<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-safely-access-sensitive-data-from-home-part-1-2/</loc>
		<lastmod>2020-08-19T20:35:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-safely-access-sensitive-data-from-home-part-1/</loc>
		<lastmod>2020-08-19T20:35:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/enterprise-threat-protector-now-includes-one-click-performance-optimization-for-microsoft-365/</loc>
		<lastmod>2020-08-19T21:29:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-criminals-attack-the-games-industry/</loc>
		<lastmod>2020-08-19T21:46:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-does-zero-trust-look-like-for-third-parties/</loc>
		<lastmod>2020-08-19T21:59:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/using-disinformation-to-cause-a-blackout/</loc>
		<lastmod>2020-08-19T22:17:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/four-in-ten-organizations-suffered-a-breach-due-to-unpatched-vulnerabilities-in-the-past-two-years/</loc>
		<lastmod>2020-08-19T22:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/average-ransom-payment-rises-60-percent-in-three-months-study-finds/</loc>
		<lastmod>2020-08-19T22:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-webinar-cybersecurity-virtual-tabletops-ensure-success-in-the-new-normal/</loc>
		<lastmod>2020-08-19T22:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/stay-safe-online-when-going-back-to-school-avast/</loc>
		<lastmod>2020-08-19T22:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-paper-future-of-the-soc-forces-shaping-modern-security-operations/</loc>
		<lastmod>2020-08-19T23:31:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/6-new-things-i-learned-in-my-balbix-summer-internship/</loc>
		<lastmod>2020-08-19T23:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/understanding-the-fundamental-rights-of-the-data-subject-and-establishing-your-data-privacy-program-with-soar/</loc>
		<lastmod>2020-08-20T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/understanding-the-fundamental-rights-of-the-data-subject-and-establishing-your-data-privacy-program-with-soar-2/</loc>
		<lastmod>2020-08-20T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/countering-ransomware-with-attackiqs-security-optimization-platform/</loc>
		<lastmod>2020-08-20T00:15:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/snail-mail-with-a-privacy-twist/</loc>
		<lastmod>2020-08-20T06:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-is-machine-identity-management-keyfactor/</loc>
		<lastmod>2020-08-20T06:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-mssp-opportunity-around-network-access-controls/</loc>
		<lastmod>2020-08-20T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/getting-to-faster-vulnerability-remediation-during-devsecops/</loc>
		<lastmod>2020-08-20T07:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-power-of-modern-dast-miles-technologies/</loc>
		<lastmod>2020-08-20T08:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/turning-the-lights-out-on-hackers/</loc>
		<lastmod>2020-08-20T09:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/utah-gun-exchange-confirms-data-breach-after-bad-actors-publishes-stolen-customer-records-online/</loc>
		<lastmod>2020-08-20T10:51:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/4-google-classroom-security-issues/</loc>
		<lastmod>2020-08-20T11:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/achieving-product-platform-mindset/</loc>
		<lastmod>2020-08-20T11:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/nebulous-security-visibility-needs-3-vantage-points/</loc>
		<lastmod>2020-08-21T07:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/telescope.jpg</image:loc>
			<image:title><![CDATA[telescope]]></image:title>
			<image:caption><![CDATA[security visibility]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/stool.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/drovorub-taking-systems-to-the-wood-chipper-what-you-need-to-know/</loc>
		<lastmod>2020-08-20T11:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/supplementing-sccs-to-solve-surveillance-shortfalls/</loc>
		<lastmod>2020-08-20T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/diagnosing-the-cybersecurity-challenges-in-healthcare/</loc>
		<lastmod>2020-08-20T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-are-you-addressing-the-nsa-cisa-immediate-recommended-actions/</loc>
		<lastmod>2020-08-20T12:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/industrial-control-systems-more-vulnerable-to-hacks-during-covid-19-report-shows/</loc>
		<lastmod>2020-08-20T12:10:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/exposed-hacking-training-videos-provide-insight-into-hacking-ops/</loc>
		<lastmod>2020-08-21T06:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Cyberwar-Security-Pros.jpg</image:loc>
			<image:caption><![CDATA[hacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/imperva-mitigates-largest-ddos-attacks-of-2020-so-far/</loc>
		<lastmod>2020-08-20T13:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/all-about-the-cissp/</loc>
		<lastmod>2020-08-20T14:07:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-changing-face-of-loyalty-programs-amid-and-post-covid-19/</loc>
		<lastmod>2020-08-20T14:23:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/myth-1-network-security-compliance-is-not-all-about-rules-and-access-control/</loc>
		<lastmod>2020-08-20T14:40:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/healthcare-data-breach-costs-rise/</loc>
		<lastmod>2020-08-20T14:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/4-questions-to-ask-about-open-banking-compliance/</loc>
		<lastmod>2020-08-20T14:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/speaking-developers-love-languages/</loc>
		<lastmod>2020-08-20T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-ultimate-guide-to-wordpress-user-management/</loc>
		<lastmod>2020-08-20T15:46:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/united-states-air-force-partners-with-pluralsight-to-power-digital-u-technology-skills-development-program/</loc>
		<lastmod>2020-08-20T15:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-patrick-wardles-office-drama-on-macos/</loc>
		<lastmod>2020-08-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/mixmode-platform-update-support-for-google-cloud/</loc>
		<lastmod>2020-08-20T16:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-isolation-changes-incident-response/</loc>
		<lastmod>2020-08-20T16:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-get-your-data-centric-security-project-off-the-ground/</loc>
		<lastmod>2020-08-20T16:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-boat-puzzle/</loc>
		<lastmod>2020-08-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/thinking-like-a-fraudster-pays-off/</loc>
		<lastmod>2020-08-20T17:28:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-panel-d0-n0-h4rm-a-healthcare-security-conversation-panel/</loc>
		<lastmod>2020-08-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/data-leaks-in-2020-accelerated-digital-transformation-exposes-enterprises/</loc>
		<lastmod>2020-08-20T18:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cisa-secure-your-web-browser-its-essential/</loc>
		<lastmod>2020-08-20T20:17:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/experian-south-africa-announces-investigation-into-data-incident/</loc>
		<lastmod>2020-08-20T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/bugcrowd-launches-ma-security-assessment-service/</loc>
		<lastmod>2020-08-20T21:53:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Safety-Act-Terrorism-Certified.jpg</image:loc>
			<image:title><![CDATA[Safety-Act-Terrorism-Certified]]></image:title>
			<image:caption><![CDATA[Bugcrowd]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/browser-extensions-an-overlooked-phishing-attack-vector/</loc>
		<lastmod>2020-08-20T23:08:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/lessons-learned-spotify-certificate-outage-keyfactor/</loc>
		<lastmod>2020-08-20T23:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/storage-management-best-practices-part-1-components-in-motion/</loc>
		<lastmod>2020-08-20T23:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/covid-19-chloroquine-pharmaspam/</loc>
		<lastmod>2020-08-20T23:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/qakbot-qbot-maldoc-campaign-introduces-two-new-techniques-into-its-arsenal/</loc>
		<lastmod>2020-08-20T23:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fortinet-secures-and-simplifies-customer-migration-to-oracle-cloud-infrastructure/</loc>
		<lastmod>2020-08-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/assessing-the-risk-of-compromised-credentials/</loc>
		<lastmod>2020-08-21T08:35:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/former-uber-exec-faces-eight-years-in-prison-over-cover-up-of-2016-hack/</loc>
		<lastmod>2020-08-21T09:32:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-do-i-need-a-managed-file-transfer-solution/</loc>
		<lastmod>2020-08-21T10:56:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/smes-especially-vulnerable-to-pandemic-security-challenges/</loc>
		<lastmod>2020-08-24T07:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto44559434.jpg</image:loc>
			<image:title><![CDATA[security challenges]]></image:title>
			<image:caption><![CDATA[open source security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/yet-another-biometric-bioacoustic-signatures/</loc>
		<lastmod>2020-08-21T11:03:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/is-a-ransomware-attack-a-reportable-data-breach/</loc>
		<lastmod>2020-08-24T06:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Security-Mistakes.jpg</image:loc>
			<image:title><![CDATA[danger]]></image:title>
			<image:caption><![CDATA[breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/university-of-utah-paid-457000-to-prevent-ransomware-operators-from-leaking-stolen-data/</loc>
		<lastmod>2020-08-21T11:53:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/selecting-the-best-soar-solution-series-case-management-in-point-part-3/</loc>
		<lastmod>2020-08-21T13:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/university-of-utah-paid-over-450k-to-ransomware-attackers/</loc>
		<lastmod>2020-08-21T13:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/some-email-services-vulnerable-to-mailto-attacks-avast/</loc>
		<lastmod>2020-08-21T13:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/harmonize-finserv-cybersecurity-standards-with-the-financial-sector-cybersecurity-profile/</loc>
		<lastmod>2020-08-21T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-peleg-hadars-and-tomer-bars-a-decade-after-stuxnets-printer-vulnerability-printing-is-still-the-stairway-to-heaven/</loc>
		<lastmod>2020-08-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-move-your-innovations-along-on-the-application-security-range/</loc>
		<lastmod>2020-08-21T16:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/nearly-40-percent-of-uk-businesses-laid-off-staff-due-to-security-policy-breaches-since-work-from-home-shift/</loc>
		<lastmod>2020-08-21T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/daniel-storis-back-and-forth/</loc>
		<lastmod>2020-08-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/instagram-influencer-arrested-amid-claims-of-350-million-global-cyber-scam/</loc>
		<lastmod>2020-08-21T17:01:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-james-pavurs-whispers-among-the-stars-perpetrating-and-preventing-satellite-eavesdropping-attacks/</loc>
		<lastmod>2020-08-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-hacker-mind-podcast-inside-darpas-cyber-grand-challenge/</loc>
		<lastmod>2020-08-21T18:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/uber-ex-ciso-charged-obstruction-and-misprision-say-doj-fbi/</loc>
		<lastmod>2020-08-21T19:18:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/uber-freestocks-cc-0.jpg</image:loc>
			<image:title><![CDATA[uber--freestocks--cc-0]]></image:title>
			<image:caption><![CDATA[Uber]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-importance-of-certificate-discovery-keyfactor/</loc>
		<lastmod>2020-08-21T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/akamai-identifies-copycat-ddos-extortion-rings/</loc>
		<lastmod>2020-08-21T19:41:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Fileless-Malware-RSAC.jpg</image:loc>
			<image:caption><![CDATA[Zerologon]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fbi-cisa-echo-warnings-on-vishing-threat/</loc>
		<lastmod>2020-08-21T20:34:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/securing-the-enterprise-from-boothole/</loc>
		<lastmod>2020-08-21T20:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-ways-to-improve-industrial-cybersecurity-iiot-aria/</loc>
		<lastmod>2020-08-22T00:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-cyber-security-pain-in-the-ast/</loc>
		<lastmod>2020-08-22T00:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-hacker-mind-podcast-inside-darpas-cyber-grand-challenge-3/</loc>
		<lastmod>2020-08-22T03:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/weekly-news-roundup-august-17-21-2020/</loc>
		<lastmod>2020-08-22T04:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-day-the-music-died-certificate-expiration-takes-down-spotify/</loc>
		<lastmod>2020-08-22T13:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-gal-zrors-dont-ruck-us-again-the-exploit-returns/</loc>
		<lastmod>2020-08-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-rabbit-introduction/</loc>
		<lastmod>2020-08-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-trey-keowns-and-brenda-sos-applied-cash-eviction-through-atm-exploitation/</loc>
		<lastmod>2020-08-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/tackling-the-challenges-of-cellular-iot/</loc>
		<lastmod>2020-08-23T11:11:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/heres-why-javascript-based-bot-detection-doesnt-work-is-your-site-listed-here/</loc>
		<lastmod>2020-08-23T15:20:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-michael-stays-how-we-recovered-xxx000-in-bitcoin-from-an-encrypted-zip-file/</loc>
		<lastmod>2020-08-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-device-control-is-critical-in-todays-enterprise-of-things-world/</loc>
		<lastmod>2020-08-23T16:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/robert-m-lees-jeff-haas-little-bobby-comics-week-291/</loc>
		<lastmod>2020-08-23T17:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-paul-marrapeses-abusing-p2p-to-hack-3-million-cameras/</loc>
		<lastmod>2020-08-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-it-ot-security-has-changed-in-the-wake-of-covid-19/</loc>
		<lastmod>2020-08-24T03:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-are-the-ways-to-respond-to-an-unintentional-hipaa-violation/</loc>
		<lastmod>2020-08-24T03:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/audio-recordings-used-to-copy-keys-carnival-ransomware-attack-social-media-profile-data-exposed/</loc>
		<lastmod>2020-08-24T04:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/your-comprehensive-guide-to-prevent-email-spoofing/</loc>
		<lastmod>2020-08-24T05:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fortinet-network-access-control-nac-receives-commendation-from-frost-sullivan/</loc>
		<lastmod>2020-08-24T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/guest-essay-skeptical-about-buying-life-insurance-online-heres-how-to-do-it-securely/</loc>
		<lastmod>2020-08-24T07:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-study-finds-75-of-codebases-have-vulnerabilities/</loc>
		<lastmod>2020-08-24T08:25:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-httponly-flag-protecting-cookies-against-xss/</loc>
		<lastmod>2020-08-24T08:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/bec-operators-switch-focus-on-finance-department-employees-over-executives-new-data-shows/</loc>
		<lastmod>2020-08-24T08:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/swg-without-certificate-hassles/</loc>
		<lastmod>2020-08-24T09:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/stop-treating-your-data-center-like-a-block-tower/</loc>
		<lastmod>2020-08-25T07:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/block-tower.jpg</image:loc>
			<image:title><![CDATA[block tower]]></image:title>
			<image:caption><![CDATA[data center]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/dicekeys/</loc>
		<lastmod>2020-08-24T11:23:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/rdp-used-by-iranian-actors-in-international-dharma-ransomware-attacks/</loc>
		<lastmod>2020-08-24T11:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-role-of-security-analytics-in-a-zero-trust-environment/</loc>
		<lastmod>2020-08-24T12:27:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/good-better-best-using-multi-factor-authentication-effectively/</loc>
		<lastmod>2020-08-24T12:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/mcafee-mvision-for-endpoint-achieves-fedramp-moderate-authorization/</loc>
		<lastmod>2020-08-24T12:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cost-effective-cloud-security-for-the-modern-enterprise-part-3/</loc>
		<lastmod>2020-08-24T12:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/addressing-the-cloud-security-readiness-gap/</loc>
