29T14:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/nsa-cisa-call-for-action-to-lower-ot-iot-cybersecurity-exposure/</loc>
		<lastmod>2020-07-29T14:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/hashing-functions-cissp-domain-3/</loc>
		<lastmod>2020-07-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/everything-you-need-to-know-about-ocsp-ocsp-stapling-ocsp-must-staple/</loc>
		<lastmod>2020-07-29T15:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-kathryn-kosmides-public-records-in-the-digital-age-can-they-save-lives/</loc>
		<lastmod>2020-07-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/sec510-multicloud-security-assessment-and-defense/</loc>
		<lastmod>2020-07-29T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/nexus-intelligence-insightscve-2020-13935-apache-tomcat-websocket-denial-of-service-dos/</loc>
		<lastmod>2020-07-29T16:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-faraday-tour/</loc>
		<lastmod>2020-07-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/something-nicer-an-insightful-report-on-internet-exposure-courtesy-of-rapid7/</loc>
		<lastmod>2020-07-29T17:40:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-keep-your-business-accounts-secure-avast/</loc>
		<lastmod>2020-07-29T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-sanchari-das-eyes-in-your-childs-bedroom-exploiting-child-data-risks-with-smart-toys/</loc>
		<lastmod>2020-07-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/summer-internship-at-secure-ideas/</loc>
		<lastmod>2020-08-04T13:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/theres-a-hole-in-the-boot/</loc>
		<lastmod>2020-07-29T19:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/security-bugs-and-flaws-both-bad-but-in-different-ways/</loc>
		<lastmod>2020-07-29T19:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ics-scada-wireless-attacks/</loc>
		<lastmod>2020-07-29T19:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/security-controls-for-ics-scada-environments/</loc>
		<lastmod>2020-07-29T19:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/least-privilege-vulnerabilities-exploitation-case-study/</loc>
		<lastmod>2020-07-29T19:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cryptography-based-vulnerabilities-in-applications/</loc>
		<lastmod>2020-07-29T19:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-configure-password-policies-in-windows-10/</loc>
		<lastmod>2020-07-29T19:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/netwalker-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-07-29T19:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/heres-why-credit-card-fraud-is-still-a-thing/</loc>
		<lastmod>2020-07-29T19:46:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/qualys-integrates-ivanti-patch-management-into-qualys-vmdr-platform-to-self-heal-endpoints-with-one-click/</loc>
		<lastmod>2020-07-30T13:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/data-execution-prevention-dep-in-windows-10/</loc>
		<lastmod>2020-07-29T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-use-windows-10-quick-recovery-options/</loc>
		<lastmod>2020-07-29T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/devsecops-with-atlassian-bitbucket/</loc>
		<lastmod>2020-07-29T20:04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/corporations-must-step-up-to-the-plate-to-enhance-the-security-of-cloud-computing/</loc>
		<lastmod>2020-07-29T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/staying-relevant-in-a-quickly-shifting-wordpress-landscape/</loc>
		<lastmod>2020-07-29T21:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/qualys-extends-cloud-reach-into-edr-realm/</loc>
		<lastmod>2020-07-29T21:05:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Security-Response-Cloud.jpg</image:loc>
			<image:caption><![CDATA[Qualys cloud]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/Qualys-EDR-Dashboard-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/shared-hosted-radius-for-managed-service-providers/</loc>
		<lastmod>2020-07-29T22:05:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/3-cool-things-about-eyeextend-connect-apps/</loc>
		<lastmod>2020-07-29T22:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-is-dynamic-radius/</loc>
		<lastmod>2020-07-29T22:40:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/chocolate-chip-cookie-history-and-the-myth-of-butter-drop-do/</loc>
		<lastmod>2020-07-29T22:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-manage-certificates-with-intune/</loc>
		<lastmod>2020-07-30T00:04:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cyberattacks-on-applications-grow-exponentially-pose-serious-risk/</loc>
		<lastmod>2020-07-30T02:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/automotive-company-selects-fortinet-to-provide-robust-security-and-connectivity/</loc>
		<lastmod>2020-07-30T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/identifying-assets-for-conducting-an-asset-based-risk-assessment/</loc>
		<lastmod>2020-07-30T07:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/92-of-security-teams-lack-the-tools-needed-to-close-security-gaps-research-shows/</loc>
		<lastmod>2020-07-30T07:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/eulas-gamers-and-safety-avast/</loc>
		<lastmod>2020-07-30T07:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/survey-finds-data-breach-costs-rising/</loc>
		<lastmod>2020-07-31T06:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Vulnerability-Mangement.jpg</image:loc>
			<image:title><![CDATA[Vulnerability-Mangement]]></image:title>
			<image:caption><![CDATA[data breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-saas-is-the-epicenter-for-security-threats/</loc>
		<lastmod>2020-07-31T07:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/TCP-IP-Log-Data.jpg</image:loc>
			<image:title><![CDATA[TCP-IP-Log-Data]]></image:title>
			<image:caption><![CDATA[value data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/hybrid-learning-cipa-compliance-in-g-suite-and-microsoft-365/</loc>
		<lastmod>2020-07-30T11:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/automation-development-why-its-worth-investing-in-this-relationship/</loc>
		<lastmod>2020-07-30T11:58:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/visibility-into-the-unknown/</loc>
		<lastmod>2020-07-30T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-covid-19-crisiss-impact-on-security-operations-automation-comes-to-the-fore/</loc>
		<lastmod>2020-07-30T13:22:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/windows-containers-101/</loc>
		<lastmod>2020-07-30T13:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/windows-containers-101-2/</loc>
		<lastmod>2020-07-30T13:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/hunting-0-days-in-cisco-dcnm-with-shiftleft-ocular/</loc>
		<lastmod>2020-07-30T13:40:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/74-of-internet-users-feel-they-have-no-control-over-the-personal-information-collected-on-them/</loc>
		<lastmod>2020-07-30T13:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/tiktok-facebook-dance-off/</loc>
		<lastmod>2020-07-30T13:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/enterprise-security-weekly-with-mark-ralls-acunetix-president-coo/</loc>
		<lastmod>2020-07-30T13:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ftc-issues-revised-faqs-for-coppa-compliance/</loc>
		<lastmod>2020-07-30T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/announcing-veracode-security-labs-community-edition/</loc>
		<lastmod>2020-07-30T14:25:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/7-best-practices-for-securely-enabling-remote-work/</loc>
		<lastmod>2020-07-30T14:30:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/spas-attack-surface-are-us/</loc>
		<lastmod>2020-07-30T14:43:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/behavior-is-the-leading-threat-indicator/</loc>
		<lastmod>2020-07-30T14:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fbi-releases-flash-alert-on-netwalker-ransomware/</loc>
		<lastmod>2020-07-30T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/social-engineering-hacking-brainsits-easier-than-hacking-computers/</loc>
		<lastmod>2020-07-30T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/effective-threat-intelligence-through-vulnerability-analysis/</loc>
		<lastmod>2020-07-30T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/http-based-vulnerabilities/</loc>
		<lastmod>2020-07-30T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cross-site-request-forgery-csrf-vulnerabilities/</loc>
		<lastmod>2020-07-30T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/hack-the-box-htb-machines-walkthrough-series-nest-part-1/</loc>
		<lastmod>2020-07-30T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/aws-storage-services/</loc>
		<lastmod>2020-07-30T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/podcast-recap-fuzzing-security-testing-and-tips-for-a-career-in-appsec/</loc>
		<lastmod>2020-07-30T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cross-site-scripting-xss-vulnerabilities/</loc>
		<lastmod>2020-07-30T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/building-a-network-security-solution-ng-firewall-and-endpoint-security-2/</loc>
		<lastmod>2020-07-30T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/building-a-network-security-solution-ng-firewall-and-endpoint-security/</loc>
		<lastmod>2020-07-30T15:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/is-your-chip-card-secure-much-depends-on-where-you-bank/</loc>
		<lastmod>2020-07-30T15:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/zoom-bug-meant-attackers-could-brute-force-their-way-into-password-protected-meetings/</loc>
		<lastmod>2020-07-30T15:15:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/going-beyond-technology-with-cis-organizational-controls/</loc>
		<lastmod>2020-07-30T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bitdefender-releases-landmark-open-source-software-project-hypervisor-based-memory-introspection/</loc>
		<lastmod>2020-07-30T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/protecting-aws-assets-a-case-study/</loc>
		<lastmod>2020-07-30T15:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/aqua-extends-its-alliance-with-red-hat-and-ibm-to-bring-cloud-native-security-to-the-red-hat-marketplace/</loc>
		<lastmod>2020-08-04T13:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-jennifer-helsbys-next-generation-securedrop-protecting-journalists-from-malware/</loc>
		<lastmod>2020-07-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/proactive-endpoint-protection-how-morphisec-guard-secures-your-infrastructure/</loc>
		<lastmod>2020-07-30T16:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cloud-native-architectures-why-application-security-should-be-microservices-ready/</loc>
		<lastmod>2020-07-30T16:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/xkcd-pods-vs-bubbles/</loc>
		<lastmod>2020-07-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/can-i-set-up-microsoft-nps-in-the-cloud/</loc>
		<lastmod>2020-07-30T17:03:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/web-application-security-vs-network-security/</loc>
		<lastmod>2020-07-30T17:53:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/russians-hack-news-websites-sow-anti-nato-sentiment/</loc>
		<lastmod>2020-07-30T17:56:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/nato-tomislav-medak-cc-by.jpg</image:loc>
			<image:title><![CDATA[nato--tomislav-medak--cc-by]]></image:title>
			<image:caption><![CDATA[Russians]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/webinar-recap-the-next-generation-ai-powered-soc-platform/</loc>
		<lastmod>2020-07-30T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-panel-renee-diresta-melanie-ensign-and-andrea-limbago-moderator-disinformation/</loc>
		<lastmod>2020-07-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bash-tips-and-tricks/</loc>
		<lastmod>2020-07-30T18:18:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/becoming-an-all-around-defender-social-engineering-your-way-to-success/</loc>
		<lastmod>2020-07-30T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/does-your-incident-response-plan-actually-help/</loc>
		<lastmod>2020-07-30T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ditching-spreadsheets-for-certificate-lifecycle-automation-keyfactor/</loc>
		<lastmod>2020-07-30T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/making-infosec-jobs-easier-adjusting-to-changes-in-the-it-landscape/</loc>
		<lastmod>2020-07-30T19:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/seo-hacktool-sitemap-generator/</loc>
		<lastmod>2020-07-30T20:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/smart-card-authentication-with-active-directory/</loc>
		<lastmod>2020-07-30T23:06:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/president-obama-delivers-the-eulogy-of-american-patriot-and-civil-rights-leader-congressman-john-lewis/</loc>
		<lastmod>2020-07-31T01:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/soc-pros-respond-to-training-and-playing-with-new-tech-more-than-money-sans/</loc>
		<lastmod>2020-07-31T02:13:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-ciso-is-dead-long-live-the-ciso/</loc>
		<lastmod>2020-07-31T05:24:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/happy-20th-annual-sysadmin-day-from-spanning/</loc>
		<lastmod>2020-07-31T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/tutorial-of-arm-stack-overflow-exploit-against-setuid-root-program/</loc>
		<lastmod>2020-07-31T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/offense-and-defense-a-tale-of-two-sides-group-policy-and-logon-scripts/</loc>
		<lastmod>2020-07-31T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-maximize-your-soar-investment/</loc>
		<lastmod>2020-07-31T07:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-maximize-your-soar-investment-2/</loc>
		<lastmod>2020-07-31T07:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/introducing-the-new-avast-business-remote-control-avast/</loc>
		<lastmod>2020-07-31T08:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cybersecurity-baseline-for-iot-device-manufacturers/</loc>
		<lastmod>2020-07-31T09:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-benefits-of-trust-in-the-iot-era/</loc>
		<lastmod>2020-07-31T09:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/cybersecurity-luminaries-from-microsoft-intuit-zscaler-and-kraft-heinz-join-yl-ventures-growing-venture-advisory-board-to-guide-israeli-cybersecurity-startups-to-success/</loc>
