<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2020/09/expert-opinions-frequency-of-reviewing-your-cyber-risk/</loc>
		<lastmod>2020-09-17T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/introducing-a-new-kind-of-security-key-zenkey/</loc>
		<lastmod>2020-09-17T19:53:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/maze-gang-distributed-ransomware-payload-inside-vm/</loc>
		<lastmod>2020-09-17T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/hackers-pumped-and-dumped-gas-cryptocurrency-for-16-8-million-alleges-us-doj/</loc>
		<lastmod>2020-09-17T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/if-every-day-is-cyber-monday-will-there-be-a-holiday-shopping-season-at-all/</loc>
		<lastmod>2020-09-17T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/major-global-ransom-denial-of-service-campaign-continues-rising-trend-in-global-ddos-attacks/</loc>
		<lastmod>2020-09-17T20:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/webinar-recap-using-zero-trust-manufacturing-for-supply-chains/</loc>
		<lastmod>2020-09-17T21:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/no-trespassing-in-the-cloud/</loc>
		<lastmod>2020-09-17T21:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/chinese-antivirus-firm-was-part-of-apt41-supply-chain-attack/</loc>
		<lastmod>2020-09-17T22:03:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-hacker-mind-podcast-why-are-blue-team-hackers-more-l33t-3/</loc>
		<lastmod>2020-09-17T23:36:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/mitre-releases-2020-cwe-top-25-most-dangerous-software-weaknesses/</loc>
		<lastmod>2020-09-17T22:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/understanding-data-privacy-regulation-in-the-us-and-how-soar-can-help/</loc>
		<lastmod>2020-09-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/understanding-data-privacy-regulation-in-the-us-and-how-soar-can-help-2/</loc>
		<lastmod>2020-09-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/instructor-spotlight-joe-sullivan/</loc>
		<lastmod>2020-09-18T02:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ffem-a-simple-device-to-crowdsource-water-quality-data/</loc>
		<lastmod>2020-09-18T04:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/authenticated-remote-code-execution-in-openmrs/</loc>
		<lastmod>2020-09-18T04:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/think-outside-the-box-when-managing-a-remote-workforce/</loc>
		<lastmod>2020-09-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-good-bad-of-face-mask-recognition-avast/</loc>
		<lastmod>2020-09-18T07:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/patient-dies-after-ransomware-attack-on-dusseldorf-hospital/</loc>
		<lastmod>2020-09-18T08:40:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/announcement-loginradius-delivers-exceptional-authentication-with-the-launch-of-identity-experience-framework/</loc>
		<lastmod>2020-09-18T11:02:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/rethinking-defensive-strategy-at-the-edge-part-3-strategies-for-protective-action/</loc>
		<lastmod>2020-09-18T11:59:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-cjis-evolved-password-policy-requirements/</loc>
		<lastmod>2020-09-18T12:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybersec-ai-connected-podcast-with-avast-cto-avast/</loc>
		<lastmod>2020-09-18T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/protecting-data-security-on-campus-avast/</loc>
		<lastmod>2020-09-18T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/german-hospital-hit-by-ransomware-patient-dies-after-being-redirected/</loc>
		<lastmod>2020-09-18T14:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/duckduckgo-crazy-name-growing-crazy-fast/</loc>
		<lastmod>2020-09-18T15:54:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/ducks-joshua-coleman-unsplash.jpg</image:loc>
			<image:title><![CDATA[ducks--joshua-coleman--unsplash]]></image:title>
			<image:caption><![CDATA[DuckDuckGo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-rod-sotos-jose-hernandez-have-my-keys-been-pwned-api-edition/</loc>
		<lastmod>2020-09-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-joy-of-tech-apple-goes-carbon-neutral/</loc>
		<lastmod>2020-09-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-standardizing-access-can-make-your-business-more-secure-and-efficient/</loc>
		<lastmod>2020-09-18T17:16:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/eliminating-proof-of-concept-friction/</loc>
		<lastmod>2020-09-18T17:25:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-lee-wangenheims-modern-password-cracking-as-a-methodology/</loc>
		<lastmod>2020-09-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/sonrai-wins-cloud-computing-magazines-cloud-security-excellence-award/</loc>