		<lastmod>2020-08-24T13:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/securing-your-home-network-for-distance-learning-avast/</loc>
		<lastmod>2020-08-24T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/doppelpaymer-ransomware-resurgence-avast/</loc>
		<lastmod>2020-08-24T14:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/microsoft-announces-internet-explorer-11s-retirement-timeline/</loc>
		<lastmod>2020-08-24T15:07:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/integrating-checkmarx-security-results-within-gitlab/</loc>
		<lastmod>2020-08-24T15:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-yamila-levalles-bypassing-biometric-systems-with-3d-printing/</loc>
		<lastmod>2020-08-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/gartner-adds-machine-identity-management-to-its-hype-cycle-for-iam-technologies-2020/</loc>
		<lastmod>2020-08-24T16:06:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-use-google-for-802-1x-wi-fi/</loc>
		<lastmod>2020-08-24T16:24:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/bricata-and-garland-technology-announce-partnership/</loc>
		<lastmod>2020-08-24T16:27:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/james-mattis-gen-usmc-ret-secdef-coronavirus-public-service-announcement/</loc>
		<lastmod>2020-08-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/6-things-your-ot-cyber-security-company-should-do/</loc>
		<lastmod>2020-08-24T17:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-patrick-kileys-reverse-engineering-a-tesla-battery-management-system-for-moar-power/</loc>
		<lastmod>2020-08-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/harnessing-the-power-of-the-armis-standard-query-asq-tool-part-1/</loc>
		<lastmod>2020-08-24T18:16:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-safely-access-sensitive-data-from-home-part-2-2/</loc>
		<lastmod>2020-08-24T18:55:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-safely-access-sensitive-data-from-home-part-2/</loc>
		<lastmod>2020-08-24T18:55:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/distology-announces-new-partnership-with-award-winning-data-payment-security-provider/</loc>
		<lastmod>2020-08-24T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/daniel-storis-virtual-conference/</loc>
		<lastmod>2020-08-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/prevent-ato-attacks-during-the-covid-19-pandemic/</loc>
		<lastmod>2020-08-24T21:19:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/leveraging-fsscc-cybersecurity-profile-in-the-financial-sector/</loc>
		<lastmod>2020-08-24T21:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/active-directory-vs-ldap/</loc>
		<lastmod>2020-08-24T23:07:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/a-pci-dss-checklist-for-cios-worried-about-work-from-home-security/</loc>
		<lastmod>2020-08-25T03:38:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/considerations-for-managed-service-providers-as-sd-wan-adoption-grows/</loc>
		<lastmod>2020-08-25T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/dont-be-an-over-sharer-safety-precautions-to-take-when-outsourcing-to-a-developer/</loc>
		<lastmod>2020-08-25T08:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fake-malwarebytes-installation-files-distributing-coinminer-avast/</loc>
		<lastmod>2020-08-25T08:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/law-enforcement-agencies-warn-of-vishing-attacks-targeting-employees/</loc>
		<lastmod>2020-08-25T08:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/detecting-and-locking-down-network-based-malware-in-azure/</loc>
		<lastmod>2020-08-25T08:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/3-areas-of-your-it-infrastructure-that-scm-can-help-to-secure/</loc>
		<lastmod>2020-08-25T09:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/interview-with-an-expert-series-paul-degraaff/</loc>
		<lastmod>2020-08-25T09:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/5-steps-to-create-a-data-flow-map/</loc>
		<lastmod>2020-08-25T10:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/identifying-people-by-their-browsing-histories/</loc>
		<lastmod>2020-08-25T11:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/5-psychological-tricks-hackers-use-to-trick-you-into-downloading-files/</loc>
		<lastmod>2020-08-25T11:52:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/election-security-in-the-crosshairs/</loc>
		<lastmod>2020-08-25T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/social-media-account-discovery-with-genymotion/</loc>
		<lastmod>2020-08-25T12:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/there-but-not-there-phishing-emails-using-invisible-text/</loc>
		<lastmod>2020-08-25T13:20:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/littlephishing.jpg</image:loc>
			<image:title><![CDATA[littlephishing]]></image:title>
			<image:caption><![CDATA[phishing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/waf-and-rasp-best-practice-for-defense-in-depth/</loc>
		<lastmod>2020-08-25T13:30:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-a-great-customer-success-manager-csm-can-do-for-you/</loc>
		<lastmod>2020-08-25T13:39:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/malicious-sdk-spies-on-iphone-users-and-steals-ad-revenue-researchers-claim/</loc>
		<lastmod>2020-08-25T14:44:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/rough-seas-for-carnival/</loc>
		<lastmod>2020-08-25T14:47:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-survey-reveals-dangerous-gaps-in-crisis-management-plans%e2%80%af/</loc>
		<lastmod>2020-08-25T14:53:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/almost-235-million-youtube-tiktok-and-instagram-profiles-exposed-online-by-unsecured-database/</loc>
		<lastmod>2020-08-25T14:57:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/forcepoint-integrates-ericom-shield-adding-remote-browser-isolation-to-its-dynamic-edge-protection-cloud-native-sase-solution/</loc>
		<lastmod>2020-08-25T15:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/better-security-starts-with-better-employee-training/</loc>
		<lastmod>2020-08-26T07:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/SOAR-Mood-Swings.jpg</image:loc>
			<image:title><![CDATA[SOAR-Mood-Swings]]></image:title>
			<image:caption><![CDATA[security employees]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/perimeterx-launches-partner-program-to-help-providers-extend-their-app-security-portfolio-and-safely-accelerate-their-customers-digital-transformation/</loc>
		<lastmod>2020-08-25T15:35:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/threat-intelligence-in-a-post-covid-19-world-where-do-we-go-from-here/</loc>
		<lastmod>2020-08-25T15:39:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-safe-mode-jake-labelles-getting-shells-on-zos-with-surrogat-chains/</loc>
		<lastmod>2020-08-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/rangeforce-signs-disti360-as-middle-east-distributor-for-cloud-based-cybersecurity-training/</loc>
		<lastmod>2020-08-25T16:01:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/bridgefy-fail-insecure-for-use-in-protests/</loc>
		<lastmod>2020-08-25T16:15:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/police-spenser-withans-unsplash.jpg</image:loc>
			<image:title><![CDATA[police--spenser-withans--unsplash]]></image:title>
			<image:caption><![CDATA[Bridgefy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/conflicting-news-in-cloud-security-are-data-breaches-down/</loc>
		<lastmod>2020-08-25T16:24:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-tech-trend-micro-flattens-cyber-risks-from-software-development-to-deployment/</loc>
		<lastmod>2020-08-25T16:48:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/bitdefenders-mdr-lessons-learned-in-uniform/</loc>
		<lastmod>2020-08-25T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-you-need-to-know-about-file-sharing-for-business-avast/</loc>
		<lastmod>2020-08-25T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/a-key-milestone-on-my-perimeterx-journey-announcing-our-partner-program/</loc>
		<lastmod>2020-08-25T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-deer-turrets/</loc>
		<lastmod>2020-08-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/product-update-how-to-audit-google-meet-bombing-and-other-improper-access-or-behavior/</loc>
		<lastmod>2020-08-25T17:08:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-zhipeng-huos-and-chuanda-dings-evil-printer-how-to-hack-windows-machines-with-printing-protocol/</loc>
		<lastmod>2020-08-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/staying-on-the-rails-piper-networks-codesonar-case-study/</loc>
		<lastmod>2020-08-25T18:57:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/enterprise-application-access-client-eaa-vulnerability-cve-2019-18847/</loc>
		<lastmod>2020-08-25T19:30:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-future-of-retail-is-here-and-it-involves-data-agility/</loc>
		<lastmod>2020-08-25T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/newsbites-drilldown-for-the-week-ending-21-august-2020/</loc>
		<lastmod>2020-08-25T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/learning-about-structure-aware-fuzzing-and-finding-json-bugs-to-boot/</loc>
		<lastmod>2020-08-25T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/6-factors-to-consider-in-evaluating-cve-importance/</loc>
		<lastmod>2020-08-25T20:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/can-i-use-azure-with-nps/</loc>
		<lastmod>2020-08-25T20:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fireside-chat-with-former-australian-prime-minister-malcolm-turnbull/</loc>
		<lastmod>2020-08-25T20:42:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/a-pki-solution-for-azure/</loc>
		<lastmod>2020-08-25T21:08:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/six-steps-for-securing-smart-cities/</loc>
		<lastmod>2020-08-25T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/penetration-test-pitfalls-to-avoid/</loc>
		<lastmod>2020-08-25T22:28:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/americas-oldest-federal-law-enforcement-agency-the-history-of-the-united-states-postal-inspection-service/</loc>
		<lastmod>2020-08-25T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cloud-compliance-frameworks-what-you-need-to-know/</loc>
		<lastmod>2020-08-25T23:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/learning-about-structure-aware-fuzzing-and-finding-json-bugs-to-boot-3/</loc>
		<lastmod>2020-08-26T03:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/wireless-pentesting-part-3-common-wireless-attacks/</loc>
		<lastmod>2020-08-26T03:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/contrast-labs-apache-struts-cve-2019-0230-and-how-to-block-attacks/</loc>
		<lastmod>2020-08-26T05:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/prioritizing-cybersecurity-in-state-and-local-agencies/</loc>
		<lastmod>2020-08-26T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-build-board-worthy-cybersecurity-business-cases/</loc>
		<lastmod>2020-08-26T07:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/data-breach-instacart-shoppers-warned-of-security-incident-after-third-party-contractors-review-too-many-user-profiles/</loc>
		<lastmod>2020-08-26T09:26:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/developing-a-covid-19-track-and-trace-app-through-the-lens-of-synopsys/</loc>
		<lastmod>2020-08-26T09:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-strategic-value-of-remote-audits-in-the-wfh-era/</loc>
		<lastmod>2020-08-27T06:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto21832464-1.jpg</image:loc>
			<image:title><![CDATA[compliance]]></image:title>
			<image:caption><![CDATA[remote audits]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/interpretability-of-machine-learning-models-for-fraud-detection/</loc>
		<lastmod>2020-08-26T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/freepik-company-discloses-data-breach-affecting-more-than-8-million-users/</loc>
		<lastmod>2020-08-26T12:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/todays-jesse-james-21st-century-bank-heists/</loc>
		<lastmod>2020-08-27T07:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/jessejames.jpeg</image:loc>
			<image:title><![CDATA[jessejames]]></image:title>
			<image:caption><![CDATA[bank]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-nydfs-cybersecurity-regulation-explained/</loc>
		<lastmod>2020-08-26T12:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ftc-reports-over-118-million-in-losses-due-to-coronavirus-related-fraud/</loc>
		<lastmod>2020-08-26T12:40:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/it-lives/</loc>
		<lastmod>2020-08-26T12:48:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/new-zealand-stock-exchange-suffers-second-ddos-attack-in-two-days/</loc>
		<lastmod>2020-08-26T12:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/supply-chain-risk-management-what-you-need-to-know-to-build-a-successful-scrm-program/</loc>
		<lastmod>2020-08-26T12:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/iot-devices-in-different-industries-and-how-to-secure-them/</loc>
		<lastmod>2020-08-26T12:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/unfixed-safari-bug-lets-attacker-steal-files/</loc>
		<lastmod>2020-08-26T13:49:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/capital-one-revisited-80m-penalty-from-2019-data-breach/</loc>
		<lastmod>2020-08-26T14:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/isps-have-to-protect-smart-homes-to-protect-their-business/</loc>
		<lastmod>2020-08-26T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/apt-mercenary-groups-pose-real-threat-to-companies-but-detecting-tactics-and-techniques-is-within-reach/</loc>
		<lastmod>2020-08-26T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/digital-attacks-on-educational-resources/</loc>
		<lastmod>2020-08-26T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/one-veracoders-tips-for-setting-up-a-successful-security-champions-program/</loc>
		<lastmod>2020-08-26T14:42:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-is-malware-10-types-of-malware-how-they-work/</loc>
		<lastmod>2020-08-26T14:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/centrify-continues-to-modernize-privileged-access-management-for-devsecops-with-ssh-key-management/</loc>
		<lastmod>2020-08-26T14:51:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/five-reasons-agentless-appsec-is-the-right-choice/</loc>
		<lastmod>2020-08-26T15:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-mickey-shkatovs-and-jesse-michaels-bytes-in-disguise-%e2%8c%90%e2%96%a0_%e2%96%a0/</loc>
		<lastmod>2020-08-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-joy-of-tech-apples-epic-response/</loc>
		<lastmod>2020-08-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/magento-multiversion-1-x-2-x-backdoor/</loc>
		<lastmod>2020-08-26T17:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-ayoub-ayoul3-elaassals-only-takes-a-spark-popping-a-shell-on-a-1000-nodes/</loc>
		<lastmod>2020-08-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/confessions-of-an-id-theft-kingpin-part-i/</loc>
		<lastmod>2020-08-26T18:39:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/windows-10x-vs-windows-10-whats-best-for-the-enterprise/</loc>
		<lastmod>2020-08-26T18:56:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/on-externalizing-cloud-trust/</loc>
		<lastmod>2020-08-26T20:26:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/blaming-the-ciso-for-a-cybersecurity-breach/</loc>
		<lastmod>2020-08-26T20:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/apt-hackers-for-hire-used-for-industrial-espionage/</loc>
		<lastmod>2020-08-26T20:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fine-grain-tracing-with-thundra/</loc>
		<lastmod>2020-08-26T20:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sonatype-ceo-on-the-future-of-the-software-supply-chain/</loc>
		<lastmod>2020-08-26T22:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/knowledge-wins/</loc>
		<lastmod>2020-08-26T22:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/mitigating-risk-from-apt41-attacks-against-networking-and-enterprise-infrastructure/</loc>
		<lastmod>2020-08-27T01:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/joint-technical-alert-fastcash-2-0-north-koreas-beagleboyz-robbing-banks/</loc>
		<lastmod>2020-08-27T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-growing-demand-for-top-talent-in-cybersecurity/</loc>
		<lastmod>2020-08-27T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/websites-have-3-2-critical-application-vulnerabilities-on-average/</loc>
		<lastmod>2020-08-27T07:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/automating-dfir-with-soar-2/</loc>
		<lastmod>2020-08-27T09:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/automating-dfir-with-soar/</loc>
		<lastmod>2020-08-27T09:05:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/expertops-federal-managed-services-in-a-fedramp-certified-cloud-has-arrived/</loc>
		<lastmod>2020-08-27T09:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/agile-and-secure-sdlc-best-practices/</loc>
		<lastmod>2020-08-27T09:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/magnify-podcast-discussing-the-new-normal-with-ai-based-cybersecurity-specialists-mixmode/</loc>