		<lastmod>2020-07-31T13:47:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-use-assigned-access-in-windows-10/</loc>
		<lastmod>2020-07-31T13:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/phishing-email-uses-google-ad-redirect-to-steal-microsoft-credentials/</loc>
		<lastmod>2020-07-31T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-joey-dodds-trustworthy-elections/</loc>
		<lastmod>2020-07-31T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/mitigating-risk-to-healthcare-data-in-heightened-threat-environments-2/</loc>
		<lastmod>2020-07-31T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/hr-data-management-in-a-non-employee-world-4-things-to-know-2/</loc>
		<lastmod>2020-07-31T16:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/seczetta-and-systemdomain-announce-partnership-to-provide-third-party-identity-risk-to-the-financial-services-healthcare-and-utilities-industries-2/</loc>
		<lastmod>2020-07-31T16:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/building-operational-agility-in-healthcare-focus-on-your-non-employees-2/</loc>
		<lastmod>2020-07-31T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/seczetta-increases-momentum-in-q1-with-record-sales-new-partnerships-and-enhanced-customer-centric-product-capabilities-2/</loc>
		<lastmod>2020-07-31T16:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/seczetta-strengthens-commitment-to-women-in-cybersecurity-signing-two-new-partnerships-with-wbenc-certified-women-owned-cybersecurity-companies-2/</loc>
		<lastmod>2020-07-31T16:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/seczetta-and-securience-announce-first-partnership-to-bring-third-party-identity-and-lifecycle-management-to-emea-2/</loc>
		<lastmod>2020-07-31T16:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/operational-order-and-agility-in-uncertain-times-2/</loc>
		<lastmod>2020-07-31T16:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/seczetta-and-stack-solutions-announce-new-partnership-to-improve-user-experience-and-governance-for-third-party-users-2/</loc>
		<lastmod>2020-07-31T16:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/closing-the-gap-how-to-strategize-third-party-identity-risk-management-2/</loc>
		<lastmod>2020-07-31T16:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-joy-of-tech-a-back-to-school-sale/</loc>
		<lastmod>2020-07-31T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/sonrai-security-extends-enterprise-identity-platform-with-new-governance-automation-engine/</loc>
		<lastmod>2020-07-31T17:26:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/source-code-leak-lesson-secure-development-environments/</loc>
		<lastmod>2020-07-31T17:28:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/is-cyber-insurance-worth-it/</loc>
		<lastmod>2020-08-03T06:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Employee-Convenience.jpg</image:loc>
			<image:caption><![CDATA[cyber insurance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/usenix-enigma-2020-laurin-b-weissingers-internet-infrastructure-security-a-casualty-of-laissez-faire-and-multistakeholderism/</loc>
		<lastmod>2020-07-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-current-work-from-home-security-measures-enough-2/</loc>
		<lastmod>2020-07-31T18:03:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/phishing-the-3000-lb-gorilla/</loc>
		<lastmod>2020-07-31T18:04:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/vpns-the-deception-in-camouflage-ownership/</loc>
		<lastmod>2020-08-03T07:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/broken-trust.jpg</image:loc>
			<image:title><![CDATA[broken trust]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ivanti-extends-alliance-with-qualys-to-automate-patching-mac-endpoints/</loc>
		<lastmod>2020-07-31T18:37:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Breach-Incidents-2019.jpg</image:loc>
			<image:title><![CDATA[ransomware]]></image:title>
			<image:caption><![CDATA[Egregor]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/Ivanti-Neurons-Discovery_device-screenshot-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/styra-adds-declarative-tool-to-generate-authorization-policies/</loc>
		<lastmod>2020-07-31T18:50:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Cybersecurity-Challenges.jpg</image:loc>
			<image:caption><![CDATA[Styra]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/Styra-RegoPolicyBuilder-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/data-loss-protection-dlp-for-ics-scada/</loc>
		<lastmod>2020-07-31T19:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/app-isolation-in-windows-10/</loc>
		<lastmod>2020-07-31T19:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-use-radare2-for-reverse-engineering/</loc>
		<lastmod>2020-07-31T19:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/windows-supported-wireless-encryption-types/</loc>
		<lastmod>2020-07-31T19:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/configuring-dns-in-aws/</loc>
		<lastmod>2020-07-31T19:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/boothole-grub2-bootloader-secure-boot-bypass/</loc>
		<lastmod>2020-07-31T19:48:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/webinars-open-source-threat-modeling-node-js-security/</loc>
		<lastmod>2020-07-31T19:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/why-is-dynamic-analysis-an-important-part-of-you-appsec-mix/</loc>
		<lastmod>2020-07-31T20:28:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/garry-on-lockdown-episode-4-avast/</loc>
		<lastmod>2020-07-31T20:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/ibm-report-puts-average-data-breach-cost-at-3-86m-avast/</loc>
		<lastmod>2020-07-31T20:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/handbook-tools-tips-tricks-for-threat-hunters/</loc>
		<lastmod>2020-07-31T20:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/are-current-work-from-home-security-measures-enough/</loc>
		<lastmod>2020-07-31T21:16:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/compromised-employee-accounts-inflicted-the-costliest-data-breaches-over-the-past-year/</loc>
		<lastmod>2020-07-31T21:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/three-charged-in-july-15-twitter-compromise/</loc>
		<lastmod>2020-07-31T21:43:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/weekly-news-roundup-july-27-31-2020/</loc>
		<lastmod>2020-07-31T22:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/bens-book-of-the-month-review-of-hacking-connected-cars-tactics-techniques-and-procedures/</loc>
		<lastmod>2020-07-31T22:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/video-ciso-underrepresented/</loc>
		<lastmod>2020-08-01T00:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/5-biggest-data-breaches-of-2020-so-far/</loc>
		<lastmod>2020-08-01T14:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/usenix-enigma-2020-eva-galperins-the-state-of-the-stalkerware/</loc>
		<lastmod>2020-08-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-cosmologist-genres/</loc>
		<lastmod>2020-08-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ciphercloud-chronicles-3-casb-golf-court/</loc>
		<lastmod>2020-08-01T17:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/usenix-enigma-2020-mieke-eoyangs-cybercrime-getting-beyond-analog-cops-and-digital-robbers/</loc>
		<lastmod>2020-08-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/usenix-enigma-2020-birhanu-eshetes-adventures-with-cybercrime-toolkits-insights-for-pragmatic-defense/</loc>
		<lastmod>2020-08-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/robert-m-lees-jeff-haas-little-bobby-comics-week-288/</loc>
		<lastmod>2020-08-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/usenix-enigma-2020-swathi-joshis-reservist-model-distributed-approach-to-scaling-incident-response/</loc>
		<lastmod>2020-08-02T18:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-big-tech-collects-your-private-data-and-how-to-delete-it/</loc>
		<lastmod>2020-08-03T04:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-biggest-challenges-and-best-practices-to-mitigate-risks-in-maritime-cybersecurity/</loc>
		<lastmod>2020-08-03T04:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/selecting-a-secure-sd-wan-solution-that-addresses-all-key-requirements/</loc>
		<lastmod>2020-08-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/when-job-offers-lead-to-cyber-disaster-the-latest-linkedin-phishing-campaign/</loc>
		<lastmod>2020-08-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/devops-vs-devsecops-what-is-the-difference/</loc>
		<lastmod>2020-08-03T07:10:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-is-broken-link-hijacking/</loc>
		<lastmod>2020-08-03T07:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/podcast-uri-may-talks-xdr-with-neil-hughes-2/</loc>
		<lastmod>2020-08-03T09:25:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/podcast-uri-may-talks-xdr-with-neil-hughes/</loc>
		<lastmod>2020-08-03T09:25:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/belarus-authorities-arrest-gandcrab-ransomware-operator/</loc>
		<lastmod>2020-08-03T09:58:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/us-doj-charges-three-young-men-for-alleged-roles-in-july-twitter-hack/</loc>
		<lastmod>2020-08-03T10:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-demise-of-the-internal-datacenter-and-consequential-risks/</loc>
		<lastmod>2020-08-03T10:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/tripwire-patch-priority-index-for-july-2020/</loc>
		<lastmod>2020-08-03T10:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/report-finds-cloud-security-concerns-warranted/</loc>
		<lastmod>2020-08-03T10:32:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/cloud-security.jpg</image:loc>
			<image:title><![CDATA[cloud security]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-future-of-work-wfh-changing-cybersecurity/</loc>
		<lastmod>2020-08-04T06:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Age-Of-Collaboration.jpg</image:loc>
			<image:title><![CDATA[Age-Of-Collaboration]]></image:title>
			<image:caption><![CDATA[HR data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/open-source-security-is-essential-to-enterprise-security/</loc>
		<lastmod>2020-08-03T10:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/attackiqs-business-is-not-security-testing/</loc>
		<lastmod>2020-08-03T12:05:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/4-steps-to-prepare-for-quantum-computing/</loc>
		<lastmod>2020-08-04T07:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Employees-Attack-Surface.jpg</image:loc>
			<image:caption><![CDATA[quantum computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/uk-finance-reveals-top-10-covid-19-scams-to-be-on-the-lookout-for/</loc>
		<lastmod>2020-08-03T13:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/axis-security-named-winner-as-top-100-cybersecurity-startup-for-2020/</loc>
		<lastmod>2020-08-03T13:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/privilege-escalation-on-meetup-com-enabled-redirection-of-payments/</loc>
		<lastmod>2020-08-03T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-data-reveals-how-appsec-is-adapting-to-new-development-realities/</loc>
		<lastmod>2020-08-03T14:06:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/bitdefender-ranked-1-in-av-test-results-halfway-into-2020/</loc>
		<lastmod>2020-08-03T14:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/man-vs-machine-three-part-virtual-series-on-the-human-element-of-appsec/</loc>
		<lastmod>2020-08-03T14:57:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/belarus-announces-arrest-of-gandcrab-ransomware-distributor/</loc>
		<lastmod>2020-08-03T14:59:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/hack-the-box-htb-machines-walkthrough-series-nest-part-2/</loc>
		<lastmod>2020-08-03T14:59:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/rts-threshold-configuration-for-improved-wireless-network-performance-updated-2020/</loc>
		<lastmod>2020-08-03T14:59:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/bypassing-security-products-via-dns-data-exfiltration/</loc>
		<lastmod>2020-08-03T14:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/usenix-enigma-2020-david-freemans-the-abuse-uncertainty-principle-and-other-lessons-learned-from-measuring-abuse-on-the-internet/</loc>
		<lastmod>2020-08-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/seeking-enthusiastic-candidates-for-our-2021-fellowship-program/</loc>
		<lastmod>2020-08-03T16:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cultural-spectrum-of-trust/</loc>
		<lastmod>2020-08-03T16:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/garmin-ransomware-attack-learnings-avast/</loc>
		<lastmod>2020-08-03T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/multi-factor-authentication-for-app-security-avast/</loc>
		<lastmod>2020-08-03T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/encoding-cissp-domain-3/</loc>
		<lastmod>2020-08-05T14:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-joy-of-tech-bill-gates-conspiracy-theory/</loc>
		<lastmod>2020-08-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-keynote-dr-kevin-jones-cyber-security-in-the-modern-distributed-enterprise-protecting-airbus/</loc>
		<lastmod>2020-08-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/apache-struts-research-at-scale-part-3-exploitation/</loc>
		<lastmod>2020-08-03T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/using-a-risk-management-matrix-to-report-to-executive-management/</loc>
		<lastmod>2020-08-03T18:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ransomware-attacks-fracture-between-enterprise-and-ransomware-as-a-service-in-q2-as-demands-increase/</loc>
		<lastmod>2020-08-03T19:17:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-its-time-to-adopt-a-risk-based-approach-to-appsec/</loc>
		<lastmod>2020-08-03T19:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/robocall-legal-advocate-leaks-customer-data/</loc>
		<lastmod>2020-08-03T22:18:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/masking-malicious-memory-artifacts-part-iii-bypassing-defensive-scanners/</loc>
		<lastmod>2020-08-03T23:49:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/remote-work-is-here-to-stay-cybersecurity-needs-to-catch-up/</loc>
		<lastmod>2020-08-04T00:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/vulnerabilities-digest-july-2020/</loc>
		<lastmod>2020-08-04T01:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/modern-application-development-demands-better-data-operations/</loc>