		<lastmod>2020-09-18T18:08:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/u-s-requires-servers-to-ban-tiktok-wechat-traffic/</loc>
		<lastmod>2020-09-18T18:11:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/TikTok.png</image:loc>
			<image:title><![CDATA[TikTok]]></image:title>
			<image:caption><![CDATA[TikTok]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/combating-u-s-election-cyberthreats/</loc>
		<lastmod>2020-09-21T07:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Voting-Security.jpg</image:loc>
			<image:title><![CDATA[Voting-Security]]></image:title>
			<image:caption><![CDATA[elections]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/byod-trends-and-endpoint-security-whats-best-for-your-organization/</loc>
		<lastmod>2020-09-18T21:38:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cmmc-level-3-control-email-sandboxing-si-3-220/</loc>
		<lastmod>2020-09-19T00:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ruth-bader-ginsburg-1933-2020/</loc>
		<lastmod>2020-09-19T02:49:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/improving-data-security-for-saas-apps-5-key-questions-every-ciso-needs-to-ask/</loc>
		<lastmod>2020-09-19T03:36:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/iot-devices-ship-with-security-flaws-because-profit-drive-the-market/</loc>
		<lastmod>2020-09-19T05:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/nist-sp-800-53-gets-one-step-closer-to-becoming-a-standard/</loc>
		<lastmod>2020-09-19T07:21:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-hidden-php-malware-that-reinfects-cleaned-files/</loc>
		<lastmod>2020-09-19T09:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-mazin-ahmeds-hacking-zoom-a-hackers-journey-into-zoom-security/</loc>
		<lastmod>2020-09-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-voting/</loc>
		<lastmod>2020-09-19T17:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-ray-doyles-weaponized-xss-moving-beyond-alert/</loc>
		<lastmod>2020-09-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-hacker-mind-podcast-why-are-blue-team-hackers-more-l33t-2/</loc>
		<lastmod>2020-09-20T10:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/your-ast-guide-for-the-disenchanted-part-2-2/</loc>
		<lastmod>2020-09-20T10:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/your-ast-guide-for-the-disenchanted-part-1-2/</loc>
		<lastmod>2020-09-20T10:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cve-2020-15359-vdalabs-uses-mayhem-to-find-mp3gain-stack-overflow-2/</loc>
		<lastmod>2020-09-20T10:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-hacker-mind-podcast-can-a-machine-think-like-a-hacker-2/</loc>
		<lastmod>2020-09-20T10:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/learning-about-structure-aware-fuzzing-and-finding-json-bugs-to-boot-2/</loc>
		<lastmod>2020-09-20T10:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/the-hacker-mind-podcast-inside-darpas-cyber-grand-challenge-2/</loc>
		<lastmod>2020-09-20T10:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/cve-2020-10029-buffer-overflow-in-gnu-libc-trigonometry-functions-2/</loc>
		<lastmod>2020-09-20T10:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/get-started-with-devsecops-2/</loc>
		<lastmod>2020-09-20T10:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/inside-def-cons-champion-ctf-team-ppp-2/</loc>
		<lastmod>2020-09-20T10:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/the-fuzzing-files-the-anatomy-of-a-heartbleed-2/</loc>
		<lastmod>2020-09-20T10:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/forallsecure-launches-the-hacker-mind-podcast-2/</loc>
		<lastmod>2020-09-20T10:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fuzzcon-tv-tackles-federal-fuzz-testing-2/</loc>
		<lastmod>2020-09-20T10:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/07/fuzzcon-tv-tackles-federal-fuzz-testing-3/</loc>
		<lastmod>2020-09-20T10:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/life-as-a-professional-hacker-2/</loc>
		<lastmod>2020-09-20T10:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/challenging-roi-myths-of-static-application-security-testing-sast/</loc>
		<lastmod>2020-09-20T10:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-fuzzing-is-your-friend-for-devsecops-2/</loc>
		<lastmod>2020-09-20T10:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/why-forallsecure-is-a-2020-rsa-innovation-sandbox-finalist-2/</loc>
		<lastmod>2020-09-20T10:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/top-3-technical-barriers-to-fuzzing-2/</loc>
		<lastmod>2020-09-20T10:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/uncovering-memory-defects-in-cereal-cve-2020-11104-cve-2020-11105-2/</loc>