		<lastmod>2020-08-27T09:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fastly-to-acquire-signal-sciences/</loc>
		<lastmod>2020-08-27T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/6-google-classroom-admin-tips-for-k-12-it-teams/</loc>
		<lastmod>2020-08-27T11:02:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/fbi-arrests-russian-tourist-for-offering-1-million-to-us-employee-to-plant-malware-on-company-network/</loc>
		<lastmod>2020-08-27T11:06:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/financial-accountability-regime-holds-executives-feet-to-the-fire/</loc>
		<lastmod>2020-08-27T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/rsa-again-named-a-leader-in-gartner-magic-quadrant-for-it-risk-management/</loc>
		<lastmod>2020-08-27T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/its-time-to-unlock-workspaces-and-unleash-productivity-2/</loc>
		<lastmod>2020-08-27T12:02:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/its-time-to-unlock-workspaces-and-unleash-productivity/</loc>
		<lastmod>2020-08-27T12:02:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/china-a-ccp-driven-global-threat-actor/</loc>
		<lastmod>2020-08-28T06:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/China-hacking.jpg</image:loc>
			<image:title><![CDATA[China hacking]]></image:title>
			<image:caption><![CDATA[China]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/data-privacy-and-covid-19-what-you-need-to-know/</loc>
		<lastmod>2020-08-28T07:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Security-Team-Value.jpg</image:loc>
			<image:caption><![CDATA[data privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/everything-you-need-to-know-about-phishing/</loc>
		<lastmod>2020-08-27T13:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/us-military-personnel-actively-targeted-by-cybercriminals-over-350-million-in-reported-losses-in-the-past-five-years/</loc>
		<lastmod>2020-08-27T13:47:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/announcing-the-launch-of-governance-automation-engine-and-new-website/</loc>
		<lastmod>2020-08-27T13:51:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/can-you-afford-a-third-party-data-breach/</loc>
		<lastmod>2020-08-27T14:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/do-mssps-and-msps-need-to-become-cmmc-compliant/</loc>
		<lastmod>2020-08-27T14:07:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/infocyte-announces-click-to-remediate-enabling-remote-and-distributed-workforces-to-operate-more-safely/</loc>
		<lastmod>2020-08-27T14:08:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/north-koreas-beagleboyz-resumes-international-attacks-targeting-banks/</loc>
		<lastmod>2020-08-27T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/5g-fixed-wireless-access-avast/</loc>
		<lastmod>2020-08-27T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/rsa-conference-launches-2021-call-for-speakers/</loc>
		<lastmod>2020-08-27T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/5-habits-of-successful-msps/</loc>
		<lastmod>2020-08-27T14:30:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/covid-19-pandemic-drives-sharp-uptick-in-misinformation-fake-domains/</loc>
		<lastmod>2020-08-27T14:30:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cyberark-extends-cloud-deployment-options-improves-simplicity-and-scalability-with-v11-6/</loc>
		<lastmod>2020-08-27T14:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/make-memcpy-safe-again-codeql/</loc>
		<lastmod>2020-08-27T14:48:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cybersecurity-pay-now-or-pay-more-later/</loc>
		<lastmod>2020-08-27T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-christopher-wades-beyond-root-custom-firmware-for-embedded-mobile-chipsets/</loc>
		<lastmod>2020-08-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/mixed-vlan-tags-and-bpf-syntax/</loc>
		<lastmod>2020-08-27T16:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/pci-ssc-na-community-meeting/</loc>
		<lastmod>2020-08-27T16:03:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/pci-ssc-europe-community-meeting/</loc>
		<lastmod>2020-08-27T16:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/confessions-of-an-id-theft-kingpin-part-ii/</loc>
		<lastmod>2020-08-27T16:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/guardicore-discovers-ssh-targeting-botnet-telecom-infrastructure-a-target-along-with-financial-systems/</loc>
		<lastmod>2020-08-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/august-device-threat-report/</loc>
		<lastmod>2020-08-27T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-ismail-melihs-tas-and-kubilay-ahmet-kucuks-practical-voip-uc-hacking-using-mr-sip/</loc>
		<lastmod>2020-08-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-standard-model-changes/</loc>
		<lastmod>2020-08-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/top-9-vulnerabilities-with-no-assigned-cve-number/</loc>
		<lastmod>2020-08-27T20:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/even-prior-to-the-pandemic-and-work-from-home-many-organizations-were-bolstering-cyber-security/</loc>
		<lastmod>2020-08-27T20:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/black-duck-continues-to-expand-vulnerability-prioritization-methods/</loc>
		<lastmod>2020-08-27T22:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cleaning-your-crypto-mess-with-enterprise-cryptography-management/</loc>
		<lastmod>2020-08-28T00:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/a-cisos-guide-to-cybersecurity-planning-in-2020-and-beyond/</loc>
		<lastmod>2020-08-28T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/te-mudas-a-la-nube-para-ahorrar-dinero-piensalo-de-nuevo/</loc>
		<lastmod>2020-08-28T08:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/graphtage-a-new-semantic-diffing-tool/</loc>
		<lastmod>2020-08-28T11:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/revil-ransomware-operators-claim-valley-health-systems-as-new-victim/</loc>
		<lastmod>2020-08-28T12:26:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/beating-the-emotet-malware-with-ssl-interception/</loc>
		<lastmod>2020-08-28T13:08:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/countering-cybercrime-in-the-next-normal/</loc>
		<lastmod>2020-08-28T13:10:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/man-in-the-middle-attack-makes-pins-useless-for-visa-cards/</loc>
		<lastmod>2020-08-28T13:14:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-improve-pci-compliance-and-reduce-technical-debt/</loc>
		<lastmod>2020-08-31T07:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/technicaldebt.jpg</image:loc>
			<image:title><![CDATA[technicaldebt]]></image:title>
			<image:caption><![CDATA[technical debt]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sendgrid-under-siege-from-hacked-accounts/</loc>
		<lastmod>2020-08-28T13:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/infamous-lazarus-group-targets-cryptocurrency-firms/</loc>
		<lastmod>2020-08-28T14:40:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/from-my-gartner-blog-goodbye/</loc>
		<lastmod>2020-08-28T15:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/kiwi-stock-exchange-ddosed-again-and-again-and-again/</loc>
		<lastmod>2020-08-28T15:53:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/nzx-ddos-4-richi-cc-0.jpg</image:loc>
			<image:title><![CDATA[nzx-ddos-4--richi--cc-0]]></image:title>
			<image:caption><![CDATA[stock exchange]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-dylan-ayreys-and-allison-donovans-lateral-movement-and-privilege-escalation-in-gcp-compromise-any-organization-without-dropping-an-implant/</loc>
		<lastmod>2020-08-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/firemon-secures-40-million-debt-financing-with-silicon-valley-bank/</loc>
		<lastmod>2020-09-01T13:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-joy-of-tech-car-talk/</loc>
		<lastmod>2020-08-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/a-ux-designer-solutions-architect-and-the-root-of-all-cool-things/</loc>
		<lastmod>2020-08-28T17:16:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-red-team-village-vandana-sehgals-zero-trust-a-vision-for-securing-cloud/</loc>
		<lastmod>2020-08-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cloud-compliance-frameworks-what-you-need-to-know-2/</loc>
		<lastmod>2020-08-28T19:03:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/recent-ransomware-attacks-latest-ransomware-attack-news-in-2020/</loc>
		<lastmod>2020-08-28T21:09:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/phishing-attack-payloads-leaving-employees-vulnerable-as-remote-work-trends-continue-to-evolve/</loc>
		<lastmod>2020-08-28T21:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-strike-gold-in-the-land-of-continuous-security/</loc>
		<lastmod>2020-08-28T21:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/covid-19-reveals-the-dirty-truth-about-security-spending/</loc>
		<lastmod>2020-08-28T21:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/persistent-wordpress-user-injection/</loc>
		<lastmod>2020-08-29T03:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-red-team-village-kursat-akincis-and-mert-can-coskuners-android-malware-adventures/</loc>
		<lastmod>2020-08-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/daniel-storis-mtu/</loc>
		<lastmod>2020-08-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-red-team-village-kyle-benacs-android-application-exploitation/</loc>
		<lastmod>2020-08-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/pandemic-triggers-over-180000-scams-avast/</loc>
		<lastmod>2020-08-30T06:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/google-report-shows-zero-day-exploits-on-track-to-meet-or-top-last-years-numbers/</loc>
		<lastmod>2020-08-30T07:03:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-will-5g-impact-cellular-device-security-webinar-recap/</loc>
		<lastmod>2020-08-30T08:57:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/top-8-endpoint-security-solutions-for-2021/</loc>
		<lastmod>2020-08-30T09:06:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-red-team-village-tim-wadhwa-browns-all-of-the-threats-intelligence-modeling/</loc>
		<lastmod>2020-08-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/robert-m-lees-jeff-haas-little-bobby-comics-week-292/</loc>
		<lastmod>2020-08-30T17:31:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-red-team-village-tyler-boykins-50-shades-of-sudo-abuse/</loc>
		<lastmod>2020-08-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/uber-ciso-charged-facebook-data-portability-malicious-ios-sdk/</loc>
		<lastmod>2020-08-31T04:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-is-the-eu-cybersecurity-act-and-what-does-it-mean-for-us-based-businesses/</loc>
		<lastmod>2020-08-31T06:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/using-artificial-intelligence-to-keep-the-complex-world-moving-forward/</loc>
		<lastmod>2020-08-31T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cross-origin-resource-sharing-cors-and-the-access-control-allow-origin-header/</loc>
		<lastmod>2020-08-31T09:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-massive-shift-to-cyber-crime/</loc>
		<lastmod>2020-08-31T10:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-hosted-security-matters/</loc>
		<lastmod>2020-08-31T10:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/romance-scams-are-on-the-rise-fbi-warns/</loc>
		<lastmod>2020-08-31T11:37:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/how-to-boost-your-home-wi-fi-signal-avast/</loc>
		<lastmod>2020-08-31T11:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-will-your-future-bring/</loc>
		<lastmod>2020-08-31T12:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sonrai-ceo-next-phase-of-devsecops-starts-now/</loc>
		<lastmod>2020-08-31T12:41:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto44559434.jpg</image:loc>
			<image:title><![CDATA[security challenges]]></image:title>
			<image:caption><![CDATA[open source security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/misinformation-campaigns-rise-thanks-to-covid-19/</loc>
		<lastmod>2020-09-01T06:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Lies.jpg</image:loc>
			<image:title><![CDATA[Lies]]></image:title>
			<image:caption><![CDATA[misinformation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/securing-healthcare-data-in-a-covid-world/</loc>
		<lastmod>2020-09-01T07:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Healthcare-Industry-Needs.jpg</image:loc>
			<image:title><![CDATA[Healthcare-Industry-Needs]]></image:title>
			<image:caption><![CDATA[Healthcare data]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/healthcaresecuritypic1.png</image:loc>
			<image:caption><![CDATA[healthcarepic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cybercriminals-make-millions-selling-stolen-fortnite-accounts-new-research-shows/</loc>
		<lastmod>2020-08-31T14:48:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cybercriminals-increasingly-exploitating-pandemic-trauma/</loc>
		<lastmod>2020-08-31T14:52:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Looming.jpg</image:loc>
			<image:caption><![CDATA[attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/aggressive-adware-promised-free-stuff-to-android-users-just-to-stay-installed/</loc>
		<lastmod>2020-08-31T15:10:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/calculating-the-roi-of-digital-risk-protection-drp/</loc>
		<lastmod>2020-08-31T15:23:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/dos-and-donts-of-conducting-a-fssc-cybersecurity-profile-assessment/</loc>
		<lastmod>2020-08-31T15:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/big-lessons-from-the-twitter-bitcoin-hack-avast/</loc>
		<lastmod>2020-08-31T15:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-red-team-village-chris-cottrells-guerrilla-red-team-decentralizing-adversary/</loc>
		<lastmod>2020-08-31T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/why-and-how-are-enterprise-companies-like-ebay-actively-port-scanning-end-users-computers-from-their-websites/</loc>
		<lastmod>2020-08-31T16:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/emotet-switches-to-red-dawn-template-in-weaponized-word-documents/</loc>
		<lastmod>2020-08-31T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/xkcd-synonym-date/</loc>
		<lastmod>2020-08-31T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/def-con-28-safe-mode-red-team-village-evan-andersons-gray-hat-ssh-sshenanigans/</loc>
		<lastmod>2020-08-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/grammatech-featured-in-cyber-security-forum-initiative-csfi-podcast/</loc>
		<lastmod>2020-08-31T18:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/covid-19-csp-challenges-a-new-normal-awaits/</loc>
		<lastmod>2020-08-31T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/botnet-and-exploit-activity-goes-up-as-cybercriminals-shift-focus-report-shows/</loc>
		<lastmod>2020-08-31T19:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/im-joining-securonix/</loc>
		<lastmod>2020-08-31T19:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/my-name-is-nick-gonzalez-this-is-why-i-joined-balbix/</loc>
		<lastmod>2020-08-31T20:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/lightweight-directory-access-protocol-ldap-explained/</loc>
		<lastmod>2020-08-31T21:20:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/dynamic-radius-policy-enforcement-with-static-certificates/</loc>
		<lastmod>2020-08-31T22:38:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/captain-morgan-hated-being-called-a-pirate-because-he-hated-democracy/</loc>
		<lastmod>2020-08-31T22:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/data-can-make-digital-transformation-a-reality-for-pc-insurers/</loc>
		<lastmod>2020-09-01T01:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-hacker-mind-podcast-can-a-machine-think-like-a-hacker-3/</loc>
		<lastmod>2020-09-01T03:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/targeted-attacks-part-1-osint-and-reconnaissance/</loc>
		<lastmod>2020-09-01T03:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/diving-deeper-4-best-practices-for-securing-enterprise-data-in-office-365-o365/</loc>
		<lastmod>2020-09-01T05:06:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tips-for-staying-secure-while-working-from-home/</loc>
		<lastmod>2020-09-01T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybersecurity-best-practices-to-keep-your-online-business-safe/</loc>
		<lastmod>2020-09-01T08:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/perimeterx-platform-named-best-application-security-solution-by-the-2020-tech-ascension-awards/</loc>
		<lastmod>2020-09-01T09:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/whitepaper-the-data-overload-problem-in-cybersecurity/</loc>
		<lastmod>2020-09-01T09:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/what-is-adblock-avast/</loc>
		<lastmod>2020-09-01T10:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-best-hardware-from-the-1980s-avast/</loc>
		<lastmod>2020-09-01T10:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/pci-pal-announces-the-formation-of-the-pci-pal-advisory-committee-and-its-first-member-neira-jones/</loc>