		<lastmod>2020-08-04T02:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/podcast-episode-9-sharpening-your-defenses-with-mitre-attcks-new-sub-techniques/</loc>
		<lastmod>2020-08-04T04:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-accurately-and-continuously-identify-and-remediate-oss-library-risks/</loc>
		<lastmod>2020-08-04T05:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/google-cloud-and-appviewx-introduce-instant-ca-deployment-and-lifecycle-management-platform/</loc>
		<lastmod>2020-08-04T06:01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/keeping-up-with-the-performance-demands-of-encrypted-web-traffic/</loc>
		<lastmod>2020-08-04T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/5-ways-to-leverage-cloud-computing-to-boost-your-startup/</loc>
		<lastmod>2020-08-04T08:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/data-governance-and-the-coso-cube/</loc>
		<lastmod>2020-08-04T10:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/interior-design-platform-confirms-data-breach-after-data-of-1-3-million-users-is-posted-online/</loc>
		<lastmod>2020-08-04T10:54:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/converged-security-solutions-avast/</loc>
		<lastmod>2020-08-04T10:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/elearning-inside-k-12-hybrid-learning-and-why-district-it-teams-must-take-a-cloud-first-approach/</loc>
		<lastmod>2020-08-04T11:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fbi-warns-of-rise-in-online-shopping-scams/</loc>
		<lastmod>2020-08-04T11:21:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/doubt-is-the-greatest-nemesis-to-a-u-s-election/</loc>
		<lastmod>2020-08-04T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/opportunities-for-risk-management-in-the-great-reset/</loc>
		<lastmod>2020-08-04T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/digital-defense-announces-new-partner-program-for-managed-service-providers/</loc>
		<lastmod>2020-08-04T12:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/a-practical-path-from-edr-to-xdr%e2%80%8a-%e2%80%8ahow-to-do-it/</loc>
		<lastmod>2020-08-04T12:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/pci-pal-svp-nominated-in-the-computing-women-in-tech-excellence-awards/</loc>
		<lastmod>2020-08-04T12:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/devo-sets-company-records-for-revenue-and-customer-growth/</loc>
		<lastmod>2020-08-04T12:31:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/polyrize-announces-general-availability-of-innovative-cloud-identity-and-access-security-platform/</loc>
		<lastmod>2020-08-04T12:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/can-container-docker-benefits-apply-to-client-apps-too-2/</loc>
		<lastmod>2020-08-04T12:58:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/can-container-docker-benefits-apply-to-client-apps-too/</loc>
		<lastmod>2020-08-04T12:58:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/grammatech-named-top-20-most-promising-automotive-solution-provider/</loc>
		<lastmod>2020-08-04T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/apply-integrated-reasoning-to-incident-management/</loc>
		<lastmod>2020-08-04T13:16:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/signal-sciences-for-azure-app-services/</loc>
		<lastmod>2020-08-04T13:25:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/users-advised-to-reset-passwords-after-zello-data-breach/</loc>
		<lastmod>2020-08-04T13:27:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-next-generation-of-hackers/</loc>
		<lastmod>2020-08-04T13:44:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/exabeam-announces-new-use-case-licensing-and-content-library-to-simplify-siem-adoption-enable-increased-visibility/</loc>
		<lastmod>2020-08-04T13:57:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/moldovan-national-pleaded-guilty-to-role-in-digital-crime-enterprise/</loc>
		<lastmod>2020-08-04T13:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/easy-wins-when-securing-slack/</loc>
		<lastmod>2020-08-04T13:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/working-with-thundra-alerts/</loc>
		<lastmod>2020-08-04T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/aws-step-functions-doing-serverless-is-easier-than-you-think/</loc>
		<lastmod>2020-08-04T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/mac-or-pc-which-is-best-for-business-avast/</loc>
		<lastmod>2020-08-04T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/real-discovery-of-personal-data-usage-is-the-new-green/</loc>
		<lastmod>2020-08-04T15:45:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/insurance-ciso-concerns-with-cloud-migration/</loc>
		<lastmod>2020-08-04T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-01-james-spiteris-unified-protection-with-the-elastic-stack/</loc>
		<lastmod>2020-08-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/mitigating-nosql-injection-attacks-part-2/</loc>
		<lastmod>2020-08-04T16:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/taking-action-against-racism-2/</loc>
		<lastmod>2020-08-04T16:12:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/taking-action-against-racism/</loc>
		<lastmod>2020-08-04T16:12:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/manual-vs-automated-certificate-management-keyfactor/</loc>
		<lastmod>2020-08-04T16:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/smart-ddos-protection-during-the-covid-19-crisis/</loc>
		<lastmod>2020-08-04T16:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-secure-devops-is-the-new-sheriff-in-town/</loc>
		<lastmod>2020-08-04T16:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-scientist-tech-help/</loc>
		<lastmod>2020-08-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-is-a-caa-record-your-guide-to-certificate-authority-authorization/</loc>
		<lastmod>2020-08-04T17:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/21-cybersecurity-products-to-combat-apt29-mitre-weighs-in/</loc>
		<lastmod>2020-08-04T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/network-design-firewall-ids-ips/</loc>
		<lastmod>2020-08-04T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/work-from-home-network-traffic-spikes-are-your-employees-vulnerable/</loc>
		<lastmod>2020-08-04T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-cybersecurity-will-change-post-pandemic/</loc>
		<lastmod>2020-08-05T07:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/strategy.jpg</image:loc>
			<image:title><![CDATA[strategy]]></image:title>
			<image:caption><![CDATA[cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-02-anastasios-pingios-threat-landscape-greece/</loc>
		<lastmod>2020-08-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/digicert-announces-digicert-automation-gateway/</loc>
		<lastmod>2020-08-04T18:07:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/we-are-all-risk-managers-now/</loc>
		<lastmod>2020-08-04T18:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/api-security-need-to-know-questions-every-executive-should-ask-about-their-apis/</loc>
		<lastmod>2020-08-04T18:46:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/gartner-releases-emerging-tech-report-critical-insights-into-digital-risk-protection/</loc>
		<lastmod>2020-08-04T19:26:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/making-azure-cloud-environments-even-more-secure-with-cyberark/</loc>
		<lastmod>2020-08-04T19:47:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-escalating-demand-for-continuous-monitoring-in-healthcare/</loc>
		<lastmod>2020-08-04T19:56:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/selecting-the-best-soar-solution-series-the-5-core-competencies-part-2/</loc>
		<lastmod>2020-08-04T19:56:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sectigo-and-refirm-labs-partner-to-help-device-manufacturers-uncover-iot-firmware-vulnerabilities-and-achieve-compliance/</loc>
		<lastmod>2020-08-04T19:57:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-automation-cuts-breach-costs-in-half-new-research-shows/</loc>
		<lastmod>2020-08-04T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/murphys-law-and-essential-lesson-enterprises-need-to-learn-from-the-twitter-attack/</loc>
		<lastmod>2020-08-04T19:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/making-infosec-jobs-easier-preventing-data-loss-and-fraud/</loc>
		<lastmod>2020-08-04T19:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-are-you-keeping-up-with-nist-800-53-revisions/</loc>
		<lastmod>2020-08-04T20:05:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sucuri-sit-down-episode-3-phishing-attacks-with-luke-leal/</loc>
		<lastmod>2020-08-04T21:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/newsbites-drilldown-for-the-week-ending-31-july-2020/</loc>
		<lastmod>2020-08-04T22:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/blubracket-adds-stolen-and-leaked-code-detection-remediation-to-its-codesecurity-suite/</loc>
		<lastmod>2020-08-04T23:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/securing-the-covid-19-new-normal-of-homeworking/</loc>
		<lastmod>2020-08-05T00:34:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/enabling-data-protection-and-compliance-in-the-g-suite-environment/</loc>
		<lastmod>2020-08-05T04:12:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/hunting-injected-processes-by-the-modules-they-keep/</loc>
		<lastmod>2020-08-05T04:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/secure-remote-access-why-its-important-and-how-to-do-it-right/</loc>
		<lastmod>2020-08-05T05:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/securing-the-5g-enabled-future/</loc>
		<lastmod>2020-08-05T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/podcast-episode-18-video-and-search-security/</loc>
		<lastmod>2020-08-05T08:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/quantum-computing-and-the-evolving-cybersecurity-threat/</loc>
		<lastmod>2020-08-05T09:04:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/playing-with-guloader-anti-vm-techniques/</loc>
		<lastmod>2020-08-05T09:08:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/garmin-pays-ransom-to-evil-corp-despite-russian-sanctions/</loc>
		<lastmod>2020-08-05T09:39:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/garmin-rottonara-pixabay.jpg</image:loc>
			<image:title><![CDATA[garmin--rottonara--pixabay]]></image:title>
			<image:caption><![CDATA[Garmin]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/test-your-payment-security-knowledge-with-pci-pals-summer-school/</loc>
		<lastmod>2020-08-05T10:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-best-wordpress-malware-scanner-is-not-what-you-think/</loc>
		<lastmod>2020-08-05T10:46:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sans-survey-highlights-pandemic-influenced-hiring-plans/</loc>
		<lastmod>2020-08-05T10:57:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sans-survey-highlights-pandemic-influenced-hiring-plans-2/</loc>
		<lastmod>2020-08-05T10:57:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-only-wordpress-malware-removal-plugin-that-you-will-ever-need/</loc>
		<lastmod>2020-08-05T10:59:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/accidentally-stepping-on-a-defi-lego/</loc>
		<lastmod>2020-08-05T11:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/linkedin-live-qa-with-a-pki-expert-and-top-3-takeaways/</loc>
		<lastmod>2020-08-05T12:05:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/5-tools-out-of-black-hat-to-gain-better-iot-visibility/</loc>
		<lastmod>2020-08-05T12:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/summit-medical-associates-discloses-ransomware-attack-patient-and-affiliate-information-potentially-impacted/</loc>
		<lastmod>2020-08-05T12:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/scammers-adjust-as-app-install-fraud-falls/</loc>
		<lastmod>2020-08-06T06:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/SimBad-Adware-Android.jpg</image:loc>
			<image:title><![CDATA[mobile apps]]></image:title>
			<image:caption><![CDATA[apps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/tripwire-research-iot-smart-lock-vulnerability-spotlights-bigger-issues/</loc>
		<lastmod>2020-08-05T12:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/avast-passwords-eol-avast/</loc>
		<lastmod>2020-08-05T13:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/black-hat-presentation-web-cache-entanglement/</loc>
		<lastmod>2020-08-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/open-source-code-trojan-horse-for-attacks/</loc>
		<lastmod>2020-08-06T07:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/18-percent-of-businesses-would-consider-sabotaging-a-rival-online-business-new-research-shows/</loc>
		<lastmod>2020-08-05T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/is-cyber-insurance-worth-it-2/</loc>
		<lastmod>2020-08-05T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/press-release-anitian-included-in-gartners-market-guide-for-compliance-automation-tools-in-devops/</loc>
		<lastmod>2020-08-05T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/podcast-ep-2-1-ml-automation-shiftleft-at-capitalone-a-conversation-with-vincent-weafer/</loc>
		<lastmod>2020-08-05T15:57:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fbi-continued-use-of-windows-7-poses-security-risks-given-eol-status/</loc>
		<lastmod>2020-08-05T15:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-03-yiannis-ioannides-orchestrating-resilient-red-team-infrastructure-protect-yourselves/</loc>
		<lastmod>2020-08-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/tesla-model-3-vulnerability-what-you-need-to-know-about-the-web-browser-bug/</loc>
		<lastmod>2020-08-05T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/lab-hacking-an-android-device-with-msfvenom-updated-2020/</loc>
		<lastmod>2020-08-05T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/4-reasons-why-you-should-include-current-events-in-your-phishing-simulation-program/</loc>
		<lastmod>2020-08-05T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/inside-def-cons-champion-ctf-team-ppp/</loc>
		<lastmod>2020-08-05T16:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/daniel-storis-unzip/</loc>
		<lastmod>2020-08-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-prevent-pay-per-registration-fraud/</loc>
		<lastmod>2020-08-05T17:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/live-from-black-hat-stress-testing-democracy-election-integrity-during-a-global-pandemic-with-matt-blaze/</loc>