		<lastmod>2020-09-20T10:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/uncovering-vulnerabilities-in-cryptographic-libraries-mayhem-matrixssl-and-wolfssl-2/</loc>
		<lastmod>2020-09-20T11:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/game-theory-why-system-security-is-like-poker-not-chess-2/</loc>
		<lastmod>2020-09-20T11:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/mayhem-moves-to-production-with-the-department-of-defense-2/</loc>
		<lastmod>2020-09-20T11:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/demystifying-a-docker-image-2/</loc>
		<lastmod>2020-09-20T11:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/decipher-security-podcast-with-forallsecure-ceo-david-brumley-2/</loc>
		<lastmod>2020-09-20T11:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/top-takeaways-from-the-knowing-the-unfuzzed-and-finding-bugs-with-coverage-analysis-webinar-2/</loc>
		<lastmod>2020-09-20T11:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/uncovering-openwrt-remote-code-execution-cve-2020-7982-2/</loc>
		<lastmod>2020-09-20T11:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/forallsecures-response-to-covid-19-2/</loc>
		<lastmod>2020-09-20T11:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-allie-mellens-trust-but-verify-maintaining-democracy/</loc>
		<lastmod>2020-09-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/robert-m-lees-jeff-haas-little-bobby-comics-week-295/</loc>
		<lastmod>2020-09-20T17:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-alvaro-ruedos-total-eagression-evading-isd-for-stealthier-implants/</loc>
		<lastmod>2020-09-20T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/online-learning-still-struggles-especially-with-security/</loc>
		<lastmod>2020-09-21T01:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/startpage-com-the-worlds-most-private-search-engine/</loc>
		<lastmod>2020-09-21T04:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/taking-time-to-build-confidence-in-automated-security/</loc>
		<lastmod>2020-09-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/stop-wasting-your-time-and-money-with-a-checkbox-scm-solution/</loc>
		<lastmod>2020-09-21T07:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/active-listening-the-secret-to-any-successful-negotiation/</loc>
		<lastmod>2020-09-21T11:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/wechat-banned-tiktok-saved/</loc>
		<lastmod>2020-09-21T12:02:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/WechatLogo.png</image:loc>
			<image:title><![CDATA[WechatLogo]]></image:title>
			<image:caption><![CDATA[WeChat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/latest-version-of-codesonar-improves-on-c-analysis-misra-support-introduces-subcommands-for-devsecops-and-more/</loc>
		<lastmod>2020-09-21T13:02:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/uk-national-cyber-security-centre-warns-of-surge-in-ransomware-attacks-targeting-education-institutions/</loc>
		<lastmod>2020-09-21T13:07:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cyberattack-on-ontarios-nurses-college-may-have-compromised-the-personal-information-of-nearly-190000-individuals/</loc>
		<lastmod>2020-09-21T13:17:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/encryption-requirements-driven-by-data-state/</loc>
		<lastmod>2020-09-22T06:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/datastate.jpg</image:loc>
			<image:title><![CDATA[datastate]]></image:title>
			<image:caption><![CDATA[data encryption]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/DataV5-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/give-me-my-stats/</loc>
		<lastmod>2020-09-21T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/applying-enterprise-access-lessons-from-covid-19/</loc>
		<lastmod>2020-09-22T07:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/2FA-Broken-Evolving.jpg</image:loc>
			<image:caption><![CDATA[access]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-jason-haddix-the-bug-hunters-methodology/</loc>
		<lastmod>2020-09-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/moving-above-and-beyond-compliance-part-2-cybersecurity-best-practices/</loc>
		<lastmod>2020-09-21T16:27:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/axio-welcomes-eric-cardwell-as-director-of-cyber-risk-engineering/</loc>
		<lastmod>2020-09-21T16:27:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/is-cybersecurity-on-your-back-to-school-checklist/</loc>
		<lastmod>2020-09-21T16:27:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/top-50-nist-csf-tips-to-address-remote-work-cyber-risk/</loc>
		<lastmod>2020-09-21T16:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-path-to-continuous-cyber-improvement-bonus-case-study/</loc>