		<lastmod>2020-09-01T10:30:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/open-letter-to-customers-and-partners/</loc>
		<lastmod>2020-09-01T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/rsa-steps-out-as-the-worlds-largest-security-startup/</loc>
		<lastmod>2020-09-01T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/why-authentication-still-holds-the-key-for-success-for-rsa-after-40-years/</loc>
		<lastmod>2020-09-01T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/rsa-charts-its-future-as-an-independent-company/</loc>
		<lastmod>2020-09-01T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/security-researcher-discovers-over-50000-scanned-drivers-licenses-exposed-on-unsecured-amazon-server/</loc>
		<lastmod>2020-09-01T12:49:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/my-take-lessons-learned-from-the-summer-of-script-kiddies-hacking-twitter-tiktok/</loc>
		<lastmod>2020-09-01T13:11:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/extending-zero-trust-to-the-endpoint-2/</loc>
		<lastmod>2020-09-01T13:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/extending-zero-trust-to-the-endpoint/</loc>
		<lastmod>2020-09-01T13:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-should-apac-organizations-protect-critical-data-assets/</loc>
		<lastmod>2020-09-01T13:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-importance-of-choice-how-to-deploy-your-vendor-access-management-software/</loc>
		<lastmod>2020-09-01T14:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/companies-can-build-accurate-user-profiles-from-online-history-mozilla-research-finds/</loc>
		<lastmod>2020-09-01T14:15:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/some-8-hour-days-feel-like-a-week/</loc>
		<lastmod>2020-09-01T14:17:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/csi-ctf-2020-osint-challenges/</loc>
		<lastmod>2020-09-01T14:20:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-pandemic-of-credential-based-cyberattacks/</loc>
		<lastmod>2020-09-02T07:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Passwords-Came-Went.jpg</image:loc>
			<image:title><![CDATA[Passwords-Came-Went]]></image:title>
			<image:caption><![CDATA[credentials]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/meeting-customer-security-needs-along-their-security-maturity-journey/</loc>
		<lastmod>2020-09-01T14:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/apples-big-brother-attitude-fails-to-keep-users-safe/</loc>
		<lastmod>2020-09-01T14:31:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/tim-cook-thierry-ehrmann-cc-by.jpg</image:loc>
			<image:title><![CDATA[tim-cook--thierry ehrmann--cc-by]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/gift-cards-requested-in-two-thirds-of-bec-attacks-report-reveals/</loc>
		<lastmod>2020-09-01T14:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/tripwire-patch-priority-index-for-august-2020/</loc>
		<lastmod>2020-09-01T14:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/scm-in-practice-how-to-strengthen-your-organizations-security-processes/</loc>
		<lastmod>2020-09-01T14:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/policy-evasion-evasive-techniques-you-need-to-understand-to-prevent-breaches-and-attacks-by-major-general-earl-matthews-usaf-ret/</loc>
		<lastmod>2020-09-01T15:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/feature-release-20-4/</loc>
		<lastmod>2020-09-01T15:45:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-many-faces-of-bad-bots/</loc>
		<lastmod>2020-09-01T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-erdener-uyans-and-gokberk-gulguns-executing-red-team-scenarios/</loc>
		<lastmod>2020-09-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-joy-of-tech-first-day-of-school/</loc>
		<lastmod>2020-09-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/avoiding-common-azure-configuration-errors/</loc>
		<lastmod>2020-09-01T17:51:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-mauro-eldritchs-and-farith-perez-saez-evil-genius-why-you-shouldnt-trust-that-keyboard/</loc>
		<lastmod>2020-09-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/a-day-in-the-life-of-a-splunk-searchdev-team-member/</loc>
		<lastmod>2020-09-01T18:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/outlook-vs-gmail-comparing-apples-to-oranges/</loc>
		<lastmod>2020-09-01T18:15:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/avast-joins-iwf-avast/</loc>
		<lastmod>2020-09-01T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/newsbites-drilldown-for-the-week-ending-28-august-2020/</loc>
		<lastmod>2020-09-01T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cyber-security-roundup-for-september-2020/</loc>
		<lastmod>2020-09-01T20:10:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/responding-to-cloud-misconfigurations-with-security-automation-and-common-sense-tips/</loc>
		<lastmod>2020-09-01T20:15:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/announcement-introducing-the-new-and-improved-idaptive-ui/</loc>
		<lastmod>2020-09-01T22:04:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ransomware-why-users-are-victims-of-fraud/</loc>
		<lastmod>2020-09-01T22:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/bens-book-of-the-month-review-of-cybersecurity-for-space-protecting-the-final-frontier/</loc>
		<lastmod>2020-09-01T22:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/using-assert-to-execute-malware-in-php-7-environments/</loc>
		<lastmod>2020-09-02T00:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/improved-component-choice-and-remediation-with-improved-data-all-for-free/</loc>
		<lastmod>2020-09-02T00:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/why-observability-is-the-next-big-thing-in-security/</loc>
		<lastmod>2020-09-02T02:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/breach-risk-minimization-for-under-resourced-teams/</loc>
		<lastmod>2020-09-02T03:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/announcement-loginradius-releases-consumer-digital-identity-trend-report-2020/</loc>
		<lastmod>2020-09-02T05:37:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/key-benefits-of-secure-sd-wan-for-enterprise-customers/</loc>
		<lastmod>2020-09-02T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybercriminals-target-norwegian-parliament-email-accounts-of-elected-members-and-employees-compromised/</loc>
		<lastmod>2020-09-02T07:32:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/are-you-ready-for-your-pci-dss-audit-this-year/</loc>
		<lastmod>2020-09-02T09:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/61-of-companies-have-suffered-an-insider-attack-in-the-past-year/</loc>
		<lastmod>2020-09-02T10:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cleaning-up-the-active-directory-forest/</loc>
		<lastmod>2020-09-03T07:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/Forest.jpg</image:loc>
			<image:title><![CDATA[Forest]]></image:title>
			<image:caption><![CDATA[Active Directory]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/polymorphism-the-most-rapidly-evolving-cyber-threat-in-2020/</loc>
		<lastmod>2020-09-02T11:30:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/four-decades-later-rsa-poised-for-independence-and-market-leadership/</loc>
		<lastmod>2020-09-02T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/akamai-cisa-and-cis-join-forces-to-improve-sltt-cyber-defenses/</loc>
		<lastmod>2020-09-02T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/on-the-road-to-devsecops-security-and-privacy-controls-per-nist-sp-800-53/</loc>
		<lastmod>2020-09-02T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/beware-of-fritzfrog-malware-avast/</loc>
		<lastmod>2020-09-02T13:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/aite-group-research-validates-api-security-gaps/</loc>
		<lastmod>2020-09-02T13:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/deception-in-the-workforce-bitglass-2020-insider-threat-report/</loc>
		<lastmod>2020-09-02T14:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-is-the-future-of-cybersecurity-jobs-post-covid19/</loc>
		<lastmod>2020-09-02T14:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cobalt-strike-the-new-favorite-among-thieves/</loc>
		<lastmod>2020-09-02T14:35:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/parsing-ny-dfs-first-cybersecurity-case/</loc>
		<lastmod>2020-09-02T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/wp-2fa-1-4-2-improved-2fa-policies-multisite-network-support/</loc>
		<lastmod>2020-09-02T15:18:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/inside-the-fallguys-malware-that-steals-your-browsing-data-and-gaming-ims-continued-attack-on-open-source-software/</loc>
		<lastmod>2020-09-02T15:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-austin-marcks-erpwnage-red-team-approach-to-targeting-sap/</loc>
		<lastmod>2020-09-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/wordpress-websites-attacked-via-file-manager-plugin-vulnerability/</loc>
		<lastmod>2020-09-02T16:21:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/former-alphabay-moderator-sentenced-to-11-years-in-prison/</loc>
		<lastmod>2020-09-02T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/meeting-the-challenges-of-remote-work-with-chrome-os-policy-settings-part-i/</loc>
		<lastmod>2020-09-02T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ciso-what-the-job-really-entails-and-how-its-evolved-over-the-years/</loc>
		<lastmod>2020-09-02T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-hacker-mind-podcast-can-a-machine-think-like-a-hacker/</loc>
		<lastmod>2020-09-02T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/axis-security-named-tie50-award-winner-at-tiecon/</loc>
		<lastmod>2020-09-02T16:48:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/should-state-and-local-governments-obtain-cybersecurity-maturity-model-certification/</loc>
		<lastmod>2020-09-02T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/entersekt-rolls-out-behavioral-analytics-for-real-time-risk-scoring-with-nudata-security/</loc>
		<lastmod>2020-09-02T16:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-hurricane-hunters/</loc>
		<lastmod>2020-09-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/man-and-machine-a-look-at-neurotechnology/</loc>
		<lastmod>2020-09-02T17:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/vpns-are-todays-answer-for-remote-access-ericom-application-isolator-adds-vital-protections-against-cyberattacks/</loc>
		<lastmod>2020-09-02T17:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/sonrai-ceo-next-phase-of-devsecops-starts-now-2/</loc>
		<lastmod>2020-09-02T17:35:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-michael-wylies-enumerating-cloud-file-storage-gems/</loc>
		<lastmod>2020-09-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/gaining-control-over-cloud-iam-chaos/</loc>
		<lastmod>2020-09-02T19:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/top-five-most-infamous-ddos-attacks/</loc>
		<lastmod>2020-09-02T20:08:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tackling-video-piracy-head-on/</loc>
		<lastmod>2020-09-02T20:36:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-inside-out-application-security-opportunity-with-rasp/</loc>
		<lastmod>2020-09-02T21:05:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/video-tryhackme-behind-the-curtain/</loc>
		<lastmod>2020-09-02T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/balbix-summer-2020-interns-bid-adieu/</loc>
		<lastmod>2020-09-02T21:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-is-the-certificate-chain-of-trust/</loc>
		<lastmod>2020-09-02T22:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/autonomous-identity-your-prescription-for-reducing-risk-in-healthcare/</loc>
		<lastmod>2020-09-03T00:06:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-joys-of-owning-an-og-email-account/</loc>
		<lastmod>2020-09-03T01:08:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/critical-vulnerability-in-file-manager-plugin-affecting-700k-wordpress-websites/</loc>
		<lastmod>2020-09-03T02:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/top-5-ransomware-attacks-to-watch-out-for-in-2020-2021/</loc>
		<lastmod>2020-09-03T04:49:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/ransomware-during-covid-19/</loc>
		<lastmod>2020-09-03T05:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-draas-data-protection-dilemma/</loc>
		<lastmod>2020-09-03T05:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/using-rings-to-test-and-update-the-policypak-client-side-extension-and-how-to-stay-supported/</loc>
		<lastmod>2020-09-03T05:36:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/addressing-the-security-risks-of-digital-transformation-on-iot-and-ot-with-deception/</loc>
		<lastmod>2020-09-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-does-deterministic-security-help-reduce-false-positives/</loc>
		<lastmod>2020-09-03T07:41:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/global-cybercrime-will-cost-businesses-11-4-million-per-minute-by-2021/</loc>
		<lastmod>2020-09-03T08:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/single-page-applications-building-a-secure-login-pathway-with-loginradius/</loc>
		<lastmod>2020-09-03T09:20:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/hackers-hijack-indian-pm-narendra-modi-twitter-account/</loc>
		<lastmod>2020-09-03T09:39:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/national-nonprofit-relies-on-digital-resolves-authentication-technology/</loc>
		<lastmod>2020-09-03T09:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/top-6-network-automation-tools-for-enterprises/</loc>
		<lastmod>2020-09-03T10:31:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tls-certificate-lifespans-now-capped-at-13-months/</loc>
		<lastmod>2020-09-03T10:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/google-classroom-safety-the-next-administrative-nightmare/</loc>
		<lastmod>2020-09-03T11:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/from-layers-to-microunits/</loc>
		<lastmod>2020-09-03T11:05:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/covid-19-reveals-the-dirty-truth-about-cybersecurity-spending/</loc>
		<lastmod>2020-09-03T11:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/covid-19-exposure-logging-key-privacy-considerations/</loc>
		<lastmod>2020-09-03T11:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/dashboards-an-effective-cybersecurity-tool/</loc>
		<lastmod>2020-09-03T11:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation/</loc>
		<lastmod>2020-09-03T11:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation-2/</loc>
		<lastmod>2020-09-03T11:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/five-ways-operational-resiliency-drives-opportunity-2/</loc>
		<lastmod>2020-09-03T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/five-ways-operational-resiliency-drives-opportunity/</loc>
		<lastmod>2020-09-03T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-skinny-on-password-attacks/</loc>
		<lastmod>2020-09-03T12:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ddos-attacks-disrupt-miami-dade-public-schools-virtual-learning-classes-police-looking-for-culprits/</loc>
		<lastmod>2020-09-03T12:15:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/netskope-unveils-free-real-time-threat-intelligence-exchange/</loc>
		<lastmod>2020-09-03T13:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto5755420.jpg</image:loc>
			<image:title><![CDATA[canstockphoto5755420]]></image:title>
			<image:caption><![CDATA[threat intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/announcing-cybersecai-connected-technical-workshop-avast/</loc>
		<lastmod>2020-09-03T12:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-is-predictive-ai-and-how-is-it-being-used-in-cybersecurity/</loc>
		<lastmod>2020-09-03T12:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-protect-your-organization-from-advanced-persistent-threats/</loc>
		<lastmod>2020-09-03T12:49:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/no-data-no-hunt-top-tips-to-ensure-a-successful-threat-hunting-environment/</loc>
		<lastmod>2020-09-03T14:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/no-data-no-hunt-top-tips-to-ensure-a-successful-threat-hunting-environment-2/</loc>
		<lastmod>2020-09-03T14:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/apple-notarized-malware-by-mistake-hackers-ran-it-through-third-party-website/</loc>
		<lastmod>2020-09-03T14:22:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/running-sensitive-apps-in-wsl-safe-safe-safe/</loc>
		<lastmod>2020-09-03T14:40:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/american-payroll-association-forgets-to-patch-web-portal-hackers-skim-credit-cards-and-passwords-off-site/</loc>
		<lastmod>2020-09-03T14:42:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/scanning-a-rest-api-for-vulnerabilities/</loc>
		<lastmod>2020-09-03T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/newly-discovered-kryptocibule-malware-has-been-stealing-and-mining-cryptocurrency-since-2018/</loc>
		<lastmod>2020-09-03T14:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/google-ups-bug-bounty-reward-amounts-for-product-abuse-risks/</loc>
		<lastmod>2020-09-03T14:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tls-is-only-as-strong-as-its-weakest-link/</loc>