		<lastmod>2020-08-05T17:33:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-04-argyris-makrygeorgous-and-george-kontogiannis-soar-not-sore/</loc>
		<lastmod>2020-08-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/rsa-conference-a-five-star-experience-in-four-days/</loc>
		<lastmod>2020-08-05T18:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-hacker-mind-podcast-inside-def-cons-champion-ctf-team-ppp/</loc>
		<lastmod>2020-08-05T20:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/reducing-the-hidden-costs-and-mitigating-security-risks-of-third-party-contractors/</loc>
		<lastmod>2020-08-05T19:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/php-backdoor-obfuscated-one-liner/</loc>
		<lastmod>2020-08-05T19:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/porn-clip-disrupts-virtual-court-hearing-for-alleged-twitter-hacker/</loc>
		<lastmod>2020-08-05T20:18:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/javascript-puts-97-of-websites-at-risk-of-infection/</loc>
		<lastmod>2020-08-05T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/linux-foundation-addresses-open-source-security/</loc>
		<lastmod>2020-08-05T20:38:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Demystifying-Insider-Threats.jpg</image:loc>
			<image:title><![CDATA[security tools]]></image:title>
			<image:caption><![CDATA[open source security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-devsecops-done-right-makes-application-security-easier/</loc>
		<lastmod>2020-08-05T20:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/data-security-in-the-saas-age-quick-wins/</loc>
		<lastmod>2020-08-05T22:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/paperless-airplanes-how-cargo-airlines-are-answering-the-call-for-digital-transformation/</loc>
		<lastmod>2020-08-05T23:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-install-sift-workstation-and-remnux-on-the-same-system-for-forensics-and-malware-analysis/</loc>
		<lastmod>2020-08-06T00:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/national-cybersecurity-authority-nca-what-you-need-to-know/</loc>
		<lastmod>2020-08-06T03:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/vulnerabilities-in-active-directory-the-cisos-achilles-heel/</loc>
		<lastmod>2020-08-06T05:03:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/secure-sd-wan-addresses-manufacturing-and-services-organizations-security-challenges/</loc>
		<lastmod>2020-08-06T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ushering-the-era-of-hyperscale-security-the-new-fortigate-4400f/</loc>
		<lastmod>2020-08-06T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/zero-trust-identity-at-the-core/</loc>
		<lastmod>2020-08-06T07:22:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-find-additional-hidden-vulnerabilities-during-dast-testing/</loc>
		<lastmod>2020-08-06T07:57:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/scanning-a-soap-web-service-for-vulnerabilities/</loc>
		<lastmod>2020-08-06T08:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/guide-how-to-choose-an-ai-based-cybersecurity-platform/</loc>
		<lastmod>2020-08-06T08:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cloud-based-internet-security-avast/</loc>
		<lastmod>2020-08-06T10:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/an-overview-of-the-boothole-vulnerability-avast/</loc>
		<lastmod>2020-08-06T10:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/google-classroom-security-settings-to-check-before-school-starts/</loc>
		<lastmod>2020-08-06T11:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/avoid-alert-fatigue-web-application-firewall-installation-configuration-and-best-practices/</loc>
		<lastmod>2020-08-06T11:21:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/canon-hit-by-maze-ransomware-operators-10tb-of-data-allegedly-stolen/</loc>
		<lastmod>2020-08-06T11:31:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/top-tips-to-help-contact-centres-prepare-for-a-pci-dss-audit/</loc>
		<lastmod>2020-08-06T11:32:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/20-years-of-edge-computing/</loc>
		<lastmod>2020-08-06T13:14:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/working-with-thundra-in-aws-sam/</loc>
		<lastmod>2020-08-06T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/3-tips-to-safeguard-your-digital-future/</loc>
		<lastmod>2020-08-07T07:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cyber-Insurance.jpg</image:loc>
			<image:title><![CDATA[Cyber-Insurance]]></image:title>
			<image:caption><![CDATA[contractor]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-lifecycle-of-a-password/</loc>
		<lastmod>2020-08-06T13:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/when-you-get-breached-so-do-your-customers/</loc>
		<lastmod>2020-08-06T13:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/multi-stage-phishing-attacks-are-dangerous/</loc>
		<lastmod>2020-08-06T13:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-you-need-to-know-about-salesforces-recycle-bin/</loc>
		<lastmod>2020-08-06T14:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/live-from-black-hat-healthscare-an-insiders-biopsy-of-healthcare-application-security-with-seth-fogie/</loc>
		<lastmod>2020-08-06T14:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/exorcist-ransomware-and-cis-exclusion/</loc>
		<lastmod>2020-08-07T06:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/exorcist.jpg</image:loc>
			<image:title><![CDATA[exorcist]]></image:title>
			<image:caption><![CDATA[Exorcist]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/exorcist-ransom-demanding-pop-up.jpg</image:loc>
			<image:caption><![CDATA[exorcist ransomware - ransom demanding message]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-you-should-consider-profits/</loc>
		<lastmod>2020-08-06T14:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-billion-dollar-security-blanket-a-feelgood-fallacy/</loc>
		<lastmod>2020-08-06T15:07:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ndr-for-aws-well-architected/</loc>
		<lastmod>2020-08-06T15:36:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-guest-talk-1-ira-winklers-stopping-cyber-boom-you-can-stop-stupid/</loc>
		<lastmod>2020-08-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/live-from-black-hat-practical-defenses-against-adversarial-machine-learning-with-ariel-herbert-voss/</loc>
		<lastmod>2020-08-06T16:04:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/advice-from-the-pros-maximize-your-free-device-by-putting-it-to-use-for-your-cybersecurity-career/</loc>
		<lastmod>2020-08-06T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-exposure-notification/</loc>
		<lastmod>2020-08-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/chrome-web-store-fail-300-more-scam-browser-extensions/</loc>
		<lastmod>2020-08-06T17:12:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/despair-kirill-makarov-cc0.jpg</image:loc>
			<image:title><![CDATA[despair--kirill-makarov--cc0]]></image:title>
			<image:caption><![CDATA[extensions]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-most-common-social-engineering-attacks/</loc>
		<lastmod>2020-08-06T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/capture-the-flag-a-walkthrough-of-suncsrs-sumo/</loc>
		<lastmod>2020-08-06T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cyber-work-podcast-recap-what-does-a-military-forensics-and-incident-responder-do/</loc>
		<lastmod>2020-08-06T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/morphisec-special-offer-full-best-in-class-endpoint-protection-at-a-lower-price-than-your-current-antivirus/</loc>
		<lastmod>2020-08-06T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/making-infosec-jobs-easier-threat-hunting/</loc>
		<lastmod>2020-08-06T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-05-tasos-chatziefstratious-visualize-windows-events-using-python3-neo4j/</loc>
		<lastmod>2020-08-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ask-the-expert-infosec-requirements-for-health-insurance-providers-part-1/</loc>
		<lastmod>2020-08-06T18:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/phishing-campaign-leads-users-to-site-disguised-as-email-scanner/</loc>
		<lastmod>2020-08-06T18:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/70-of-large-businesses-believe-work-from-home-makes-them-more-vulnerable-to-cyberattacks/</loc>
		<lastmod>2020-08-06T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/hacked-data-broker-accounts-fueled-phony-covid-loans-unemployment-claims/</loc>
		<lastmod>2020-08-06T19:56:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-bill-comes-due-for-the-massive-first-american-finance-hack/</loc>
		<lastmod>2020-08-06T20:27:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/top-5-cybersecurity-threats-2020-what-ranks-alongside-ransomware-and-office-suite-account-hijacking/</loc>
		<lastmod>2020-08-06T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-devsecops-study-highlights-need-to-address-appsec-throughout-the-sdlc/</loc>
		<lastmod>2020-08-06T20:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/live-from-black-hat-hacking-public-opinion-with-renee-diresta/</loc>
		<lastmod>2020-08-06T21:05:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/back-to-school-shopping-in-2020/</loc>
		<lastmod>2020-08-06T21:31:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/making-the-most-out-of-wlan-event-log-artifacts/</loc>
		<lastmod>2020-08-06T22:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/5-steps-to-scale-automate-x-509-certificates/</loc>
		<lastmod>2020-08-06T23:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-center-for-internet-security-cis-use-cases-and-cost-justification/</loc>
		<lastmod>2020-08-07T06:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sase-is-all-about-delivering-security-everywhere/</loc>
		<lastmod>2020-08-07T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/analyzing-twitters-latest-update-a-problem-of-leadership/</loc>
		<lastmod>2020-08-07T08:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/securing-enterprise-mobile-apps-with-loginradius/</loc>
		<lastmod>2020-08-07T09:20:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-your-vpn-connections-need-two-factor-authentication-2fa/</loc>
		<lastmod>2020-08-07T11:02:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/nsa-advises-limiting-location-data-on-devices-avast/</loc>
		<lastmod>2020-08-07T11:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cyber-security-roundup-for-august-2020/</loc>
		<lastmod>2020-08-07T11:44:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/capitol-one-to-pay-80-million-fine-after-2019-data-breach/</loc>
		<lastmod>2020-08-07T12:23:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/lastpass-taps-enzoic-for-dark-web-monitoring/</loc>
		<lastmod>2020-08-07T12:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sumo-logic-deepens-observability-across-operations-security-business-and-customer-experiences-powered-by-continuous-intelligence/</loc>
		<lastmod>2020-08-07T12:38:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/quick-hit-comparison-of-whole-file-reading-methods/</loc>
		<lastmod>2020-08-07T12:42:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/workplace-security-policy-need-of-the-hour/</loc>
		<lastmod>2020-08-07T12:46:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/netsurion-adds-deep-learning-based-endpoint-threat-prevention-with-deep-instinct/</loc>
		<lastmod>2020-08-19T13:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/live-from-black-hat-breaking-brains-solving-problems-with-matt-wixey/</loc>
		<lastmod>2020-08-07T14:35:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-06-ozgur-alps-a-less-known-attack-vector-second-order-idor-attacks/</loc>
		<lastmod>2020-08-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/webinars-openchain-and-open-source-supply-chain-security/</loc>
		<lastmod>2020-08-07T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/emotet-botnet-named-most-wanted-malware-for-july-2020/</loc>
		<lastmod>2020-08-07T16:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/intel-leak-20gb-of-secrets-just-the-start-says-perp/</loc>
		<lastmod>2020-08-07T16:48:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/tillie-kottmann-1287402324386893824-with-permission.jpg</image:loc>
			<image:title><![CDATA[tillie-kottmann--1287402324386893824--with-permission]]></image:title>
			<image:caption><![CDATA[Intel]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/morphisec-knowledge-update-new-wastedlocker-ransomware-causes-havoc-among-some-of-the-leading-enterprises-in-the-u-s/</loc>
		<lastmod>2020-08-07T16:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-joy-of-tech-brushing/</loc>
		<lastmod>2020-08-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/modern-cto-interview-flipping-turtles/</loc>
		<lastmod>2020-08-07T17:39:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-guest-talk-2-campbell-murrays-industry-secrets-for-security-engineers/</loc>
		<lastmod>2020-08-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/five-ugly-ways-scammers-take-advantage-of-your-covid-19-stimulus-payment/</loc>
		<lastmod>2020-08-07T18:24:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cloud-security-challenges-in-the-next-phase-of-wfh/</loc>
		<lastmod>2020-08-10T07:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Secure-Cloud-Migration.jpg</image:loc>
			<image:title><![CDATA[Secure-Cloud-Migration]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/tiktok-and-national-security-the-need-for-a-comprehensive-u-s-privacy-law/</loc>
		<lastmod>2020-08-10T06:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/TikTok.png</image:loc>
			<image:title><![CDATA[TikTok]]></image:title>
			<image:caption><![CDATA[TikTok]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ask-the-expert-infosec-requirements-for-health-insurance-providers-part-2/</loc>
		<lastmod>2020-08-07T18:54:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/repercussions-of-the-capital-one-data-breach/</loc>
		<lastmod>2020-08-07T18:55:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/centrify-automates-password-reconciliation-via-client/</loc>
		<lastmod>2020-08-07T19:02:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Passwords-Came-Went.jpg</image:loc>
			<image:title><![CDATA[Passwords-Came-Went]]></image:title>
			<image:caption><![CDATA[credentials]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Centrify-DMC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/use-of-high-risk-apps-and-websites-increased-161-amid-work-from-home-shift-new-research-shows/</loc>