		<lastmod>2020-09-21T16:27:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/nist-csf-a-privacy-foundation-for-cybersecurity-programs/</loc>
		<lastmod>2020-09-21T16:27:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/nist-csf-as-a-lens-for-nerc-cip/</loc>
		<lastmod>2020-09-21T16:27:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/moving-above-and-beyond-compliance-part-1-compliance-firefighting/</loc>
		<lastmod>2020-09-21T16:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/using-nist-800-53-to-interpret-nist-csf/</loc>
		<lastmod>2020-09-21T16:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/understanding-nist-cybersecurity-framework-nist-csf-functions/</loc>
		<lastmod>2020-09-21T16:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/forgerock-joins-microsoft-intelligent-security-association/</loc>
		<lastmod>2020-09-21T16:27:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/capture-the-flag-a-walkthrough-of-suncsrs-geisha/</loc>
		<lastmod>2020-09-21T16:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-spot-a-malicious-browser-extension/</loc>
		<lastmod>2020-09-21T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ny-shield-act-security-awareness-and-training-requirements-for-new-york-businesses/</loc>
		<lastmod>2020-09-21T16:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/seczetta-integration-with-cyberark-provides-increased-security-for-third-party-users-with-privileged-access/</loc>
		<lastmod>2020-09-21T16:36:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/infographic-the-cis-top-20-controls-explained/</loc>
		<lastmod>2020-09-21T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/election-hacking-september-update-avast/</loc>
		<lastmod>2020-09-21T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/donation-matching-program-avast/</loc>
		<lastmod>2020-09-21T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/robert-m-lees-jeff-haas-little-bobby-comics-week-120-from-the-archive/</loc>
		<lastmod>2020-09-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/we-heard-you-an-agile-approach-to-managing-network-security-policy/</loc>
		<lastmod>2020-09-21T17:30:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/focus-on-fixing-not-just-finding-vulnerabilities/</loc>
		<lastmod>2020-09-21T17:35:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/teen-hackers-cybercrime-teen-rebellion-aint-what-it-used-to-be/</loc>
		<lastmod>2020-09-21T17:54:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-chloe-messdaghis-the-art-of-balancing-a-burnout-talk/</loc>
		<lastmod>2020-09-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-best-defense-is-good-osint/</loc>
		<lastmod>2020-09-21T18:26:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/can-we-have-detection-as-code/</loc>
		<lastmod>2020-09-21T18:31:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/zerologon-how-bitdefender-protects-customers-from-this-no-credential-post-exploit-technique/</loc>
		<lastmod>2020-09-21T19:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ready-player-one-what-firmware-gaming-cheats-mean-for-enterprise-security/</loc>
		<lastmod>2020-09-21T19:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/takeaways-from-zerologon-the-latest-domain-controller-attack/</loc>
		<lastmod>2020-09-21T19:34:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ddlc-detection-development-life-cycle/</loc>
		<lastmod>2020-09-21T19:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/forgerock-integrations-with-microsoft-will-strengthen-compliance-and-reduce-risk/</loc>
		<lastmod>2020-09-22T01:18:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/newsbites-drilldown-for-the-week-ending-18-september-2020/</loc>
		<lastmod>2020-09-22T02:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-cisos-can-foster-effective-comms-and-build-a-cybersecurity-program/</loc>
		<lastmod>2020-09-22T03:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/employee-burnout-is-putting-your-organizations-security-at-risk/</loc>
		<lastmod>2020-09-22T03:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/latest-sec-alert-highlights-need-for-a-new-approach-to-credential-stuffing/</loc>
		<lastmod>2020-09-22T03:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/beyond-ssh-keys-authentication-using-ssh-certificates/</loc>
		<lastmod>2020-09-22T06:47:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/vote-by-mail-election-security-falls-in-the-hands-of-local-government/</loc>
		<lastmod>2020-09-22T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-scale-your-appsec-with-security-champions-program/</loc>
		<lastmod>2020-09-22T07:06:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ermetic-named-2021-tag-cyber-distinguished-vendor/</loc>