		<lastmod>2020-09-03T14:59:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-resilient-is-your-nonprofit-to-a-cyberattack/</loc>
		<lastmod>2020-09-03T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-resilient-is-your-nonprofit-to-a-cyberattack-2/</loc>
		<lastmod>2020-09-03T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/help-net-security-feature-pci-pal-forms-advisory-committee-confirms-neira-jones-as-inaugural-member/</loc>
		<lastmod>2020-09-03T15:29:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/spring-view-manipulation-vulnerability/</loc>
		<lastmod>2020-09-03T15:31:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-adam-penningtons-emulating-adversary-with-imperfect-intelligence/</loc>
		<lastmod>2020-09-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/gartner-summit-balance-risk-trust-and-opportunity-in-an-uncertain-world/</loc>
		<lastmod>2020-09-03T16:56:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-joy-of-tech-elon-musks-brain-chip/</loc>
		<lastmod>2020-09-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-iias-new-three-lines-model-for-risk-assurance/</loc>
		<lastmod>2020-09-03T17:27:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-safe-mode-red-team-village-gabriel-ryans-dropengine-malleable-payload-creation-framework/</loc>
		<lastmod>2020-09-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-should-zero-trust-apply-to-phishing/</loc>
		<lastmod>2020-09-03T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/top-cybersecurity-challenges-facing-government-agencies/</loc>
		<lastmod>2020-09-03T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/achieve-complete-threat-detection-response-at-less-cost/</loc>
		<lastmod>2020-09-03T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/powerfully-simple-soar-for-service-providers-video/</loc>
		<lastmod>2020-09-03T21:11:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/apple-delays-launch-of-certain-ios-14-privacy-features-including-tracking-consent/</loc>
		<lastmod>2020-09-03T23:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/threat-hunting-if-you-stay-ready-you-wont-have-to-get-ready/</loc>
		<lastmod>2020-09-04T01:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cve-2020-15359-vdalabs-uses-mayhem-to-find-mp3gain-stack-overflow-3/</loc>
		<lastmod>2020-09-04T03:39:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-black-friday-and-cyber-monday-can-go-from-a-retailers-dream-into-a-cisos-worst-nightmare/</loc>
		<lastmod>2020-09-04T06:22:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/fortinet-secure-sd-wan-ensures-user-experience-across-3000-branch-offices/</loc>
		<lastmod>2020-09-04T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cve-2020-15359-vdalabs-uses-mayhem-to-find-mp3gain-stack-overflow/</loc>
		<lastmod>2020-09-04T08:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/feds-propose-911-emergency-call-for-reporting-security-flaws-experts-warn-its-easier-said-than-done/</loc>
		<lastmod>2020-09-04T11:08:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-secure-scale-istio-mt-keyfactor/</loc>
		<lastmod>2020-09-04T12:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/hackers-might-be-chasing-pro-trump-websites-avast/</loc>
		<lastmod>2020-09-04T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-social-media-scraping-happens-avast/</loc>
		<lastmod>2020-09-04T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/connectwise-automate-announcement-avast/</loc>
		<lastmod>2020-09-04T13:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/data-breach-at-roper-st-francis-hospital-affects-6000-patients/</loc>
		<lastmod>2020-09-04T14:44:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/appsec-tools-proliferation-is-driving-investments-to-consolidate/</loc>
		<lastmod>2020-09-04T15:31:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/hacker-steals-7-5-million-from-maryland-non-profit-by-compromising-employees-personal-computer/</loc>
		<lastmod>2020-09-04T15:37:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-jorge-orchilles-deep-dive-into-adversary-emulation-ransomware/</loc>
		<lastmod>2020-09-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/bec-attack-payments-are-on-the-rise-report-finds/</loc>
		<lastmod>2020-09-04T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-stellar-evolution/</loc>
		<lastmod>2020-09-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/drive-security-automation-at-machine-speed/</loc>
		<lastmod>2020-09-04T17:08:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ask-the-expert-enterprise-business-resiliency-part-1/</loc>
		<lastmod>2020-09-04T17:23:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ask-the-expert-enterprise-business-resiliency-part-2/</loc>
		<lastmod>2020-09-04T17:26:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ask-the-expert-enterprise-business-resiliency-part-3/</loc>
		<lastmod>2020-09-04T17:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/targeted-companys-homepage-used-in-message-quarantine-phish/</loc>
		<lastmod>2020-09-04T17:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-ryan-ekins-notebooks-datasets-clouds-for-automation/</loc>
		<lastmod>2020-09-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/google-cloud-under-siege/</loc>
		<lastmod>2020-09-04T18:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/nsa-warning-on-location-data-exposure-your-web-browser-is-a-liability/</loc>
		<lastmod>2020-09-04T18:38:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/weekly-news-roundup-august-31-september-4-2020/</loc>
		<lastmod>2020-09-04T21:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/welcome-to-the-boomtown-of-strong-application-security/</loc>
		<lastmod>2020-09-05T00:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/insufficient-privilege-validation-in-nextscripts-social-networks-auto-poster/</loc>
		<lastmod>2020-09-05T00:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/contrast-labs-blocking-spring-view-manipulation-attacks/</loc>
		<lastmod>2020-09-05T04:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/76-of-security-pros-admit-securing-their-cloud-environments-is-a-struggle/</loc>
		<lastmod>2020-09-05T09:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/apple-u-turn-it-will-delay-killing-facebooks-business-model/</loc>
		<lastmod>2020-09-05T13:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/rotten-apple-gabriel-ortiz-pd.jpg</image:loc>
			<image:title><![CDATA[rotten-apple-- gabriel ortiz--pd]]></image:title>
			<image:caption><![CDATA[Facebook]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-forrest-fuquas-what-college-kids-always-get-wrong/</loc>
		<lastmod>2020-09-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/daniel-storis-signals/</loc>
		<lastmod>2020-09-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cloud-workloads-how-does-shared-responsibility-affect-security/</loc>
		<lastmod>2020-09-05T17:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-leron-grays-bypass-python-38-audit-hooks-or-nah/</loc>
		<lastmod>2020-09-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/disclosure-2020-grugqs-opening-keynote-strategic-cyber-warfare/</loc>
		<lastmod>2020-09-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-corey-hams-and-matt-eidelbergs-breaking-the-attack-chain/</loc>
		<lastmod>2020-09-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/robert-m-lees-jeff-haas-little-bobby-comics-week-293/</loc>
		<lastmod>2020-09-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-chris-wysopals-red-teaming-born-from-the-hacking-community/</loc>
		<lastmod>2020-09-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/security-code-review-of-a-banking-trojan%e2%80%8a-%e2%80%8acerberus/</loc>
		<lastmod>2020-09-06T20:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/learning-from-the-best-james-collins-cio-in-delaware/</loc>
		<lastmod>2020-09-06T23:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/nsa-data-collection-ruling-browsing-history-identification-ambulance-chasing/</loc>
		<lastmod>2020-09-07T04:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-heartbleed-bug-old-bugs-die-hard/</loc>
		<lastmod>2020-09-07T06:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/enabling-secure-remote-learning-for-college-and-university-students/</loc>
		<lastmod>2020-09-07T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/new-article-on-how-to-start-with-devsecops/</loc>
		<lastmod>2020-09-07T07:18:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/auditing-your-database-is-it-enough-for-your-data-security-needs/</loc>
		<lastmod>2020-09-07T07:21:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/happy-canada-labour-day-2020-bonne-fete-du-travail-du-canada-2020/</loc>
		<lastmod>2020-09-07T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/happy-united-states-labor-day-2020-feliz-dia-del-trabajo-de-estados-unidos-2020/</loc>
		<lastmod>2020-09-07T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/great-expectations-identifying-non-secured-personal-data-for-ccpa/</loc>
		<lastmod>2020-09-07T09:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/a-third-of-companies-expose-unsafe-network-services-to-the-internet-research-reveals/</loc>
		<lastmod>2020-09-07T10:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/warner-music-notifies-customers-of-web-skimming-attack-personal-and-financial-data-potentially-viewed-by-cybercriminals/</loc>
		<lastmod>2020-09-07T11:42:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/teenager-arrested-for-last-weeks-ddos-attacks-on-miami-dade-public-school-network/</loc>
		<lastmod>2020-09-07T12:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/us-phone-service-exposes-millions-of-messages-between-inmates-and-their-friends-and-families/</loc>
		<lastmod>2020-09-07T13:46:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ransomware-attack-halts-border-crossing-for-four-hours-in-argentina/</loc>
		<lastmod>2020-09-07T14:24:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/windows-domain-2-factor-authentication-2fa/</loc>
		<lastmod>2020-09-07T14:50:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/too-much-information/</loc>
		<lastmod>2020-09-07T20:19:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/building-a-robust-multi-cloud-environment-with-sd-wan/</loc>
		<lastmod>2020-09-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/iso-27005-and-the-risk-assessment-process/</loc>
		<lastmod>2020-09-08T07:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/identifying-the-most-dangerous-common-software-and-hardware-weaknesses-and-vulnerabilities-the-cwe-top-25-2020-edition/</loc>
		<lastmod>2020-09-08T08:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/podcast-episode-9-cloud-misconfigurations-simple-mistakes-big-consequences/</loc>
		<lastmod>2020-09-08T08:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/employee-privacy-a-priority-for-your-business-avast/</loc>
		<lastmod>2020-09-08T08:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/is-cybersecurity-training-on-your-back-to-school-list-2/</loc>
		<lastmod>2020-09-08T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/is-cybersecurity-training-on-your-back-to-school-list/</loc>
		<lastmod>2020-09-08T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/an-effective-soc-begins-with-a-mindset-overhaul/</loc>
		<lastmod>2020-09-08T12:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/why-network-security-logging-and-access-controls-have-a-problem-more-signal-less-noise/</loc>
		<lastmod>2020-09-08T13:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/hackers-shame-newcastle-university-on-twitter-after-infecting-it-with-ransomware/</loc>
		<lastmod>2020-09-08T14:07:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/credential-theft-on-the-rise-in-part-due-to-remote-work/</loc>
		<lastmod>2020-09-09T06:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto3516555.jpg</image:loc>
			<image:title><![CDATA[identity]]></image:title>
			<image:caption><![CDATA[credential theft]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/survey-smbs-increasingly-have-to-do-more-with-less-when-it-comes-to-cybersecurity/</loc>
		<lastmod>2020-09-08T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/survey-smbs-increasingly-have-to-do-more-with-less-when-it-comes-to-cybersecurity-2/</loc>
		<lastmod>2020-09-08T15:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/pci-pal-adds-speech-recognition-capability-to-its-cloud-based-agent-assist-and-ivr-payment-solutions/</loc>
		<lastmod>2020-09-08T15:11:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/http-request-smuggling-a-primer/</loc>
		<lastmod>2020-09-08T15:46:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-noa-novogroders-back-to-the-future-compsci-and-system-biology/</loc>
		<lastmod>2020-09-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/notpetya-covid-and-cybersecurity-enabled-business/</loc>
		<lastmod>2020-09-08T16:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-joy-of-tech-woody-guthrie-sings-at-amazon/</loc>
		<lastmod>2020-09-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/china-trolls-u-s-with-fox-in-henhouse-data-security-plan/</loc>
		<lastmod>2020-09-08T17:28:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/wang-yi-cancilleria-del-ecuador-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[wang-yi--cancillería del ecuador--cc-by-sa]]></image:title>
			<image:caption><![CDATA[China]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-passwordless-enterprise-era/</loc>
		<lastmod>2020-09-08T17:38:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-ankur-chowdharys-autonomous-security-analysis-pentesting/</loc>
		<lastmod>2020-09-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/doppelpaymer-gang-claims-responsibility-for-newcastle-university-issues/</loc>
		<lastmod>2020-09-08T18:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/reflected-xss-in-wordpress-plugin-admin-pages/</loc>
		<lastmod>2020-09-08T18:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cut-out-debilitating-outages-and-build-production-resiliency-with-dataops/</loc>
		<lastmod>2020-09-08T18:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/socially-engineered-humans/</loc>
		<lastmod>2020-09-08T18:42:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/warrior-run-school-district-manages-student-cyber-safety-in-g-suite-for-education/</loc>
		<lastmod>2020-09-08T18:49:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/evolution-of-ato-or-how-humans-are-now-replacing-bots/</loc>
		<lastmod>2020-09-08T20:29:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/every-application-should-be-behind-a-waf/</loc>
		<lastmod>2020-09-08T20:40:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/user-lookup-with-certificate-based-authentication/</loc>
		<lastmod>2020-09-08T21:06:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/arming-your-security-operations-center-with-soar/</loc>
		<lastmod>2020-09-08T21:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/arming-your-security-operations-center-with-soar-2/</loc>
		<lastmod>2020-09-08T21:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/microsoft-patch-tuesday-sept-2020-edition/</loc>
		<lastmod>2020-09-08T21:33:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/robocallers-hit-with-permanent-injunction-by-courts/</loc>
		<lastmod>2020-09-08T22:27:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/your-ast-guide-for-the-disenchanted-part-1-3/</loc>
		<lastmod>2020-09-08T23:53:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/new-ciso-top-5-things-you-need-to-know/</loc>
		<lastmod>2020-09-08T22:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/it-leaders-grossly-overestimate-the-maturity-of-their-vulnerability-management-programs/</loc>
		<lastmod>2020-09-08T23:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/concerned-about-keeping-your-vpn-and-network-secure/</loc>
		<lastmod>2020-09-09T01:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/vert-threat-alert-september-2020-patch-tuesday-analysis/</loc>
		<lastmod>2020-09-09T01:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/a-fully-converged-solution-for-modern-consumers-avast/</loc>
		<lastmod>2020-09-09T03:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/shadowserver-foundation-donation-avast/</loc>
		<lastmod>2020-09-09T03:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/iranian-hackers-launch-dharma-ransomware-attack-on-global-firms/</loc>
		<lastmod>2020-09-09T06:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/effectively-securing-microsoft-365-with-fortimail/</loc>
		<lastmod>2020-09-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/fortiguard-labs-discovers-multiple-critical-vulnerabilities-in-adobe-indesign/</loc>
		<lastmod>2020-09-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/distance-learning-advice-for-parents-avast/</loc>
		<lastmod>2020-09-09T09:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/garry-on-lockdown-episode-5-avast/</loc>
		<lastmod>2020-09-09T09:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/opening-day-for-hartford-public-schools-delayed-after-ransomware-attack-on-critical-network-systems/</loc>
		<lastmod>2020-09-09T10:35:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/your-ast-guide-for-the-disenchanted-part-1/</loc>
		<lastmod>2020-09-09T11:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/bringing-network-stability-and-security-back-to-businesses-big-and-small/</loc>