		<lastmod>2020-08-07T20:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/encryption-cissp-domain-3/</loc>
		<lastmod>2020-08-11T14:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/php-binary-downloader/</loc>
		<lastmod>2020-08-07T21:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/intelligently-test-against-mitre-attck-framework-to-know-whats-most-relevant-to-your-organization-by-lynn-harrington/</loc>
		<lastmod>2020-08-07T21:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/top-3-reasons-gaps-in-microsoft-and-proofpoint-email-security-are-leaving-organizations-vulnerable/</loc>
		<lastmod>2020-08-08T00:38:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cyber-camp-blog-in-real-time/</loc>
		<lastmod>2020-08-08T00:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/quick-hit-speeding-up-data-frame-creation/</loc>
		<lastmod>2020-08-08T13:28:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/linux-server-security-10-linux-hardening-security-best-practices/</loc>
		<lastmod>2020-08-08T14:26:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-07-mert-can-coskuners-and-kursat-oguzhan-akincis-android-malware-adventures/</loc>
		<lastmod>2020-08-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-mathematical-symbol-fight/</loc>
		<lastmod>2020-08-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-08-vanessa-sauters-human-or-machine-the-voight-kampff-test-for-web-application-vulnerabilities/</loc>
		<lastmod>2020-08-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/interplanetary-networking-ipnsig-space-internet-governance/</loc>
		<lastmod>2020-08-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-09-leonardo-di-donatos-falco-runtime-security-analysis-through-syscalls/</loc>
		<lastmod>2020-08-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-cybersecurity-effects-of-fourth-parties-on-websites/</loc>
		<lastmod>2020-08-09T16:12:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/robert-m-lees-jeff-haas-little-bobby-comics-week-289/</loc>
		<lastmod>2020-08-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-10-nick-mitropoulos-security-certifications-training-on-a-budget-and-breaking-down-the-hr-door/</loc>
		<lastmod>2020-08-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/twitter-hack-lessons-learned-tiktok-ban-rite-aid-facial-recognition-cameras/</loc>
		<lastmod>2020-08-10T04:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-state-of-civil-aviation-cybersecurity/</loc>
		<lastmod>2020-08-10T06:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/latest-covid-19-variants-from-the-ridiculous-to-the-malicious/</loc>
		<lastmod>2020-08-10T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/prioritizing-concerns-around-wan-security-issues/</loc>
		<lastmod>2020-08-10T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-study-finds-security-teams-increasingly-stressed/</loc>
		<lastmod>2020-08-10T07:29:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/smart-locks-not-so-smart-with-wi-fi-security/</loc>
		<lastmod>2020-08-10T07:49:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/acunetix-update-introduces-chinese-language-support-in-ui-path-fragments-in-site-structure-and-new-vulnerability-checks/</loc>
		<lastmod>2020-08-10T08:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-manage-wfh-risks-through-covid-19-and-beyond/</loc>
		<lastmod>2020-08-11T07:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/RASP-Provider.jpg</image:loc>
			<image:title><![CDATA[RASP-Provider]]></image:title>
			<image:caption><![CDATA[WFH risk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/windows-10-for-small-business-ultimate-guide-avast/</loc>
		<lastmod>2020-08-10T11:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/bbb-warns-of-scammers-targeting-immigrants-aspiring-to-a-us-visa/</loc>
		<lastmod>2020-08-10T12:17:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/shark-week-avoid-being-cyber-bait-in-uncharted-waters/</loc>
		<lastmod>2020-08-10T13:32:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/sharks.jpg</image:loc>
			<image:title><![CDATA[sharks]]></image:title>
			<image:caption><![CDATA[shark]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ask-the-expert-infosec-requirements-for-health-insurance-providers-part-3/</loc>
		<lastmod>2020-08-10T14:09:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/most-android-phones-can-be-pwned-just-by-watching-a-video/</loc>
		<lastmod>2020-08-10T14:38:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/slava-makkaveev-linkedin.jpg</image:loc>
			<image:title><![CDATA[slava-makkaveev--linkedin]]></image:title>
			<image:caption><![CDATA[Android]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/teamviewer-research-it-execs-confident-in-covid-19-work-from-home-response-but-brace-for-continued-disruption/</loc>
		<lastmod>2020-08-10T14:42:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/boothole-shows-need-for-greater-scrutiny/</loc>
		<lastmod>2020-08-11T06:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/old-shoe.jpg</image:loc>
			<image:title><![CDATA[old shoe]]></image:title>
			<image:caption><![CDATA[Boothole]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/newsletter-july-2020/</loc>
		<lastmod>2020-08-10T15:02:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cloud-breaches-to-become-faster-and-bigger-research-suggests/</loc>
		<lastmod>2020-08-10T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fast-furious-and-scalable-designing-a-high-throughput-real-time-network-traffic-analyzer/</loc>
		<lastmod>2020-08-10T15:32:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-gartner-2020-magic-quadrant-for-pam-is-here/</loc>
		<lastmod>2020-08-10T15:32:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/phishing-campaign-uses-internal-email-to-trick-employees-into-sharing-office-365-credentials/</loc>
		<lastmod>2020-08-10T15:32:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/hack-the-box-htb-machines-walkthrough-series-servmon/</loc>
		<lastmod>2020-08-10T15:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/top-8-world-crises-exploited-by-cybercriminals-and-lessons-learned/</loc>
		<lastmod>2020-08-10T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/securing-cookies-with-httponly-and-secure-flags-updated-2020/</loc>
		<lastmod>2020-08-10T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/phishers-send-out-fake-cpanel-security-vulnerabilities-advisory/</loc>
		<lastmod>2020-08-10T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-11-evangelos-mantas-and-nikos-mantas-from-ground-zero-to-skys-hero-analyzing-drone-logs-from-smartphones/</loc>
		<lastmod>2020-08-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/6-keys-to-ensuring-remote-employee-security/</loc>
		<lastmod>2020-08-10T16:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-joy-of-tech-to-serve-man/</loc>
		<lastmod>2020-08-10T17:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/adaptive-shield-emerges-from-stealth-with-4-million-seed-round-to-protect-115-billion-enterprise-saas-market-with-complete-app-security-control/</loc>
		<lastmod>2020-08-12T13:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/securing-any-app-with-bitglass/</loc>
		<lastmod>2020-08-10T17:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-12-sam-stepanyans-introducing-the-owasp-nettacker-project/</loc>
		<lastmod>2020-08-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/tonight-you-sleep-with-the-flash-frozen-and-overnighted-fishes/</loc>
		<lastmod>2020-08-10T18:01:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-secure-remote-access-is-like-going-to-the-airport/</loc>
		<lastmod>2020-08-10T18:15:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ccpa-is-here-how-does-its-definition-of-personal-information-compare-to-gdpr/</loc>
		<lastmod>2020-08-10T20:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/perimeterx-researcher-finds-zero-day-vulnerability-in-google-chrome-most-websites-using-content-security-policies-csps-including-some-of-the-most-popular-sites-on-the-web-were-at-risk/</loc>
		<lastmod>2020-08-10T20:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/wearedelphix-meet-bruna-bolorino/</loc>
		<lastmod>2020-08-10T21:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-accelerate-and-automate-incident-response-ir-based-on-real-time-network-visibility-and-policy-intelligence/</loc>
		<lastmod>2020-08-10T22:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-simple-cost-effective-way-to-give-your-vpn-and-network-a-zero-trust-security-boost/</loc>
		<lastmod>2020-08-11T00:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/application-vulnerabilities-spike-net-applications-appear-in-the-attack-crosshairs/</loc>
		<lastmod>2020-08-11T01:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/identity-wars-episode-viii-the-last-jedi/</loc>
		<lastmod>2020-08-11T03:04:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/entering-the-field-of-cybersecurity/</loc>
		<lastmod>2020-08-11T06:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fortinet-tackles-the-cyber-skills-gap-through-nse-training-institute-and-global-collaborations/</loc>
		<lastmod>2020-08-11T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/smart-life-offers-complete-digital-life-protection-avast/</loc>
		<lastmod>2020-08-11T07:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-importance-of-content-for-security-tools-like-tripwire/</loc>
		<lastmod>2020-08-11T07:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/finding-the-right-and-secured-video-platforms-for-your-business/</loc>
		<lastmod>2020-08-11T08:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-is-digital-identity-avast/</loc>
		<lastmod>2020-08-11T09:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/michigan-state-university-discloses-e-skimming-attack-credit-card-information-on-2600-customers-stolen/</loc>
		<lastmod>2020-08-11T11:19:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/it-relaxing-security-policies-during-wfh-while-employees-step-up-their-efforts/</loc>
		<lastmod>2020-08-12T06:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/CyberOfficers.jpg</image:loc>
			<image:title><![CDATA[CyberOfficers]]></image:title>
			<image:caption><![CDATA[IT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-csps-can-build-trust-with-5g-security/</loc>
		<lastmod>2020-08-12T07:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/5G.jpg</image:loc>
			<image:title><![CDATA[5G]]></image:title>
			<image:caption><![CDATA[5G Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/your-guide-to-the-mitre-attck-framework-for-ics/</loc>
		<lastmod>2020-08-11T11:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/your-guide-to-the-mitre-attck-framework-for-ics-2/</loc>
		<lastmod>2020-08-11T11:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/navigate-your-path-to-governing-access-and-managing-risk/</loc>
		<lastmod>2020-08-11T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/scam-alert-coca-cola-scam-giveaways-are-after-your-personal-information/</loc>
		<lastmod>2020-08-11T12:14:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/migrating-applications-to-cloud-with-amazon-eventbridge/</loc>
		<lastmod>2020-08-11T12:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/centrify-again-named-a-leader-in-2020-gartner-magic-quadrant-for-privileged-access-management/</loc>
		<lastmod>2020-08-11T13:07:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/non-persistent-vms-with-a-persistent-user-experience-make-your-it-admins-life-easier/</loc>
		<lastmod>2020-08-11T13:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/non-persistent-vms-with-a-persistent-user-experience-make-your-it-admins-life-easier-2/</loc>
		<lastmod>2020-08-11T13:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ask-the-expert-infosec-requirements-for-health-insurance-providers-part-4/</loc>
		<lastmod>2020-08-11T13:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-features-introducing-iframe-sandboxing-and-feature-policy/</loc>
		<lastmod>2020-08-11T13:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/12-hot-takes-on-how-red-teaming-takes-pen-testing-to-the-next-level/</loc>
		<lastmod>2020-08-11T13:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/nearly-50-percent-of-organizations-knowingly-push-vulnerable-software-according-to-new-research-from-esg-and-veracode/</loc>
		<lastmod>2020-08-11T13:51:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/masergy-releases-2020-sd-wan-market-trends-report/</loc>
		<lastmod>2020-08-11T13:52:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/jackie-groark-talks-cybersecurity-trends-automation-product-consolidation-and-the-pursuit-of-efficiency/</loc>
		<lastmod>2020-08-11T14:09:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-challenges-for-healthcare-providers/</loc>
		<lastmod>2020-08-11T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-agent-tesla-variants-capable-of-stealing-data-from-vpns-browsers/</loc>
		<lastmod>2020-08-11T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/virtru-and-area-1-security-partner-to-deliver-comprehensive-cloud-email-protection/</loc>
		<lastmod>2020-08-11T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/symmetry-systems-launches-ready-to-redefine-data-store-and-object-security/</loc>
		<lastmod>2020-08-11T14:36:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ai-helps-home-users-detect-and-prevent-unknown-cyber-threats/</loc>
		<lastmod>2020-08-11T14:37:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/video-managing-digital-certificates-in-devops-keyfactor/</loc>
		<lastmod>2020-08-11T14:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/impacts-and-recommendations-after-big-tech-congressional-testimony/</loc>
		<lastmod>2020-08-11T14:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-new-battleground-is-shadow-code/</loc>
		<lastmod>2020-08-11T15:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-esg-survey-report-modern-application-development-security/</loc>
		<lastmod>2020-08-11T15:31:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/providing-100-percent-malware-free-email-and-web-browsing/</loc>
		<lastmod>2020-08-11T15:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-talk-13-philipp-krenns-nosql-means-no-security/</loc>
		<lastmod>2020-08-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/digicert-announces-new-multi-year-plan-in-digicert-certcentral-to-help-customers-simplify-tls-certificate-management-ahead-of-1-year-lifetime-requirements/</loc>