		<lastmod>2020-09-22T09:04:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/member-of-the-dark-overlord-hacking-grouop-pleads-guilty-gets-five-years-behind-bars/</loc>
		<lastmod>2020-09-22T09:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/automating-and-orchestrating-large-enterprise-networks-with-appviewx-and-ansible/</loc>
		<lastmod>2020-09-22T10:23:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/scam-apps-spreading-via-tiktok-avast/</loc>
		<lastmod>2020-09-22T11:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-gap-in-your-ccpa-gdpr-compliance-strategy-is-running-on-your-website/</loc>
		<lastmod>2020-09-22T11:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ransomware-attack-foiled-but-details-of-540000-sports-referees-still-stolen-by-hackers/</loc>
		<lastmod>2020-09-22T11:47:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybercrime-is-everywhere-keeping-track-of-todays-trends-2/</loc>
		<lastmod>2020-09-22T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybercrime-is-everywhere-keeping-track-of-todays-trends/</loc>
		<lastmod>2020-09-22T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/got-xdr-what-it-is-and-why-this-game-changing-technology-is-needed-right-now/</loc>
		<lastmod>2020-09-22T12:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-xdr-means-for-the-modern-soc/</loc>
		<lastmod>2020-09-22T12:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/barracuda-networks-centralizes-security-across-azure-sd-wan/</loc>
		<lastmod>2020-09-22T12:48:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Netography-Leverages-Software.jpg</image:loc>
			<image:title><![CDATA[Netography-Leverages-Software]]></image:title>
			<image:caption><![CDATA[f5]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/managedmethods-receives-2020-cloud-computing-security-excellence-award/</loc>
		<lastmod>2020-09-22T12:57:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-well-are-enterprises-handling-web-application-security/</loc>
		<lastmod>2020-09-22T12:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-protect-cellular-iot-devices-from-cyber-threats/</loc>
		<lastmod>2020-09-22T12:59:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xdr-for-managed-security-service-providers-nows-the-time-to-add-xdr-to-the-cybersecurity-arsenal/</loc>
		<lastmod>2020-09-22T13:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cequence-security-named-a-2021-tag-cyber-distinguished-vendor/</loc>
		<lastmod>2020-09-22T13:01:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/we-heard-you-an-agile-approach-to-managing-network-security-policy-2/</loc>
		<lastmod>2020-09-22T13:15:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/pci-pal-announces-partnership-with-calabrio-and-joins-the-calabrio-marketplace/</loc>
		<lastmod>2020-09-22T13:34:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/dunkin-donuts-will-pay-over-half-a-million-dollar-fine-after-data-breach-lawsuit/</loc>
		<lastmod>2020-09-22T13:41:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-to-expect-when-youre-expecting-to-be-hacked/</loc>
		<lastmod>2020-09-23T06:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/hacked.jpg</image:loc>
			<image:title><![CDATA[hacked]]></image:title>
			<image:caption><![CDATA[hacked]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ddos-attacks-impact-the-election-process/</loc>
		<lastmod>2020-09-22T13:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/healthcare-institutions-fall-short-of-national-cybersecurity-standards/</loc>
		<lastmod>2020-09-22T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/does-your-business-have-a-well-known-url-for-changing-passwords-it-should/</loc>
		<lastmod>2020-09-22T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/your-network-through-the-eyes-of-a-hacker/</loc>
		<lastmod>2020-09-22T14:01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-configure-android-virtual-for-mobile-pentest/</loc>
		<lastmod>2020-09-22T14:07:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/apis-securing-the-stitching-connecting-applications/</loc>
		<lastmod>2020-09-23T07:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/quilt.jpg</image:loc>
			<image:title><![CDATA[quilt]]></image:title>
			<image:caption><![CDATA[APIs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/using-stats-in-splunk-part-1-basic-anomaly-detection/</loc>
		<lastmod>2020-09-22T14:45:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/top-barriers-to-it-security-for-smbs-2/</loc>
		<lastmod>2020-09-22T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/top-barriers-to-it-security-for-smbs/</loc>
		<lastmod>2020-09-22T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/research-reveals-that-75-of-appsec-practitioners-see-a-growing-cultural-divide-between-appsec-and-developers-3/</loc>