		<lastmod>2020-09-09T11:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/learn-ghidra-from-home-at-sector-2020/</loc>
		<lastmod>2020-09-09T11:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/data-overload-problem-data-normalization-strategies-are-expensive/</loc>
		<lastmod>2020-09-09T11:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/strategies-for-insider-threat-mitigation-2/</loc>
		<lastmod>2020-09-09T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/strategies-for-insider-threat-mitigation/</loc>
		<lastmod>2020-09-09T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/surge-in-cyberattacks-puts-manufacturing-ot-systems-at-risk/</loc>
		<lastmod>2020-09-09T12:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/surge-in-cyberattacks-puts-manufacturing-ot-systems-at-risk-2/</loc>
		<lastmod>2020-09-09T12:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/web-application-and-api-protection-from-sql-injection-to-magecart/</loc>
		<lastmod>2020-09-09T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/top-10-tips-to-prevent-insider-threats/</loc>
		<lastmod>2020-09-09T12:38:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/speech-recognition-the-power-of-voice/</loc>
		<lastmod>2020-09-09T12:50:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/pakistani-electric-supply-company-struck-by-netwalker-ransomware/</loc>
		<lastmod>2020-09-09T12:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/enzoic-wins-colorado-companies-to-watch-2020/</loc>
		<lastmod>2020-09-09T13:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/more-than-230-million-us-health-records-have-been-stolen-or-lost-in-past-decade/</loc>
		<lastmod>2020-09-09T13:35:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/keep-it-simple-choosing-the-right-ddos-mitigation-strategy/</loc>
		<lastmod>2020-09-09T13:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/nsa-and-cisa-urge-action-to-reduce-operational-technology-risk/</loc>
		<lastmod>2020-09-09T14:14:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ppmwp-2-3-1-improved-support-for-third-party-plugins/</loc>
		<lastmod>2020-09-09T14:55:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-apurv-gautams-automating-threat-hunting-on-the-dark-web-and-other-nitty-gritty-things/</loc>
		<lastmod>2020-09-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/wearedelphix-meet-ranzo-taylor-iii/</loc>
		<lastmod>2020-09-09T16:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-is-a-good-cybersecurity-program-it-varies-for-everyone/</loc>
		<lastmod>2020-09-09T16:56:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-university-covid-model/</loc>
		<lastmod>2020-09-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/combating-malware-in-2020-process-trends-and-tools-video/</loc>
		<lastmod>2020-09-09T17:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/is-secure-immutable-infrastructure-a-myth/</loc>
		<lastmod>2020-09-10T06:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/secureinfrastructure.jpg</image:loc>
			<image:title><![CDATA[secureinfrastructure]]></image:title>
			<image:caption><![CDATA[immutable infrastructure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-20-most-severe-cves-in-microsofts-september-2020-patch-tuesday-update/</loc>
		<lastmod>2020-09-09T17:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ldap-authentication-with-okta/</loc>
		<lastmod>2020-09-09T17:48:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-pablo-gonzalez-attpwn-adversarial-emulation-and-offensive-techniques-collaborative-project/</loc>
		<lastmod>2020-09-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/soc-quarantine-diaries-ep-6-block-ones-eddie-schwartz/</loc>
		<lastmod>2020-09-09T18:30:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/interesting-attack-on-the-emv-smartcard-payment-standard/</loc>
		<lastmod>2020-09-14T11:21:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/companies-should-tell-workers-its-ok-to-confess-to-security-mistakes-stanford-professor-says/</loc>
		<lastmod>2020-09-09T19:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/application-security-turbulence-often-leads-to-transformation/</loc>
		<lastmod>2020-09-09T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/another-privacy-shield-bites-the-dust/</loc>
		<lastmod>2020-09-09T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/data-breach-notification-myths-busted/</loc>
		<lastmod>2020-09-09T23:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/nexus-as-a-container-registry/</loc>
		<lastmod>2020-09-09T23:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/my-whcd-exam-experience/</loc>
		<lastmod>2020-09-10T06:21:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/addressing-insider-threats-at-financial-institutions-during-remote-work/</loc>
		<lastmod>2020-09-10T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/more-attackers-using-zero-day-exploits/</loc>
		<lastmod>2020-09-10T07:09:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/top-security-and-data-privacy-regulations-for-financial-services/</loc>
		<lastmod>2020-09-10T07:25:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybersecurity-maturity-model-certification-cmmc-and-why-you-should-care/</loc>
		<lastmod>2020-09-10T07:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/meeting-the-challenges-of-remote-work-with-chrome-os-policy-settings-part-ii/</loc>
		<lastmod>2020-09-10T07:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-incident-response-teams-and-orchestration-socs-benefit-from-threat-intelligence/</loc>
		<lastmod>2020-09-10T08:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/self-harm-monitoring-why-it-is-the-newest-ally-in-student-suicide-prevention/</loc>
		<lastmod>2020-09-10T11:02:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/pakistans-largest-power-supplier-hit-by-netwalker-ransomware/</loc>
		<lastmod>2020-09-10T11:14:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/a-natural-law-for-digital-data/</loc>
		<lastmod>2020-09-11T06:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Website-Supply-Chain-Attacks.jpg</image:loc>
			<image:title><![CDATA[Website-Supply-Chain-Attacks]]></image:title>
			<image:caption><![CDATA[digital data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/moving-to-the-cloud-security-plays-a-key-role-2/</loc>
		<lastmod>2020-09-10T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/moving-to-the-cloud-security-plays-a-key-role/</loc>
		<lastmod>2020-09-10T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-ensure-network-compliance-in-this-era-of-remote-work-the-itom-podcast-episode-5/</loc>
		<lastmod>2020-09-10T12:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/protect-your-organization-from-the-ransomware-trifecta/</loc>
		<lastmod>2020-09-10T12:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/step-by-step-configuration-with-gitlab/</loc>
		<lastmod>2020-09-10T12:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-c-suite-report-simplified-4-key-takeaways/</loc>
		<lastmod>2020-09-11T07:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/SAP.jpg</image:loc>
			<image:title><![CDATA[protecting]]></image:title>
			<image:caption><![CDATA[c-suite]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/why-a-strong-password-policy-is-so-important-for-your-wordpress-website/</loc>
		<lastmod>2020-09-10T13:12:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tufinnovate-americas-2020-the-new-normal/</loc>
		<lastmod>2020-09-10T13:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-what-why-how-of-ssh-protocol-keyfactor/</loc>
		<lastmod>2020-09-10T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-bitglass-sase-triangle-swg-for-securing-web-traffic/</loc>
		<lastmod>2020-09-10T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/proteccion-de-microsoft-365-buenas-practicas-y-recomendaciones/</loc>
		<lastmod>2020-09-10T15:44:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/o365-phishing-attack-used-real-time-validation-against-active-directory/</loc>
		<lastmod>2020-09-10T15:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cryptocurrency-exchange-eterbase-hacked-5-4-million-worth-of-funds-stolen/</loc>
		<lastmod>2020-09-10T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/pci-dss-4-0-and-the-changing-approach-to-compliance/</loc>
		<lastmod>2020-09-10T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-safe-mode-red-team-village-anthony-roses-and-jake-krasnovs-apts-%e2%9d%a4%ef%b8%8f-powershell-you-should-too/</loc>
		<lastmod>2020-09-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/setting-up-a-hacker-proof-infosec-team/</loc>
		<lastmod>2020-09-10T16:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-is-cloud-workload-protection/</loc>
		<lastmod>2020-09-10T16:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-respond-to-a-ddos-ransom-note/</loc>
		<lastmod>2020-09-10T16:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-joy-of-tech-facebooks-plan-to-save-democracy/</loc>
		<lastmod>2020-09-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-safe-mode-red-team-village-eduardo-arriols-catch-me-if-you-can/</loc>
		<lastmod>2020-09-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/back-in-2015-while-working-on-a-gartner-soc-paper-i-coined-the-concept-of-soc-nuclear-triad/</loc>
		<lastmod>2020-09-10T18:15:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/eight-in-10-it-pros-believe-their-organization-is-next-to-suffer-a-breach/</loc>
		<lastmod>2020-09-10T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/staying-on-top-of-issues-with-thundras-error-inspector/</loc>
		<lastmod>2020-09-10T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/new-feature%e2%80%8a-%e2%80%8aability-to-compare-any-two-code-analysis-scans/</loc>
		<lastmod>2020-09-10T20:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/life-after-privacy-avast/</loc>
		<lastmod>2020-09-10T20:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/sonrai-wins-gold-and-bronze-stevie-awards-in-2020-new-product-category/</loc>
		<lastmod>2020-09-10T20:32:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/is-this-town-big-enough-for-security-and-compliance/</loc>
		<lastmod>2020-09-11T01:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/wordpress-malware-disables-security-plugins-to-avoid-detection/</loc>
		<lastmod>2020-09-11T01:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/segs-havent-stopping-phishing-so-email-isolation-is-next-hold-on/</loc>
		<lastmod>2020-09-11T02:08:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-divvycloud-by-rapid-7-keeps-customer-clouds-out-of-the-news/</loc>
		<lastmod>2020-09-11T02:12:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-continuous-process-of-election-improvement/</loc>
		<lastmod>2020-09-11T04:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/will-shadow-code-grinch-ecommerce-this-holiday-season/</loc>
		<lastmod>2020-09-11T05:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/fortinet-enables-secure-telework-with-security-fabric-solutions/</loc>
		<lastmod>2020-09-11T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/entrust-datacard-is-now-entrust-ncipher-is-now-entrust/</loc>
		<lastmod>2020-09-11T07:05:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/understanding-the-tactics-of-ransomware-attacks/</loc>
		<lastmod>2020-09-11T10:12:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Rise-Fileless-Malware.jpg</image:loc>
			<image:caption><![CDATA[ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cutting-through-the-noise-of-soc-overload/</loc>
		<lastmod>2020-09-11T10:32:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/cyberthreat.jpg</image:loc>
			<image:title><![CDATA[cyberthreat]]></image:title>
			<image:caption><![CDATA[SOC]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/netwalker-ransomware-operators-want-4-5-million-from-data-center-giant-equinix/</loc>
		<lastmod>2020-09-11T11:03:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/secure-your-zoom-account-with-two-factor-authentication/</loc>
		<lastmod>2020-09-11T11:29:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/travel-industry-giants-failed-to-secure-their-websites-despite-high-profile-data-breaches-new-research-shows/</loc>
		<lastmod>2020-09-11T11:52:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-monitor-iis-effectively/</loc>
		<lastmod>2020-09-11T12:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/best-sso-providers-why-loginradius-is-considered-as-the-best-sso-solution/</loc>
		<lastmod>2020-09-11T12:20:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/a-day-in-the-life-of-a-soc-architect/</loc>
		<lastmod>2020-09-11T12:45:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cryptocurrency-exchange-eterbase-loses-5-4-million-to-hackers-overnight/</loc>
		<lastmod>2020-09-11T13:15:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/amp-up-your-microsoft-exchange-reporting-with-exchange-reporter-plus-e-book/</loc>
		<lastmod>2020-09-11T13:30:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ranking-national-cyber-power/</loc>
		<lastmod>2020-09-11T13:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/black-hat-conference-multi-vector-edr-with-qualys/</loc>
		<lastmod>2020-09-14T06:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto14729899.jpg</image:loc>
			<image:title><![CDATA[endpoint security]]></image:title>
			<image:caption><![CDATA[multi-vector EDR]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/intelligence-sharing-in-action-covid-19-cyber-threat-coalition/</loc>
		<lastmod>2020-09-14T07:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/ideas.jpg</image:loc>
			<image:title><![CDATA[ideas]]></image:title>
			<image:caption><![CDATA[intelligence-sharing]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/COVIDpic1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/3-web-third-party-related-events-you-dont-want-to-miss-from-august-september-2020/</loc>
		<lastmod>2020-09-11T15:18:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/proctoring-software-may-perpetuate-racism-avast/</loc>
		<lastmod>2020-09-11T15:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/college-surveillance-concerns-avast/</loc>
		<lastmod>2020-09-11T15:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-justin-hutchens-bypassing-multifactor-auth-with-realtime-replay/</loc>
		<lastmod>2020-09-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/metrics-that-matter-continuous-performance-optimization/</loc>
		<lastmod>2020-09-11T16:07:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/when-hackers-take-advantage-of-your-trusted-vendors/</loc>
		<lastmod>2020-09-11T17:15:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-constellation-monstrosity/</loc>
		<lastmod>2020-09-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/russia-china-iran-meddle-in-2020-election-unsurprisingly/</loc>
		<lastmod>2020-09-11T17:16:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/bears-internet-archive-pd.jpg</image:loc>
			<image:title><![CDATA[bears--internet-archive--pd]]></image:title>
			<image:caption><![CDATA[Russia]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/aqua-security-research-report-shows-increase-in-organized-attacks-on-cloud-native-infrastructure-and-software-supply-chain/</loc>
		<lastmod>2020-09-14T12:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-ali-abdollahis-bypassing-in-mobile-network-from-red-team-pov/</loc>
		<lastmod>2020-09-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/securing-todays-kids-online/</loc>
		<lastmod>2020-09-11T18:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-university-covid-model-2/</loc>
		<lastmod>2020-09-11T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ng-siem/</loc>
		<lastmod>2020-09-11T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-move-to-the-cloud-gains-momentum-but-security-is-still-a-big-concern/</loc>
		<lastmod>2020-09-11T19:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/why-application-security-is-important-to-vulnerability-management/</loc>
		<lastmod>2020-09-11T19:42:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/4-steps-for-establishing-an-effective-appsec-strategy/</loc>
		<lastmod>2020-09-11T19:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tanstaafl-the-tragedy-of-the-commons-meets-open-source-software/</loc>
		<lastmod>2020-09-11T19:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tufinnovate-americas-2020-part-ii/</loc>
		<lastmod>2020-09-11T19:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/unprecedented-levels-of-ransom-ddos-extortion-attacks/</loc>
		<lastmod>2020-09-11T20:06:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-does-chocolate-have-to-do-with-maintaining-privacy-regulations/</loc>
		<lastmod>2020-09-11T20:26:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-pentagon-9-11-memorial-2/</loc>
		<lastmod>2020-09-11T21:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/in-memoriam-all-9-11-victims/</loc>
		<lastmod>2020-09-11T21:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/weekly-news-roundup-september-7-11-2020/</loc>
		<lastmod>2020-09-11T22:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-makes-serverless-difficult-and-how-thundra-can-help/</loc>
		<lastmod>2020-09-11T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cisa-warns-election-related-entities-to-be-on-watch-for-phishing-attacks/</loc>