		<lastmod>2020-08-11T16:45:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-are-black-box-grey-box-and-white-box-penetration-testing/</loc>
		<lastmod>2020-08-11T16:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-privacy-agreements-impact-data-privacy-for-business-users-slack-zoom-and-microsoft-teams/</loc>
		<lastmod>2020-08-11T16:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-detect-and-prevent-web-shells-new-guidance-from-the-nsa-and-the-australian-government/</loc>
		<lastmod>2020-08-11T16:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-26-second-pulse/</loc>
		<lastmod>2020-08-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-is-a-certificate-authority-ca-and-what-do-they-do/</loc>
		<lastmod>2020-08-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-armis-edge-better-alignment-with-cis-critical-security-controls/</loc>
		<lastmod>2020-08-11T17:55:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-bsides-athens-2020-alk-14-vaggelis-stykas-tracking-the-trackers-or-how-to-win-eurovision/</loc>
		<lastmod>2020-08-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/hitting-the-trifecta-with-gitlab-automated-merge-requests/</loc>
		<lastmod>2020-08-11T18:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/perimeterx-researcher-finds-vulnerability-in-google-chrome-most-websites-using-content-security-policies-csps-including-some-of-the-most-popular-sites-on-the-web-were-at-risk/</loc>
		<lastmod>2020-08-11T18:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/making-infosec-jobs-easier-governance-of-cybersecurity/</loc>
		<lastmod>2020-08-11T18:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/forgerock-identity-platform-updates-are-here/</loc>
		<lastmod>2020-08-11T19:44:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/get-started-with-devsecops/</loc>
		<lastmod>2020-08-11T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-report-shows-lack-of-security-confidence-in-addressing-the-hidden-risks-of-shadow-code-putting-organizations-at-high-risk-of-attack/</loc>
		<lastmod>2020-08-11T20:04:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/newsbites-drilldown-for-the-week-ending-7-august-2020/</loc>
		<lastmod>2020-08-11T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/vbulletin-5-0day-from-imperfect-patch/</loc>
		<lastmod>2020-08-11T20:37:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/microsoft-patch-tuesday-august-2020-edition/</loc>
		<lastmod>2020-08-11T20:55:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cve-2020-17479-the-return-of-validation-bypass-cve-2019-19507-in-jpv/</loc>
		<lastmod>2020-08-11T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/slack-strengthens-cybersecurity-controls/</loc>
		<lastmod>2020-08-12T00:23:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/messaging.jpg</image:loc>
			<image:title><![CDATA[messaging]]></image:title>
			<image:caption><![CDATA[Slack]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Slack-Verfied-Organizations.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/vert-threat-alert-august-2020-patch-tuesday-analysis/</loc>
		<lastmod>2020-08-12T01:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-risks-associated-with-oss-and-how-to-mitigate-them/</loc>
		<lastmod>2020-08-12T01:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/physical-access-control/</loc>
		<lastmod>2020-08-12T02:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/get-started-with-devsecops-3/</loc>
		<lastmod>2020-08-12T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/managing-information-security-skepticism-by-changing-workplace-culture/</loc>
		<lastmod>2020-08-12T03:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sinter-new-user-mode-security-enforcement-for-macos/</loc>
		<lastmod>2020-08-12T05:41:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/a-look-at-the-2020-garmin-wastedlocker-ransomware-attack/</loc>
		<lastmod>2020-08-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cyber-adversaries-are-exploiting-the-global-pandemic-at-enormous-scale/</loc>
		<lastmod>2020-08-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-produce-a-risk-treatment-plan/</loc>
		<lastmod>2020-08-12T07:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/most-bec-attacks-come-from-a-small-pool-of-malicious-accounts-study-finds/</loc>
		<lastmod>2020-08-12T07:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/elections-security-report-avast/</loc>
		<lastmod>2020-08-12T08:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/85-of-all-youtube-channels-removed-in-q1-flagged-over-malicious-or-fraudulent-content/</loc>
		<lastmod>2020-08-12T09:20:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-platform-updates-deliver-on-vision-to-secure-the-enterprise-of-things/</loc>
		<lastmod>2020-08-12T10:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/pci-compliance-for-the-utilities-industry/</loc>
		<lastmod>2020-08-12T11:04:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/mediaops-makes-the-inc-5000-list/</loc>
		<lastmod>2020-08-12T11:08:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/rocketship.jpg</image:loc>
			<image:title><![CDATA[rocketship]]></image:title>
			<image:caption><![CDATA[MediaOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/wfh-pressures-accelerate-cloud-security-demand/</loc>
		<lastmod>2020-08-13T06:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto25409210.jpg</image:loc>
			<image:title><![CDATA[cloud security]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fighting-fraud-in-a-covid-induced-digital-reality/</loc>
		<lastmod>2020-08-13T07:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Impact-Cybersecurity-Threats-2.jpg</image:loc>
			<image:title><![CDATA[fraud]]></image:title>
			<image:caption><![CDATA[fraud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/should-you-connect-your-brain-to-the-internet/</loc>
		<lastmod>2020-08-12T11:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ahead-in-the-clouds-a-simplified-approach-to-managing-risk/</loc>
		<lastmod>2020-08-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/adaptive-shield-emerges-from-stealth-with-4-million-seed-round-to-protect-115-billion-enterprise-saas-market-with-complete-app-security-control-2/</loc>
		<lastmod>2020-08-12T13:50:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/elisity-emerges-from-stealth-mode-to-deliver-security-with-identity-as-the-new-perimeter/</loc>
		<lastmod>2020-08-12T13:52:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-where-you-should-you-plant-your-flag/</loc>
		<lastmod>2020-08-12T14:18:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/zeus-sphinx-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-08-12T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/national-counterintelligence-and-security-center-5-priorities-for-2020/</loc>
		<lastmod>2020-08-12T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-end-is-nigh-for-windows-7/</loc>
		<lastmod>2020-08-12T14:35:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-are-wildcard-certificates-and-san-ssl-certs-keyfactor/</loc>
		<lastmod>2020-08-12T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/menlo-security-prevents-zero-day-threat-on-internet-explorer/</loc>
		<lastmod>2020-08-12T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/time-to-re-examine-remote-access-after-vpn-password-leak/</loc>
		<lastmod>2020-08-12T15:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-feng-xiaos-discovering-hidden-properties-to-attack-node-js-ecosystem/</loc>
		<lastmod>2020-08-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/a-modern-development-stack-makes-work-more-fun/</loc>
		<lastmod>2020-08-12T16:07:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/we-love-our-customers/</loc>
		<lastmod>2020-08-12T16:15:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sectigo-releases-quantum-safe-kit-for-enterprises-to-test-new-quantum-resistant-crypto/</loc>
		<lastmod>2020-08-13T12:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/introducing-our-2020-state-of-the-software-supply-chain-report/</loc>
		<lastmod>2020-08-12T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-champion-security-in-devops/</loc>
		<lastmod>2020-08-12T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/james-mattis-coronavirus-public-service-announcement/</loc>
		<lastmod>2020-08-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-oleksandr-miroshs-alvaro-munoz-scribbling-outside-the-lines-of-template-security/</loc>
		<lastmod>2020-08-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-publishing-industry-where-to-now/</loc>
		<lastmod>2020-08-12T19:15:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/can-i-use-azure-with-a-radius-server/</loc>
		<lastmod>2020-08-12T18:30:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/tripwire-survey-76-of-security-professionals-say-maintaining-secure-configurations-in-the-cloud-is-difficult/</loc>
		<lastmod>2020-08-12T18:53:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/3-tips-for-better-virtual-desktop-infrastructure-security/</loc>
		<lastmod>2020-08-12T18:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/robert-m-lees-jeff-haas-little-bobby-comics-week-90-archive-edition/</loc>
		<lastmod>2020-08-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-is-identity-governance-fatigue/</loc>
		<lastmod>2020-08-12T19:41:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/mobile-phishing-the-next-battleground/</loc>
		<lastmod>2020-08-12T19:47:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/survey-76-of-it-pros-say-its-difficult-to-maintain-security-configs-in-the-cloud/</loc>
		<lastmod>2020-08-12T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/a-vantage-point-to-see-threats-before-impact/</loc>
		<lastmod>2020-08-12T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/15-small-business-cyber-security-statistics-that-you-need-to-know/</loc>
		<lastmod>2020-08-12T20:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-stop-wordpress-comments-spam/</loc>
		<lastmod>2020-08-12T21:10:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/it-could-happen-to-anyone/</loc>
		<lastmod>2020-08-12T22:50:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/google-app-engine-azure-app-service-abused-in-phishing-campaign/</loc>
		<lastmod>2020-08-12T23:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-remote-work-is-reshuffling-your-security-priorities-and-investments/</loc>
		<lastmod>2020-08-13T00:23:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-keep-apis-secure-from-bot-attacks/</loc>
		<lastmod>2020-08-13T00:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-opsec-of-protesting/</loc>
		<lastmod>2020-08-13T02:02:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-ssl-works-with-a-website-firewall/</loc>
		<lastmod>2020-08-13T02:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/string-concatenation-obfuscation-techniques/</loc>
		<lastmod>2020-08-13T02:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/phishing-in-a-pandemic-how-to-combat-social-engineering-attacks/</loc>
		<lastmod>2020-08-13T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-block-attackers-at-the-network-edge/</loc>
		<lastmod>2020-08-13T07:26:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cybercriminals-are-infiltrating-netgear-routers-with-ancient-attack-methods/</loc>
		<lastmod>2020-08-13T08:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/acunetix-exhibiting-at-ismg-2020-virtual-cybersecurity-summit-new-york/</loc>
		<lastmod>2020-08-13T08:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/augmenting-native-cloud-service-provider-security/</loc>
		<lastmod>2020-08-13T09:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/google-classroom-monitoring-for-district-it-admins/</loc>
		<lastmod>2020-08-13T11:02:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/6-tips-to-reduce-contractor-account-compromise/</loc>
		<lastmod>2020-08-14T07:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cyber-Insurance.jpg</image:loc>
			<image:title><![CDATA[Cyber-Insurance]]></image:title>
			<image:caption><![CDATA[contractor]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cybersecai-connected-qa-with-roger-dingledine-avast/</loc>
		<lastmod>2020-08-13T11:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/considerations-towards-enabling-a-virtual-soc-environment/</loc>
		<lastmod>2020-08-13T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-ways-to-prevent-password-cracking/</loc>
		<lastmod>2020-08-13T12:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/mono-or-multi-repository-a-dilemma-in-the-serverless-world/</loc>
		<lastmod>2020-08-13T12:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/walgreens-discloses-data-breach-impacting-personal-health-information-of-more-than-72000-customers/</loc>
		<lastmod>2020-08-13T13:14:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fraud-and-phishing-oh-my/</loc>
		<lastmod>2020-08-13T13:51:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-is-modern-desktop-management/</loc>
		<lastmod>2020-08-13T13:58:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/addressing-the-video-quality-and-performance-measurement-gap-with-quality-of-performance-qop-metrics/</loc>
		<lastmod>2020-08-13T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-guide-how-akamai-helps-you-protect-privacy-data/</loc>
		<lastmod>2020-08-13T14:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/poor-grammar-makes-for-a-poor-extortion-campaign-you-under-attack-pay-us-before-make-drama/</loc>
		<lastmod>2020-08-13T14:19:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/breaking-down-risky-open-source-libraries-by-language/</loc>
		<lastmod>2020-08-13T14:23:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/safeguarding-sensitive-law-enforcement-data-a-case-study/</loc>
		<lastmod>2020-08-13T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/firemon-appoints-brian-keets-chief-revenue-officer-as-company-continues-to-exceed-market-growth-expectations-with-300-growth/</loc>
		<lastmod>2020-08-13T14:34:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/isps-should-offer-network-parental-controls-and-customers-should-demand-it/</loc>
		<lastmod>2020-08-13T14:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cyber-security-a-big-concern-of-local-and-county-government-technology-leaders/</loc>
		<lastmod>2020-08-13T14:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/top-6-cybersecurity-books-for-it-auditors/</loc>
		<lastmod>2020-08-13T14:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/podcast-recap-email-attack-trend-predictions-for-2020/</loc>