		<lastmod>2020-09-22T15:19:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/your-ast-guide-for-the-disenchanted-part-3-2/</loc>
		<lastmod>2020-09-22T16:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-guillermo-buendias-swift-spid-spei-basic-hacking-techniques/</loc>
		<lastmod>2020-09-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/breach-prevention-starts-with-knowing-your-immediate-adversary/</loc>
		<lastmod>2020-09-22T16:08:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/feds-yell-patch-now-over-windows-ad-zerologon-vuln/</loc>
		<lastmod>2020-09-22T16:08:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/yell-ryan-mcguire-pixabay.jpg</image:loc>
			<image:title><![CDATA[yell--ryan-mcguire--pixabay]]></image:title>
			<image:caption><![CDATA[zerologon]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/smart-dns-for-the-new-network-edge/</loc>
		<lastmod>2020-09-22T16:12:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/dont-let-zerologon-be-the-master-of-your-domain/</loc>
		<lastmod>2020-09-22T16:22:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/phishing-page-targets-atts-employee-multi-factor-authentication/</loc>
		<lastmod>2020-09-22T16:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-volcano-dinosaur/</loc>
		<lastmod>2020-09-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/kognos-emerges-from-stealth-launches-cybersecurity-industrys-first-autonomous-xdr-platform-to-track-attacker-campaigns-with-security-aware-ai/</loc>
		<lastmod>2020-09-22T17:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/on-executive-order-12333/</loc>
		<lastmod>2020-09-28T11:21:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/research-reveals-that-75-of-appsec-practitioners-see-a-growing-cultural-divide-between-appsec-and-developers-2/</loc>
		<lastmod>2020-09-22T17:21:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/defining-and-building-your-in-house-compliance-committee/</loc>
		<lastmod>2020-09-22T17:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-jonathan-helmus-student-roadmap-to-becoming-a-pentester/</loc>
		<lastmod>2020-09-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/scammers-impersonating-texas-govt-departments-to-send-fake-rfqs/</loc>
		<lastmod>2020-09-22T18:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/multi-factor-authentication-for-okta-vpn/</loc>
		<lastmod>2020-09-22T20:46:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-stop-rampant-poor-password-practices/</loc>
		<lastmod>2020-09-22T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/connectwise-launches-bug-bounty-program-to-help-detect-security-vulnerabilities/</loc>
		<lastmod>2020-09-23T13:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/phishing-attacks-are-scarily-easy-to-build/</loc>
		<lastmod>2020-09-22T21:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ten-years-of-zero-trust-from-least-privilege-access-to-microsegmentation-and-beyond/</loc>
		<lastmod>2020-09-22T21:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/perimeterx-is-named-a-distinguished-vendor-by-tag-cyber/</loc>
		<lastmod>2020-09-22T21:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-in-the-world-can-cisos-unite-security-and-devops/</loc>
		<lastmod>2020-09-22T21:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/your-ast-guide-for-the-disenchanted-part-3/</loc>
		<lastmod>2020-09-22T22:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/webinar-the-rising-role-of-msps-in-the-cloud-security-market/</loc>
		<lastmod>2020-09-22T22:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/thinking-of-modernizing-your-ca-siteminder-deployment-now-may-be-the-perfect-time/</loc>
		<lastmod>2020-09-23T02:37:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-is-risk-acceptance-and-how-does-it-work/</loc>
		<lastmod>2020-09-23T02:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/seven-in-ten-cisos-believe-cyberwarfare-is-an-imminent-threat-to-their-organisations/</loc>
		<lastmod>2020-09-23T02:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/bsimm11-tracks-top-trends-in-market-activity/</loc>
		<lastmod>2020-09-23T06:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/school-district-secures-distance-learning-for-18000-students-with-fortiedr/</loc>
		<lastmod>2020-09-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/iot-security-standards-collaboration/</loc>
		<lastmod>2020-09-23T07:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/in-fond-memory-of-stefan-kreisselmeier/</loc>
		<lastmod>2020-09-23T07:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/networkminer-2-6-released-2/</loc>