		<lastmod>2020-09-12T01:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cyberattackers-target-norwegian-parliament/</loc>
		<lastmod>2020-09-12T06:02:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-mathy-vanhoefs-christina-poppers-prasant-adhikaris-protecting-wifi-beacons-from-outside-forgeries/</loc>
		<lastmod>2020-09-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-polls-vs-the-street/</loc>
		<lastmod>2020-09-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-travis-palmers-passwd-cracking-beyond-15-chars-under-500/</loc>
		<lastmod>2020-09-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cliche-security-through-obscurity-yet-again/</loc>
		<lastmod>2020-09-12T23:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/run-as-system-using-evil-winrm/</loc>
		<lastmod>2020-09-13T14:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-petros-koutrompis-ou-having-a-laugh/</loc>
		<lastmod>2020-09-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/putting-your-data-security-at-the-center-of-our-mission/</loc>
		<lastmod>2020-09-13T16:47:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/robert-m-lees-jeff-haas-little-bobby-comics-week-294/</loc>
		<lastmod>2020-09-13T18:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-kaustubhs-offensive-embedded-exploitation/</loc>
		<lastmod>2020-09-13T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-federal-government-ransomwares-most-desirable-target/</loc>
		<lastmod>2020-09-13T21:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/learning-from-the-best-james-collins-cio-of-delaware/</loc>
		<lastmod>2020-09-14T01:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/schools-under-cyberattack-chrome-ad-blocking-update-us-election-interference/</loc>
		<lastmod>2020-09-14T04:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/securing-remote-workers-requires-an-integrated-approach/</loc>
		<lastmod>2020-09-14T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-importance-of-fixing-and-finding-vulnerabilities-in-development/</loc>
		<lastmod>2020-09-14T07:10:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/gearing-towards-your-next-audit-understanding-the-difference-between-best-practice-frameworks-and-regulatory-compliance-standards/</loc>
		<lastmod>2020-09-14T07:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/us-staffing-firm-artech-keeps-silent-about-data-breach-leaves-customers-at-risk-of-fraud-for-eight-months/</loc>
		<lastmod>2020-09-14T09:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybersecurity-lessons-from-the-pandemic-positive-and-negative-feedback/</loc>
		<lastmod>2020-09-14T10:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/maze-ransomware-operators-claim-fairfax-county-public-schools-as-latest-victim/</loc>
		<lastmod>2020-09-14T10:26:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/datasecops-protecting-data-in-the-cloud/</loc>
		<lastmod>2020-09-15T06:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Compromising-Web-Security.jpg</image:loc>
			<image:title><![CDATA[Compromising-Web-Security]]></image:title>
			<image:caption><![CDATA[DataSecOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/using-saas-backup-and-recovery-to-protect-your-data-with-a-virtual-air-gap/</loc>
		<lastmod>2020-09-15T07:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/airgap.jpg</image:loc>
			<image:title><![CDATA[airgap]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/Metallic-VirtualAirGapDiagram41-scaled.jpg</image:loc>
			<image:caption><![CDATA[air-gap]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ransomware-was-the-top-cyber-insurance-claim-in-q1-2020/</loc>
		<lastmod>2020-09-14T11:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/rsa-named-a-leader-in-2020-gartner-magic-quadrant-for-it-vendor-risk-management-tools-marking-5th-consecutive-time-2/</loc>
		<lastmod>2020-09-14T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/rsa-named-a-leader-in-2020-gartner-magic-quadrant-for-it-vendor-risk-management-tools-marking-5th-consecutive-time/</loc>
		<lastmod>2020-09-14T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-perform-a-skill-gap-analysis/</loc>
		<lastmod>2020-09-14T12:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/rethinking-defensive-strategy-at-the-edge-part-1-a-changing-landscape-for-securing-users/</loc>
		<lastmod>2020-09-14T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/over-1-million-patients-and-donors-impacted-by-inova-health-system-data-breach/</loc>
		<lastmod>2020-09-14T12:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/navigating-network-security-for-remote-workers/</loc>
		<lastmod>2020-09-14T13:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-cyberhero-adventures-show-joins-the-mediaops-lineup/</loc>
		<lastmod>2020-09-14T14:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/superhero.jpg</image:loc>
			<image:title><![CDATA[superhero]]></image:title>
			<image:caption><![CDATA[CyberHero Adventures Show]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/quotthe-cyberhero-adventures-defending-your-healthquot-view-in-full-screen-thanks-to-our-healthcare-workers-and-first-responders.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/an-introduction-to-hardware-hacking/</loc>
		<lastmod>2020-09-14T13:47:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/katie-arrington-discusses-making-development-move-at-the-speed-of-relevance/</loc>
		<lastmod>2020-09-14T15:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-sajal-thomas-modern-red-team-tradecraft/</loc>
		<lastmod>2020-09-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/perimeter-81-looks-to-take-firewall-appliances-out/</loc>
		<lastmod>2020-09-14T16:03:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Code-War.jpg</image:loc>
			<image:title><![CDATA[Code-War]]></image:title>
			<image:caption><![CDATA[firewall]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-migration-from-pa-dss-to-ssf-everything-you-need-to-know/</loc>
		<lastmod>2020-09-14T16:10:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/using-access-controls-to-thwart-insider-threats/</loc>
		<lastmod>2020-09-14T16:54:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-gravitational-wave-pulsars/</loc>
		<lastmod>2020-09-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/new-research-shows-cisos-struggling-to-prepare-for-upcoming-security-compliance-audits/</loc>
		<lastmod>2020-09-15T13:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cyber-deception-reduces-data-breach-costs-by-over-51-and-soc-inefficiencies-by-32/</loc>
		<lastmod>2020-09-14T17:32:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-daniel-miesslers-mechanizing-methodology-automating-discovery/</loc>
		<lastmod>2020-09-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-is-cloud-workload-security-2/</loc>
		<lastmod>2020-09-14T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/exabeam-and-code42-announce-strategic-partnership-to-detect-and-respond-to-risk-from-insider-threats/</loc>
		<lastmod>2020-09-15T13:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/due-diligence-that-money-cant-buy/</loc>
		<lastmod>2020-09-14T19:47:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/43-of-orgs-think-devops-integration-is-critical-to-appsec-success/</loc>
		<lastmod>2020-09-14T19:51:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-maintain-team-building-while-working-remotely/</loc>
		<lastmod>2020-09-14T21:17:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/krebs-three-rules/</loc>
		<lastmod>2020-09-14T21:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/microsoft-domain-controller-zerologon-and-rce-vulnerabilities/</loc>
		<lastmod>2020-09-14T23:08:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/and-now-for-something-awesome-sans-launches-new-series-of-worldwide-capture-the-flag-cyber-events/</loc>
		<lastmod>2020-09-14T23:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/why-are-some-cybersecurity-professionals-not-finding-jobs/</loc>
		<lastmod>2020-09-14T23:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/over-18k-covid-19-patients-data-mistakenly-exposed-by-nhs-trust/</loc>
		<lastmod>2020-09-14T23:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-quickly-identify-and-mitigate-new-and-changing-cyber-risks/</loc>
		<lastmod>2020-09-14T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/webinar-android-hacking-proving-ground/</loc>
		<lastmod>2020-09-15T00:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ciphercloud-chronicles-4-fishing-sensitive-data/</loc>
		<lastmod>2020-09-15T06:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/bridging-the-skills-gap-for-successful-devsecops/</loc>
		<lastmod>2020-09-15T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/forgerock-identity-cloud-gets-even-better/</loc>
		<lastmod>2020-09-15T07:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/maximising-logistical-excellence-and-efficiency-by-minimising-lost-time/</loc>
		<lastmod>2020-09-15T07:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/joint-cybersecurity-advisory-on-threat-hunting-and-incident-response-released/</loc>
		<lastmod>2020-09-15T07:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/using-the-cost-of-a-data-breach-to-maximize-your-roi-on-your-security-tools/</loc>
		<lastmod>2020-09-15T07:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/acunetix-update-introduces-data-retention-policies-static-javascript-method-analysis-user-based-timezone-settings-and-new-vulnerability-checks/</loc>
		<lastmod>2020-09-15T07:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/is-a-cyber-pandemic-coming/</loc>
		<lastmod>2020-09-15T11:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ensure-online-business-transaction-safety-avast/</loc>
		<lastmod>2020-09-15T11:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/design-your-home-workspace-avast/</loc>
		<lastmod>2020-09-15T11:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/seychelles-bank-doesnt-know-how-it-got-infected-with-ransomware-last-week/</loc>
		<lastmod>2020-09-15T11:33:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cisa-sponsored-cve-program-grants-nozomi-networks-cna-status/</loc>
		<lastmod>2020-09-15T11:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cisa-sponsored-cve-program-grants-nozomi-networks-cna-status-2/</loc>
		<lastmod>2020-09-15T11:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/it-aint-what-you-do-its-the-way-that-you-do-it/</loc>
		<lastmod>2020-09-15T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/it-aint-what-you-do-its-the-way-that-you-do-it-2/</loc>
		<lastmod>2020-09-15T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/are-you-listening-to-your-logs-part-3-high-disk-usage/</loc>
		<lastmod>2020-09-15T12:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/eterbase-exchange-hacked-hackers-stole-5-4-mn/</loc>
		<lastmod>2020-09-15T12:15:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/devo-technology-adds-60-million-in-growth-funding-and-names-former-ibm-security-gm-as-new-ceo/</loc>
		<lastmod>2020-09-15T12:17:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/us-department-of-veterans-affairs-discloses-data-breach-impacting-nearly-50000-veterans/</loc>
		<lastmod>2020-09-15T12:29:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/put-privileged-access-management-at-the-core-of-nist-zero-trust-architecture/</loc>
		<lastmod>2020-09-15T12:30:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/a-historic-plan-built-for-the-public/</loc>
		<lastmod>2020-09-15T12:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/a-tale-of-two-password-protection-approaches/</loc>
		<lastmod>2020-09-15T12:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/security-incident-at-va-exposed-46k-veterans-information/</loc>
		<lastmod>2020-09-15T12:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/an-active-defense-mindset-draws-better-financial-returns-from-your-soc/</loc>
		<lastmod>2020-09-15T13:01:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-soar-can-treat-the-cybersercurity-skills-shortage/</loc>
		<lastmod>2020-09-15T13:19:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/guardsquare-introduces-new-community-connecting-mobile-application-developers-and-proguard-users-to-encourage-networking-and-showcasing-expertise/</loc>
		<lastmod>2020-09-15T13:36:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/beyond-identity-joins-forgerocks-trust-network-of-certified-technology-partners-to-deliver-passwordless-single-sign-on-and-risk-based-authorization/</loc>
		<lastmod>2020-09-15T13:39:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/its-confidence-in-mitigating-cyberthreats-low/</loc>
		<lastmod>2020-09-16T06:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Fileless-Malware-RSAC.jpg</image:loc>
			<image:caption><![CDATA[Zerologon]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/an-overview-of-sonrai-dig/</loc>
		<lastmod>2020-09-15T13:52:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/write-code-that-protects-sensitive-user-data/</loc>
		<lastmod>2020-09-15T13:53:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/performance-and-security-in-5g-avast/</loc>
		<lastmod>2020-09-15T13:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/suricata-or-zeek-the-answer-is-both/</loc>
		<lastmod>2020-09-15T14:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/suricata-or-zeek-the-answer-is-both-2/</loc>
		<lastmod>2020-09-15T14:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/network-security-audits-5-keys-for-successful-audits-2/</loc>
		<lastmod>2020-09-15T14:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/network-security-audits-5-keys-for-successful-audits/</loc>
		<lastmod>2020-09-15T14:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/when-the-going-gets-tough-rd-calls-with-customers-doing-it-right/</loc>
		<lastmod>2020-09-15T14:28:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/webinar-recap-the-need-for-end-to-end-cryptography-management-keyfactor/</loc>
		<lastmod>2020-09-15T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ransomwiz-from-nyotron-lets-cyber-pros-build-safe-ransomware-attacks/</loc>
		<lastmod>2020-09-21T13:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/research-reveals-that-75-of-appsec-practitioners-see-a-growing-cultural-divide-between-appsec-and-developers/</loc>
		<lastmod>2020-09-22T12:30:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/blindside-intel-amd-speculation-bugs-under-microscope-again/</loc>
		<lastmod>2020-09-15T15:09:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/cpu-fail-fritzchens-fritz-pd.jpg</image:loc>
			<image:title><![CDATA[cpu-fail--fritzchens-fritz--pd]]></image:title>
			<image:caption><![CDATA[BlindSide]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/can-you-crack-monero-irs-offers-625000-bounty-for-anyone-who-can-break-privacy-of-cryptocurrency/</loc>
		<lastmod>2020-09-15T15:10:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/new-bluetooth-vulnerability/</loc>
		<lastmod>2020-09-17T11:18:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-build-a-serverless-api-from-scratch/</loc>
		<lastmod>2020-09-15T15:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-prepare-your-data-for-the-libor-transition-to-sofr/</loc>
		<lastmod>2020-09-15T15:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-madhu-akula-kubernetes-goat-vulnerable-by-design/</loc>
		<lastmod>2020-09-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/why-siem-has-failed-the-cybersecurity-industry/</loc>
		<lastmod>2020-09-15T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/newsbites-drilldown-for-the-week-ending-11-september-2020/</loc>
		<lastmod>2020-09-15T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/4-infosec-teams-that-dont-need-balbix/</loc>
		<lastmod>2020-09-15T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-evidence-of-alien-life/</loc>
		<lastmod>2020-09-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/meet-the-corelight-ctf-tournament-winners/</loc>
		<lastmod>2020-09-15T17:08:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/okta-certificate-authentication-with-sso/</loc>
		<lastmod>2020-09-15T17:45:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-shay-nehmad-making-breach-and-attack-simulation-accessible/</loc>
		<lastmod>2020-09-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/improving-security-defenses-with-mitre-attck-part-1/</loc>
		<lastmod>2020-09-15T18:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-can-nonprofits-protect-themselves-against-card-testing/</loc>
		<lastmod>2020-09-15T20:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/achieving-sox-cybersecurity-compliance-using-nist-controls/</loc>
		<lastmod>2020-09-15T20:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/telehealth-now-the-biggest-cyber-threat-to-healthcare-new-data-shows/</loc>
		<lastmod>2020-09-15T20:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/missing-dmarc-records-lead-to-phishing/</loc>
		<lastmod>2020-09-15T20:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/c-suite-perspectives-2020/</loc>
		<lastmod>2020-09-15T20:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/c-suite-survey-accelerated-cloud-migrations-lagging-security/</loc>
		<lastmod>2020-09-15T20:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/bsimm11-tracking-the-cutting-edge-of-software-security-initiatives/</loc>