		<lastmod>2020-08-13T14:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/identifying-covid-19-phishing-scams/</loc>
		<lastmod>2020-08-13T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/accelerating-web-security-for-a-global-retailer/</loc>
		<lastmod>2020-08-13T15:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-hadrien-barrals-and-remi-geraud-stewarts-dnssection-a-practical-attack-on-dnssec-zone-walking/</loc>
		<lastmod>2020-08-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/severe-teamviewer-vulnerability-let-attackers-steal-system-password/</loc>
		<lastmod>2020-08-13T16:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/making-infosec-jobs-easier-preventing-ransomware/</loc>
		<lastmod>2020-08-13T16:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/block-malicious-traffic-in-1-click-with-our-new-bot-protection-for-cloudways/</loc>
		<lastmod>2020-08-13T16:57:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cisa-warns-of-phishing-emails-leading-to-spoofed-covid-19-relief-page/</loc>
		<lastmod>2020-08-13T16:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-wish-on-a-shooting-star/</loc>
		<lastmod>2020-08-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/adaptive-shield-rises-to-saas-app-security-challenge/</loc>
		<lastmod>2020-08-13T17:13:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Development-Security-Rift.jpg</image:loc>
			<image:title><![CDATA[Development-Security-Rift]]></image:title>
			<image:caption><![CDATA[Adaptive Shield]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Adaptive-Shield-screenshot-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-nsa-on-the-risks-of-exposing-location-data/</loc>
		<lastmod>2020-08-13T17:41:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-sean-metcalfs-pyrotek3-hacking-the-hybrid-cloud/</loc>
		<lastmod>2020-08-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/now-is-the-perfect-time-for-cisos-to-tame-the-security-frontier/</loc>
		<lastmod>2020-08-13T18:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-covid-19-pandemic-and-other-issues-are-stressing-corporate-cyber-risk-management/</loc>
		<lastmod>2020-08-13T18:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/divvycloud-ranks-no-471-on-inc-5000-list-of-fastest-growing-companies-in-america/</loc>
		<lastmod>2020-08-13T19:03:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/smoker-backdoor-evasion-techniques-in-webshell-backdoors/</loc>
		<lastmod>2020-08-13T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/uncovering-secrets-in-code-a-case-study/</loc>
		<lastmod>2020-08-13T19:56:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/partnering-with-microsoft-on-hackathon-2020-and-saving-the-planet/</loc>
		<lastmod>2020-08-13T20:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/hacking-the-tor-network-follow-up-updated-2020/</loc>
		<lastmod>2020-08-13T20:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/overlooked-the-biggest-risk-of-all/</loc>
		<lastmod>2020-08-13T20:46:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/qa-top-threats-in-2020-featuring-research-from-forrester/</loc>
		<lastmod>2020-08-13T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/financial-cyberthreats-what-you-need-to-know-to-protect-your-business/</loc>
		<lastmod>2020-08-13T22:38:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sans-data-incident-2020-indicators-of-compromise/</loc>
		<lastmod>2020-08-13T23:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-importance-of-endpoint-security/</loc>
		<lastmod>2020-08-13T23:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/solving-mssp-challenges-with-soar-2/</loc>
		<lastmod>2020-08-14T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/solving-mssp-challenges-with-soar/</loc>
		<lastmod>2020-08-14T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-role-should-social-media-play-in-discovering-vulnerabilities/</loc>
		<lastmod>2020-08-14T00:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/integrating-the-risk-management-framework-rmf-with-devops/</loc>
		<lastmod>2020-08-14T03:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/identity-wars-episode-ix-the-rise-of-skywalker-and-cybersecurity/</loc>
		<lastmod>2020-08-14T06:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/organizations-improve-security-posture-with-forticlouds-saas-offerings/</loc>
		<lastmod>2020-08-14T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-contextual-marketing-wins-avast/</loc>
		<lastmod>2020-08-14T07:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/stress-age-play-role-in-cyber-mistakes/</loc>
		<lastmod>2020-08-17T06:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/stressedout.jpg</image:loc>
			<image:title><![CDATA[stressedout]]></image:title>
			<image:caption><![CDATA[mistakes]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/russias-gru-military-unit-behind-previously-unknown-linux-malware-nsa-says/</loc>
		<lastmod>2020-08-14T12:51:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ncsc-shut-down-300k-urls-linked-to-investment-scams-in-4-months/</loc>
		<lastmod>2020-08-14T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/10-elements-of-the-most-effective-application-security-programs/</loc>
		<lastmod>2020-08-14T15:40:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-wesley-neelens-and-rik-van-duijns-hacking-traffic-lights/</loc>
		<lastmod>2020-08-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/tales-from-the-front-lines-maintaining-detection-efficacy-and-your-cool-in-the-summer-heat/</loc>
		<lastmod>2020-08-14T16:54:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/scammers-sell-fake-views-likes-on-reels-avast/</loc>
		<lastmod>2020-08-14T16:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-joy-of-tech-a-psa-from-sputnik/</loc>
		<lastmod>2020-08-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/most-cios-consider-adopting-emerging-security-technologies-in-2020/</loc>
		<lastmod>2020-08-14T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/too-many-security-tools-can-be-as-bad-as-too-few/</loc>
		<lastmod>2020-08-14T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/two-cisos-pay-400k-for-security-yet-one-spends-10x-more-how/</loc>
		<lastmod>2020-08-14T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-shlomi-obermans-moshe-kols-and-ariel-schons-hacking-the-supply-chain/</loc>
		<lastmod>2020-08-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/medical-debt-collection-firm-r1-rcm-hit-in-ransomware-attack/</loc>
		<lastmod>2020-08-14T18:56:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/weekly-news-roundup-august-10-14-2020/</loc>
		<lastmod>2020-08-14T19:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/web-crawler-user-agent-blocking-techniques/</loc>
		<lastmod>2020-08-14T20:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cisco-survey-demonstrates-financial-benefit-of-enterprise-data-security/</loc>
		<lastmod>2020-08-14T21:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/drovorub-russia-pushing-invisible-malware-say-nsa-and-fbi/</loc>
		<lastmod>2020-08-14T22:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/gru-mil-ru-cc-by.jpg</image:loc>
			<image:title><![CDATA[gru--mil-ru--cc-by]]></image:title>
			<image:caption><![CDATA[GRU]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/top-9-free-phishing-simulators/</loc>
		<lastmod>2020-08-15T01:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-dangers-of-persistent-binaries-and-how-to-spot-them-part-ii-2/</loc>
		<lastmod>2020-08-15T13:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-dangers-of-persistent-binaries-and-how-to-spot-them-part-ii/</loc>
		<lastmod>2020-08-15T13:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-bill-demirkapis-demystifying-modern-windows-rootkits/</loc>
		<lastmod>2020-08-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-covid-risk-comfort-zone/</loc>
		<lastmod>2020-08-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-erik-hunstads-domain-fronting-is-dead-long-live-domain-fronting-using-tls-1-3-to-evade-censors-bypass-network-defenses-and-blend-in-with-the-noise/</loc>
		<lastmod>2020-08-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/wordpress-limit-login-attempts-how-to-do-it/</loc>
		<lastmod>2020-08-15T19:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/which-industries-are-the-biggest-security-targets/</loc>
		<lastmod>2020-08-16T15:43:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-jiska-classens-and-francesco-gringolis-spectra-new-wireless-escalation-targets/</loc>
		<lastmod>2020-08-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/robert-m-lees-jeff-haas-little-bobby-comics-week-290/</loc>
		<lastmod>2020-08-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/as-military-cyber-policies-change-should-others-do-the-same/</loc>
		<lastmod>2020-08-16T17:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-safe-mode-slava-makkaveevs-pwn2own-qualcomm-compute-dsp-for-fun-and-profit/</loc>
		<lastmod>2020-08-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/death-of-the-dust-seeker/</loc>
		<lastmod>2020-08-16T18:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/amazon-echo-exploit-privacy-shield-capital-one-data-breach-update/</loc>
		<lastmod>2020-08-17T04:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/</loc>
		<lastmod>2020-08-17T04:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/this-day-in-history-us-dropped-atomic-bomb-on-hiroshima-japan/</loc>
		<lastmod>2020-08-17T04:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/bridging-the-cybersecurity-skills-gap-through-artificial-intelligence/</loc>
		<lastmod>2020-08-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fortinet-receives-accolades-with-crns-2020-annual-report-card-award-wins/</loc>
		<lastmod>2020-08-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-tech-a-better-way-to-secure-agile-software-integrate-app-scanning-pen-testing-into-waf/</loc>
		<lastmod>2020-08-17T07:05:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sql-injection-xss-and-rce-top-list-of-vulnerabilities-in-internet-facing-applications/</loc>
		<lastmod>2020-08-17T07:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/self-servicing-f5-big-ip-provisioning-using-as3-and-appviewx/</loc>
		<lastmod>2020-08-17T07:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/step-by-step-configuration-with-github/</loc>
		<lastmod>2020-08-17T08:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cybersecurity-lessons-from-the-pandemic-models-and-predictions/</loc>
		<lastmod>2020-08-17T10:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/using-echidna-to-test-a-smart-contract-library/</loc>
		<lastmod>2020-08-17T11:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/canada-revenue-agency-discloses-credential-stuffing-attack-on-5500-service-accounts/</loc>
		<lastmod>2020-08-17T11:12:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/kentucky-based-fine-spirits-manufacturer-targeted-by-revil-ransomware/</loc>
		<lastmod>2020-08-17T11:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/is-it-time-for-work-2-0/</loc>
		<lastmod>2020-08-17T12:01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/is-it-time-for-work-2-0-2/</loc>
		<lastmod>2020-08-17T12:01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/establishing-a-secure-long-term-workforce-outside-the-four-walls/</loc>
		<lastmod>2020-08-18T07:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Cities-Governments-Cyber.jpg</image:loc>
			<image:title><![CDATA[workforce security]]></image:title>
			<image:caption><![CDATA[secure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/as-military-cyber-policies-change-should-others-do-the-same-2/</loc>
		<lastmod>2020-08-17T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/garbage-in-gospel-out-the-security-problem-of-data-accuracy/</loc>
		<lastmod>2020-08-18T06:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Online-Real-Law.jpg</image:loc>
			<image:title><![CDATA[judging data]]></image:title>
			<image:caption><![CDATA[data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-maintain-business-continuity-and-recover-from-disasters/</loc>
		<lastmod>2020-08-17T13:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/bossplayersctf-1-vulnhub-ctf-walkthrough/</loc>
		<lastmod>2020-08-17T13:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sim-swapping-security-risks-what-they-are-and-how-to-protect-yourself/</loc>
		<lastmod>2020-08-17T13:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-importance-of-subject-matter-experts/</loc>
		<lastmod>2020-08-17T14:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/researcher-discloses-9-leaky-github-repos-affecting-200k-u-s-residents-and-possibly-many-more/</loc>
		<lastmod>2020-08-17T14:23:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/a-security-evolution-taking-security-beyond-siem-with-behavior-analytics/</loc>
		<lastmod>2020-08-17T14:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ffiec-cybersecurity-compliance-explained/</loc>
		<lastmod>2020-08-17T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-avoid-fake-news-avast/</loc>
		<lastmod>2020-08-17T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-safe-mode-cooper-quintins-detecting-fake-4g-base-stations-in-real-time/</loc>
		<lastmod>2020-08-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/credential-stuffing-attacks-targeted-gckey-cra-accounts/</loc>
		<lastmod>2020-08-17T16:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/scm-understanding-its-place-in-your-organizations-digital-security-strategy/</loc>
		<lastmod>2020-08-17T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-joy-of-tech-on-line-trolling-from-the-archive-december-2015/</loc>
		<lastmod>2020-08-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/an-exciting-new-chapter-for-forescout/</loc>
		<lastmod>2020-08-17T17:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-safe-mode-joshua-madduxs-when-tls-hacks-you/</loc>
		<lastmod>2020-08-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/customer-corner-new-jersey-courts-ciso-on-how-they-kept-the-courts-open-during-covid-19/</loc>
		<lastmod>2020-08-17T18:50:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/identifying-and-protecting-devices-vulnerable-to-ripple20/</loc>
		<lastmod>2020-08-17T19:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/infocyte-appoints-virginia-satrom-as-vice-president-of-marketing/</loc>
		<lastmod>2020-08-17T19:48:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/welcome-to-checkmarx-golang-week/</loc>