		<lastmod>2020-09-23T09:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/eclypsium-named-2021-tag-cyber-distinguished-vendor/</loc>
		<lastmod>2020-09-23T08:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/being-cyber-resilient-is-critical-for-the-maritime-industry/</loc>
		<lastmod>2020-09-23T08:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/networkminer-2-6-released/</loc>
		<lastmod>2020-09-23T09:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/free-resources-for-national-cybersecurity-awareness-month/</loc>
		<lastmod>2020-09-23T09:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/top-5-ways-ransomware-is-delivered-and-deployed/</loc>
		<lastmod>2020-09-23T09:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/security-theatrics-or-strategy-optimizing-security-budget-efficiency-and-effectiveness/</loc>
		<lastmod>2020-09-23T09:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/exploiting-leading-antivirus-software-rack911-labs-details-vulnerabilities/</loc>
		<lastmod>2020-09-23T09:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/key-takeaways-from-gartners-2020-market-guide-for-soar-solutions/</loc>
		<lastmod>2020-09-23T10:04:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/key-takeaways-from-gartners-2020-market-guide-for-soar-solutions-2/</loc>
		<lastmod>2020-09-23T10:04:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/eyewear-giant-luxottica-confirms-ransomware-attack/</loc>
		<lastmod>2020-09-23T10:06:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/europol-the-hidden-internet-is-no-longer-hidden-and-your-anonymous-activity-is-not-anonymous/</loc>
		<lastmod>2020-09-23T10:59:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/rogue-shopify-staff-accessed-customer-records-says-ecommerce-platform-investigating-security-breach/</loc>
		<lastmod>2020-09-23T11:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ip-camera-app-security-test-avast/</loc>
		<lastmod>2020-09-23T11:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/shopify-discloses-security-incident-involving-some-merchants-data/</loc>
		<lastmod>2020-09-23T11:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/are-you-listening-to-your-logs-part-4-open-ports/</loc>
		<lastmod>2020-09-23T12:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/sustainable-solutions-for-securing-payments-in-a-transforming-world/</loc>
		<lastmod>2020-09-23T12:23:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/this-election-year-the-health-of-the-union-depends-on-how-we-safeguard-our-information/</loc>
		<lastmod>2020-09-23T12:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/bad-actors-could-exploit-us-mail-in-voting-system-fbi-and-cisa-warn/</loc>
		<lastmod>2020-09-23T12:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-future-of-multi-cloud-security-a-look-ahead-at-intelligent-cloud-security-posture-management-solutions/</loc>
		<lastmod>2020-09-23T13:27:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-is-the-hipaa-security-rule/</loc>
		<lastmod>2020-09-23T14:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-we-used-the-latest-windows10-technology-to-build-an-isolated-workspace-as-a-service/</loc>
		<lastmod>2020-09-23T15:15:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/remarkable-university-study-about-real-world-cybersecurity-training/</loc>
		<lastmod>2020-09-23T15:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-kat-fitzgeralds-securing-and-pentesting-the-great-spaghetti-monster-k8s/</loc>
		<lastmod>2020-09-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/chronicle-detect-is-here/</loc>
		<lastmod>2020-09-23T16:02:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/key-takeaways-from-the-2020-gartner-market-guide-for-soar/</loc>
		<lastmod>2020-09-23T16:15:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/divvycloud-energy-utilities-industry-guide/</loc>
		<lastmod>2020-09-23T16:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-importance-of-listening/</loc>
		<lastmod>2020-09-23T16:24:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/data-recovery-averting-disaster-in-the-new-normal/</loc>
		<lastmod>2020-09-24T07:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto2235748.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2235748]]></image:title>
			<image:caption><![CDATA[data recovery]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-fincen-files-leakage/</loc>
		<lastmod>2020-09-24T06:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/bank.jpg</image:loc>
			<image:title><![CDATA[bank]]></image:title>
			<image:caption><![CDATA[FinCEN]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/daniel-storis-tcp-buddies/</loc>
		<lastmod>2020-09-23T17:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/smart-contract-security/</loc>