		<lastmod>2020-09-15T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/u-s-department-of-defense-leads-the-industry-with-cloud-based-internet-isolation-program/</loc>
		<lastmod>2020-09-15T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/forescout-2020-09-15-180649/</loc>
		<lastmod>2020-09-15T22:06:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/change-your-thinking-turn-conventional-security-inside-out/</loc>
		<lastmod>2020-09-15T22:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/your-ast-guide-for-the-disenchanted-part-2/</loc>
		<lastmod>2020-09-16T00:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/value-stream-mapping-security-in-software-development/</loc>
		<lastmod>2020-09-16T00:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/your-ast-guide-for-the-disenchanted-part-2-4/</loc>
		<lastmod>2020-09-16T03:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tufinnovate-emea-2020/</loc>
		<lastmod>2020-09-16T03:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/report-no-organizations-security-culture-has-received-excellent-score/</loc>
		<lastmod>2020-09-16T04:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-fortisoar-benefits-partner-soc-operations/</loc>
		<lastmod>2020-09-16T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ssh-attack-vector-dormant-forgotten-keys-keyfactor/</loc>
		<lastmod>2020-09-16T07:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-value-of-data-from-a-consumers-perspective/</loc>
		<lastmod>2020-09-16T10:35:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/TCP-IP-Log-Data.jpg</image:loc>
			<image:title><![CDATA[TCP-IP-Log-Data]]></image:title>
			<image:caption><![CDATA[value data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/security-is-no-longer-a-binary-decision-2/</loc>
		<lastmod>2020-09-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/security-is-no-longer-a-binary-decision/</loc>
		<lastmod>2020-09-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/managedmethods-partners-with-cdw-to-bring-k-12-cybersecurity-safety-to-schools/</loc>
		<lastmod>2020-09-16T12:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/explore-how-the-firewall-analyzer-add-on-for-opmanager-can-help-you-improve-your-network-security/</loc>
		<lastmod>2020-09-16T12:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/rethinking-defensive-strategy-at-the-edge-part-2-risk-signals-as-security-controls/</loc>
		<lastmod>2020-09-16T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/palo-alto-networks-moves-to-secure-sd-wans/</loc>
		<lastmod>2020-09-16T12:19:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Intent-Based-Security.jpg</image:loc>
			<image:title><![CDATA[networking]]></image:title>
			<image:caption><![CDATA[HashiCorp]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/armis-announces-integration-with-servicenow-service-graph/</loc>
		<lastmod>2020-09-16T13:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/enhanced-integration-with-servicenow-service-graph-connector-program-accelerates-risk-reduction/</loc>
		<lastmod>2020-09-16T13:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xml-external-entity-xxe-pitfalls-with-jaxb/</loc>
		<lastmod>2020-09-16T13:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/iam-101-series-what-is-identity-governance-and-administration/</loc>
		<lastmod>2020-09-16T14:45:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/game-hacking-part-1-equipping-your-loadout/</loc>
		<lastmod>2020-09-16T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/dusseldorf-university-hospital-emergency-care-postponed-after-alleged-cyber-attack/</loc>
		<lastmod>2020-09-16T15:06:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/its-time-to-revive-your-enterprise-business-resiliency-plan/</loc>
		<lastmod>2020-09-16T15:09:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/6-critical-questions-to-plan-for-enterprise-business-resiliency/</loc>
		<lastmod>2020-09-16T15:10:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/election-interference-the-russians-are-back-or-they-never-left/</loc>
		<lastmod>2020-09-17T06:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Russia.jpg</image:loc>
			<image:title><![CDATA[Russia]]></image:title>
			<image:caption><![CDATA[election Russians]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/NCSC-Disinformation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/Peace-Data-AI-fakes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-ben-sadeghipours-tanner-barnes-knock-knock-identifying-assets-in-the-cloud/</loc>
		<lastmod>2020-09-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/new-smishing-campaign-using-usps-as-its-disguise/</loc>
		<lastmod>2020-09-16T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/researchers-identify-the-departments-and-industries-most-susceptible-to-email-based-cyber-attacks/</loc>
		<lastmod>2020-09-16T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-joy-of-tech-pre-keynote-ritual/</loc>
		<lastmod>2020-09-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybrary-survey-finds-cybersecurity-skills-gap-threatens-job-effectiveness-amidst-increasing-global-cyber-attacks/</loc>
		<lastmod>2020-09-22T13:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ccna-exam-information-and-overview/</loc>
		<lastmod>2020-09-16T17:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ccna-certification-overview-and-career-path/</loc>
		<lastmod>2020-09-16T17:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/7-nice-cybersecurity-workforce-framework-categories-everything-you-need-to-know/</loc>
		<lastmod>2020-09-16T17:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/how-to-align-nice-cybersecurity-workforce-framework-ksas-with-roles-in-your-organization/</loc>
		<lastmod>2020-09-16T17:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/what-is-the-nice-cybersecurity-workforce-framework/</loc>
		<lastmod>2020-09-16T17:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/i-thought-i-needed-a-new-ipad-i-was-wrong/</loc>
		<lastmod>2020-09-16T17:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/purple-fox-malware-what-it-is-how-it-works-and-how-to-prevent-it/</loc>
		<lastmod>2020-09-16T17:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cloud-pentesting-certification-boot-camp-the-ultimate-guide/</loc>
		<lastmod>2020-09-16T17:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/6-windows-event-log-ids-to-monitor-now/</loc>
		<lastmod>2020-09-16T17:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-phillip-wylies-inside-the-mind-of-a-threat-actor/</loc>
		<lastmod>2020-09-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/protect-your-office-365-data-against-consent-phishing/</loc>
		<lastmod>2020-09-16T19:17:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/time-to-update-your-cybersecurity-policy/</loc>
		<lastmod>2020-09-16T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ransomware-deletion-methods-and-the-canary-in-the-coal-mine/</loc>
		<lastmod>2020-09-16T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/android-app-security-over-12000-popular-android-apps-contain-undocumented-backdoors/</loc>
		<lastmod>2020-09-16T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/aws-database-management/</loc>
		<lastmod>2020-09-16T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/hack-the-box-htb-machines-walkthrough-series-resolute/</loc>
		<lastmod>2020-09-16T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/dns-security-best-practices-preventing-dns-hijacking-poisoning-and-redirection/</loc>
		<lastmod>2020-09-16T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/52-nice-cybersecurity-workforce-framework-work-roles-what-you-need-to-know/</loc>
		<lastmod>2020-09-16T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ultimate-guide-to-international-data-protection-and-privacy-laws/</loc>
		<lastmod>2020-09-16T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ccna-certification-prep-network-access/</loc>
		<lastmod>2020-09-16T19:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/10m-ftc-settlement-highlights-importance-of-auto-renewal-transparency/</loc>
		<lastmod>2020-09-16T19:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/use-the-dark-web-to-enhance-your-investigations-learn-how-training-course/</loc>
		<lastmod>2020-09-16T19:37:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/getting-sassy-about-sase-the-value-of-edge-security/</loc>
		<lastmod>2020-09-16T19:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ccna-certification-prep-automation-and-programmability/</loc>
		<lastmod>2020-09-16T19:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ccna-certification-prep-ip-services/</loc>
		<lastmod>2020-09-16T19:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ccna-certification-prep-ip-connectivity/</loc>
		<lastmod>2020-09-16T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/announcing-the-neuvector-sonatype-nexus-lifecycle-integration-securing-containers-across-the-sdlc/</loc>
		<lastmod>2020-09-16T19:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/16-of-orgs-require-developers-to-self-educate-on-security/</loc>
		<lastmod>2020-09-16T20:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/childrens-creed/</loc>
		<lastmod>2020-09-16T20:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/two-russians-charged-in-17m-cryptocurrency-phishing-spree/</loc>
		<lastmod>2020-09-16T20:53:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/trickbot-emotet-delivery-through-word-macro/</loc>
		<lastmod>2020-09-16T20:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/detecting-zerologon-cve-2020-1472-with-zeek/</loc>
		<lastmod>2020-09-16T20:59:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/phpbash-a-terminal-emulator-web-shell/</loc>
		<lastmod>2020-09-16T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/why-following-nist-guidelines-will-strengthen-your-siem-framework/</loc>
		<lastmod>2020-09-16T23:16:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/critical-infrastructure-encompasses-more-than-it-once-did-and-must-be-better-protected/</loc>
		<lastmod>2020-09-16T23:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/havent-you-had-your-fill-of-credential-stuffing/</loc>
		<lastmod>2020-09-16T23:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/financial-sector-cybersecurity-how-do-you-compare-to-your-peers/</loc>
		<lastmod>2020-09-16T23:41:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/credential-stuffing-avast/</loc>
		<lastmod>2020-09-17T02:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/building-your-team-up-to-win-the-security-arms-race/</loc>
		<lastmod>2020-09-17T03:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-history-of-common-vulnerabilities-and-exposures-cve/</loc>
		<lastmod>2020-09-17T03:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/customers-across-industries-simplify-and-secure-branch-networks/</loc>
		<lastmod>2020-09-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-top-5-programming-languages-for-security-admins-to-learn/</loc>
		<lastmod>2020-09-17T07:54:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/introducing-isolated-workspace-as-a-service-the-new-way-to-isolate-your-workspace/</loc>
		<lastmod>2020-09-17T08:55:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/post-lockdown-office-redesign-avast/</loc>
		<lastmod>2020-09-17T09:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/staples-discloses-data-breach-exposing-limited-customer-information/</loc>
		<lastmod>2020-09-17T10:26:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/phishing-attacks-spike-up-during-work-from-home/</loc>
		<lastmod>2020-09-17T10:33:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/introducing-tracing-for-aws-appsync/</loc>
		<lastmod>2020-09-17T10:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/3-ways-school-it-can-get-involved-in-student-suicide-prevention/</loc>
		<lastmod>2020-09-17T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tabletop-exercises-build-resilience-and-confidence-for-future-elections-2/</loc>
		<lastmod>2020-09-17T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tabletop-exercises-build-resilience-and-confidence-for-future-elections/</loc>
		<lastmod>2020-09-17T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/maximize-soar-investment-returns-with-contextualized-threat-intelligence/</loc>
		<lastmod>2020-09-17T12:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/firemon-unveils-industrys-first-agile-network-security-policy-management-platform/</loc>
		<lastmod>2020-09-22T13:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/get-ready-its-almost-bots-attack-week/</loc>
		<lastmod>2020-09-17T12:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/pci-pal-recognised-as-notable-tech-innovator-following-tech-east-100-award/</loc>
		<lastmod>2020-09-17T13:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/covid-19-amplifies-cisos-concerns-about-doing-more-with-less/</loc>
		<lastmod>2020-09-17T13:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/security-misconfigurations-and-their-consequences-for-web-security/</loc>
		<lastmod>2020-09-17T13:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/u-s-treasury-sanctions-russian-hackers-for-stealing-17-million-in-crypto-cash/</loc>
		<lastmod>2020-09-17T13:41:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/rangeforce-expands-security-training-cloud-service/</loc>
		<lastmod>2020-09-17T13:57:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/securitytraining.jpg</image:loc>
			<image:title><![CDATA[securitytraining]]></image:title>
			<image:caption><![CDATA[security training]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/BattleFortress-Screenshot-Full.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-curious-case-of-suncrypt/</loc>
		<lastmod>2020-09-18T06:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/sun.jpg</image:loc>
			<image:title><![CDATA[sun]]></image:title>
			<image:caption><![CDATA[SunCrypt]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/Screen-Shot-2020-08-26-at-10.53.56.png</image:loc>
			<image:caption><![CDATA[suncrypt ransomware encrypted files]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/Screen-Shot-2020-08-26-at-10.41.51.png</image:loc>
			<image:caption><![CDATA[SunCrypt ransom demanding message]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/wastedlocker-and-the-vulnerability-of-our-supply-chain/</loc>
		<lastmod>2020-09-17T14:57:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/lockbit-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-09-17T14:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/sunset-decoy-vulnhub-ctf-walkthrough/</loc>
		<lastmod>2020-09-17T14:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-hacker-mind-podcast-why-are-blue-team-hackers-more-l33t/</loc>
		<lastmod>2020-09-17T14:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/making-smart-decisions-in-uncertain-times/</loc>
		<lastmod>2020-09-17T14:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/patching-in-the-time-of-remote-work/</loc>
		<lastmod>2020-09-18T07:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/patching.jpg</image:loc>
			<image:title><![CDATA[patching]]></image:title>
			<image:caption><![CDATA[patching]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/adopting-quantum-cryptography-why-y2q-will-be-too-late/</loc>
		<lastmod>2020-09-17T15:40:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/cryptography.jpg</image:loc>
			<image:title><![CDATA[cryptography]]></image:title>
			<image:caption><![CDATA[quantum]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/Quantum-timeline_ISARA.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-ensure-a-seamless-end-user-experience-the-itom-podcast-episode-6/</loc>
		<lastmod>2020-09-17T15:47:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-walter-cuestas-initial-compromise-through-web-side/</loc>
		<lastmod>2020-09-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-use-vpn-with-azure-ad/</loc>
		<lastmod>2020-09-17T16:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-common-star-types/</loc>
		<lastmod>2020-09-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/why-data-overload-happens-and-why-it-is-a-problem-for-cybersecurity-teams/</loc>
		<lastmod>2020-09-17T17:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ios-14-brings-privacy-protections-avast/</loc>
		<lastmod>2020-09-17T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/secure-private-access-announcement-avast/</loc>
		<lastmod>2020-09-17T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/post-pandemic-responsibilities-for-a-modern-day-ciso/</loc>
		<lastmod>2020-09-17T17:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/raccoon-attack-researchers-find-a-vulnerability-in-tls-1-2/</loc>
		<lastmod>2020-09-17T17:47:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-ch33r10s-indicators-of-emulation-spicy-adversary-emulation/</loc>
		<lastmod>2020-09-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/eleven-requirements-for-secure-managed-file-transfer/</loc>
		<lastmod>2020-09-17T18:17:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/improving-security-defenses-with-mitre-attck-part-2/</loc>
		<lastmod>2020-09-17T18:25:18+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->