		<lastmod>2020-08-17T19:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/to-improve-devsecops-set-application-security-priorities/</loc>
		<lastmod>2020-08-17T19:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/twitter-hack-old-dog-new-tricks/</loc>
		<lastmod>2020-08-17T22:16:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/are-you-using-the-full-potential-of-your-soc-5-trends-that-will-reshape-modern-security-operations/</loc>
		<lastmod>2020-08-17T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/small-business-owners-in-the-us-hit-with-phishing-campaign-impersonating-sba-officials/</loc>
		<lastmod>2020-08-17T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/webinar-tryhackme-behind-the-curtain/</loc>
		<lastmod>2020-08-17T22:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/introduction-to-cryptography/</loc>
		<lastmod>2020-08-18T04:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/a-brief-guide-to-how-to-prevent-email-phishing-attacks/</loc>
		<lastmod>2020-08-18T05:40:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/exploited-in-the-wild-it-took-microsoft-734-days-to-patch-this-vulnerability/</loc>
		<lastmod>2020-08-18T06:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-your-industry-can-benefit-from-secure-sd-wan-too/</loc>
		<lastmod>2020-08-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-report-examines-the-pandemics-impact-on-cyber-security/</loc>
		<lastmod>2020-08-18T07:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-is-machine-learning-and-how-does-it-benefit-cybersecurity/</loc>
		<lastmod>2020-08-18T08:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-create-a-secure-web-server-avast/</loc>
		<lastmod>2020-08-18T10:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/vaccine-for-emotet-malware/</loc>
		<lastmod>2020-08-18T11:03:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/survey-finds-lag-in-crisis-response-planning/</loc>
		<lastmod>2020-08-19T06:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto34418615.jpg</image:loc>
			<image:title><![CDATA[crisis response]]></image:title>
			<image:caption><![CDATA[crisis]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/security-execs-advice-on-overcoming-the-challenges-of-remote-work/</loc>
		<lastmod>2020-08-18T11:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/from-customer-to-employee-a-tripwire-journey/</loc>
		<lastmod>2020-08-18T11:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/tips-to-help-secure-a-remote-workforce/</loc>
		<lastmod>2020-08-19T07:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/WFHstress.jpg</image:loc>
			<image:title><![CDATA[WFHstress]]></image:title>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/four-trends-in-cybercrime-amid-crisis/</loc>
		<lastmod>2020-08-18T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/together-is-faster-zeek-for-vulnerabilities/</loc>
		<lastmod>2020-08-18T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-recruiting-cybersecurity-talent-is-like-looking-for-a-needle-in-a-haystack/</loc>
		<lastmod>2020-08-18T12:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cisa-warns-of-phishing-campaign-used-to-deploy-konni-malware/</loc>
		<lastmod>2020-08-18T12:32:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/carnival-corporation-discloses-ransomware-attack-personal-data-of-employees-and-guests-potentially-accessed/</loc>
		<lastmod>2020-08-18T13:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/proctoru-breach-learnings-avast/</loc>
		<lastmod>2020-08-18T13:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/puttin-on-the-ritz-fine-dining-customers-targeted-with-phone-scams-after-ritz-london-data-breach/</loc>
		<lastmod>2020-08-18T13:32:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/interim-rule-implements-section-889-ban-on-contractors-using-certain-telecoms-equipment/</loc>
		<lastmod>2020-08-18T13:46:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-url-danger-zone/</loc>
		<lastmod>2020-08-18T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-attack-alert-duri/</loc>
		<lastmod>2020-08-18T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/meet-george-vukcevich-respond-softwares-new-vice-president-of-sales/</loc>
		<lastmod>2020-08-18T14:01:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/carnival-reveals-it-detected-a-ransomware-attack-on-its-systems/</loc>
		<lastmod>2020-08-18T14:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/phishing-for-bitcoin-the-twitter-hack-masterminded-by-a-17-year-old/</loc>
		<lastmod>2020-08-18T14:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/senserva-debuts-security-platform-for-managing-microsoft-365-and-azure-active-directory-accounts-with-deep-security-and-compliance-risk-assessment/</loc>
		<lastmod>2020-08-18T14:41:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cyware-raises-10m-for-its-cyber-fusion-solution-to-automate-threat-intelligence-and-response/</loc>
		<lastmod>2020-08-18T14:42:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cybrary-releases-az-500-certification-course-to-expand-its-industry-leading-azure-cloud-training-catalog/</loc>
		<lastmod>2020-08-18T14:44:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/netsurion-adds-deep-learning-based-endpoint-threat-prevention-with-deep-instinct-partnership/</loc>
		<lastmod>2020-08-18T14:45:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/comforte-ag-partners-with-blue-star-engineering-electronics/</loc>
		<lastmod>2020-08-18T14:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/untangle-ng-firewall-crowned-best-networking-security-solution-by-tech-ascension-awards-2/</loc>
		<lastmod>2020-08-18T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/untangle-ng-firewall-crowned-best-networking-security-solution-by-tech-ascension-awards/</loc>
		<lastmod>2020-08-18T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-cysa-knowledge-domains/</loc>
		<lastmod>2020-08-18T15:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-your-home-network-can-be-hacked-and-how-to-prevent-it/</loc>
		<lastmod>2020-08-18T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-jack-bakers-finding-and-exploiting-bugs-in-multiplayer-game-engines/</loc>
		<lastmod>2020-08-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/insights-from-verizons-covid-19-breach-landscape-report-working-from-home-wfh-leads-to-greater-vulnerability/</loc>
		<lastmod>2020-08-18T16:01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cve-2020-10029-buffer-overflow-in-gnu-libc-trigonometry-functions/</loc>
		<lastmod>2020-08-18T16:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/making-infosec-jobs-easier-responding-to-cybersecurity-incidents/</loc>
		<lastmod>2020-08-18T16:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/you-better-get-going-with-go/</loc>
		<lastmod>2020-08-18T16:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-dependency/</loc>
		<lastmod>2020-08-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-get-an-it-security-job-3-hot-skill-sets/</loc>
		<lastmod>2020-08-18T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/idaptive-release-20-3-is-now-available/</loc>
		<lastmod>2020-08-18T17:47:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-eyal-itkins-dont-be-silly-its-only-a-lightbulb/</loc>
		<lastmod>2020-08-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-80-of-orgs-can-overcome-a-lack-of-training-for-developers/</loc>
		<lastmod>2020-08-18T18:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/as-the-2020-holiday-season-approaches-optimized-digital-experiences-are-vital-for-retailers/</loc>
		<lastmod>2020-08-18T19:23:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/intro-to-blockchain-as-a-service-baas/</loc>
		<lastmod>2020-08-18T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/69-say-their-appsec-is-effective-but-dont-have-tools-to-measure-it/</loc>
		<lastmod>2020-08-18T20:08:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-tpm-from-cybersecurity-newbie-to-sophisticated-threat-defender/</loc>
		<lastmod>2020-08-18T20:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-use-pastebin-for-cyber-threat-intelligence-research/</loc>
		<lastmod>2020-08-18T21:17:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/it-takes-two-why-you-need-agentless-agent-based-scanning/</loc>
		<lastmod>2020-08-18T21:55:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/take-it-operations-to-the-next-level-with-dataops/</loc>
		<lastmod>2020-08-18T22:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/newsbites-drilldown-for-the-week-ending-14-august-2020/</loc>
		<lastmod>2020-08-18T23:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cdn-filestore-credit-card-stealer-for-magento/</loc>
		<lastmod>2020-08-19T01:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/lessons-learned-and-best-practices-for-remote-workforce-network-security/</loc>
		<lastmod>2020-08-19T02:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cve-2020-10029-buffer-overflow-in-gnu-libc-trigonometry-functions-3/</loc>
		<lastmod>2020-08-19T03:57:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/taking-care-of-your-data-responsibilities-in-a-shared-responsibility-model-in-the-cloud/</loc>
		<lastmod>2020-08-19T03:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/hundreds-of-urls-inside-microsoft-excel-spreads-new-dridex-trojan-variant/</loc>
		<lastmod>2020-08-19T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/report-shows-how-organizations-are-increasing-investments-to-secure-remote-work/</loc>
		<lastmod>2020-08-19T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/paper-ballots-more-secure-than-e-voting-or-blockchain/</loc>
		<lastmod>2020-08-19T09:48:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/voted-element5-digital-pexels.jpg</image:loc>
			<image:title><![CDATA[voted--element5-digital--pexels]]></image:title>
			<image:caption><![CDATA[ballot]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/book-review-crime-dot-com-from-viruses-to-vote-rigging-how-hacking-went-global/</loc>
		<lastmod>2020-08-19T10:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/taking-third-party-application-security-to-the-next-level-version-2-8s-multiple-website-dashboard/</loc>
		<lastmod>2020-08-19T10:05:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ex-tennessee-university-employee-sentenced-to-over-30-months-for-student-loan-fraud-aggravated-identity-theft/</loc>
		<lastmod>2020-08-19T11:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fewer-but-faster-the-new-reality-for-a-cios-transformation-plans/</loc>
		<lastmod>2020-08-19T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fighting-fraud-amid-a-pandemic-follow-the-money/</loc>
		<lastmod>2020-08-19T12:08:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Mobile-Security-Threats.jpg</image:loc>
			<image:title><![CDATA[Mobile-Security-Threats]]></image:title>
			<image:caption><![CDATA[pandemic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/infocyte-integrates-with-palo-alto-networks-cortex-xsoar-to-automate-endpoint-detection-and-response-to-soc-workflows/</loc>
		<lastmod>2020-08-19T12:25:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/voice-phishers-targeting-corporate-vpns/</loc>
		<lastmod>2020-08-19T13:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/decryption-tool-released-for-wannaren-ransomware/</loc>
		<lastmod>2020-08-19T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/an-interview-with-vendia-founders-tim-wagner-shruthi-rao/</loc>
		<lastmod>2020-08-19T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-bitglass-sase-triangle-casb-for-managed-apps/</loc>
		<lastmod>2020-08-19T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ssl-protective-technology-turned-attack-vector/</loc>
		<lastmod>2020-08-19T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/lacework-adds-active-host-vulnerability-monitoring-and-ci-cd-integrations-as-demand-for-unified-saas-cloud-security-solution-surges/</loc>
		<lastmod>2020-08-19T15:38:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ncsc-blocks-large-fake-celebrity-endorsed-investment-scam/</loc>
		<lastmod>2020-08-19T15:43:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cybersecurity-at-the-movies-zombieland/</loc>
		<lastmod>2020-08-19T15:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/race-conditions-can-exist-in-go/</loc>
		<lastmod>2020-08-19T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-bill-graydons-exploiting-key-space-vulnerabilities-in-the-physical-world/</loc>
		<lastmod>2020-08-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/5-trends-to-consider-for-effective-security-training/</loc>
		<lastmod>2020-08-20T06:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Career-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Career-Cybersecurity]]></image:title>
			<image:caption><![CDATA[training]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/trinity-cyber-inc-appoints-thomas-p-bossert-president/</loc>
		<lastmod>2020-08-19T16:41:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/consoling/</loc>
		<lastmod>2020-08-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/autonomous-identity-how-to-overcome-identity-governance-fatigue/</loc>
		<lastmod>2020-08-19T17:26:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-elie-burszteins-a-hackers-guide-to-reducing-side-channel-attack-surfaces-using-deep-learning/</loc>
		<lastmod>2020-08-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/robert-m-lees-jeff-haas-little-bobby-comics-week-99-from-the-december-2016-archive/</loc>
		<lastmod>2020-08-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-your-soc-team-can-triumph-with-tabletop-exercises-free-guide/</loc>
		<lastmod>2020-08-19T19:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/wannaren-decryption-tool/</loc>
		<lastmod>2020-08-19T19:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/from-prototype-pollution-to-full-on-remote-code-execution-how-can-adversaries-exploit-npm-modules/</loc>
		<lastmod>2020-08-19T19:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/using-kubelet-client-to-attack-the-kubernetes-cluster/</loc>
		<lastmod>2020-08-19T20:24:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/defensible-risk-management-can-improve-your-job-security/</loc>
		<lastmod>2020-08-19T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/contrast-application-security-platform-accepted-into-department-of-defense-platform-one/</loc>
		<lastmod>2020-08-19T20:28:41+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->