		<lastmod>2020-09-23T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/attacks-on-blockchain/</loc>
		<lastmod>2020-09-23T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/8-of-the-worlds-biggest-insider-threat-security-incidents/</loc>
		<lastmod>2020-09-23T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/top-7-cybersecurity-books-for-ethical-hackers-in-2020/</loc>
		<lastmod>2020-09-23T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/linux-vulnerabilities-how-unpatched-servers-lead-to-persistent-backdoors/</loc>
		<lastmod>2020-09-23T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-best-way-to-manage-ssh-keys-keyfactor/</loc>
		<lastmod>2020-09-23T17:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-mert-coskuners-and-caglar-cakicis-redteamops-managing-red-team-infrastructure/</loc>
		<lastmod>2020-09-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/on-demand-webinar-election-security-defending-our-democracy-against-well-resourced-adversaries-video/</loc>
		<lastmod>2020-09-23T18:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/most-smbs-prepare-for-an-attack-in-the-next-six-months-survey-shows/</loc>
		<lastmod>2020-09-23T18:57:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ibm-launches-security-assessment-service-focused-on-business-risk/</loc>
		<lastmod>2020-09-24T07:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Doing-Automation-Right.jpg</image:loc>
			<image:title><![CDATA[data]]></image:title>
			<image:caption><![CDATA[business risk]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/FAIR-model.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/malicious-one-liner-using-hastebin/</loc>
		<lastmod>2020-09-23T19:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-has-the-pandemic-taught-us-about-business-resiliency/</loc>
		<lastmod>2020-09-23T20:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/nexus-on-the-ascent/</loc>
		<lastmod>2020-09-23T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/my-take-how-credential-stuffing-is-being-deployed-to-influence-elections-steal-covid-19-relief/</loc>
		<lastmod>2020-09-23T22:49:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/govt-services-firm-tyler-technologies-hit-in-apparent-ransomware-attack/</loc>
		<lastmod>2020-09-23T23:06:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/iot-security-fundamentals-hardware-software-and-radio-security/</loc>
		<lastmod>2020-09-23T23:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/using-base64-for-malware-obfuscation/</loc>
		<lastmod>2020-09-23T23:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-osi-model-and-tcp-ip-model/</loc>
		<lastmod>2020-09-23T23:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/encryption-vs-encoding/</loc>
		<lastmod>2020-09-23T23:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/endpoint-hardening-best-practices/</loc>
		<lastmod>2020-09-23T23:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/deepfake/</loc>
		<lastmod>2020-09-23T23:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/blockchain-beyond-the-basics/</loc>
		<lastmod>2020-09-23T23:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/mobile-device-management/</loc>
		<lastmod>2020-09-23T23:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/analyst-report-2021-tag-cyber-security-annual/</loc>
		<lastmod>2020-09-24T00:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/guest-blog-the-need-to-close-the-cultural-divide-between-application-security-and-developers/</loc>
		<lastmod>2020-09-24T02:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/smishing-attacks-masquerading-as-usps-and-fedex/</loc>
		<lastmod>2020-09-24T04:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ciphercloud-chronicles-5-insights-investigate/</loc>
		<lastmod>2020-09-24T04:57:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/helping-inspire-the-next-generation-of-cybersecurity-professionals/</loc>
		<lastmod>2020-09-24T06:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/joint-cypres-report-on-incident-response-released-by-ferc/</loc>
		<lastmod>2020-09-24T06:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ensure-best-user-experience-with-self-healing-sd-wan/</loc>
		<lastmod>2020-09-24T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-top-5-needs-of-dast-testing/</loc>
		<lastmod>2020-09-24T07:30:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/3-reasons-why-a-rule-based-cybersecurity-platform-will-always-fail/</loc>
		<lastmod>2020-09-24T07:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/understanding-student-self-harm-and-suicide-for-k-12-it-admins/</loc>
		<lastmod>2020-09-24T11:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-importance-of-validating-fixes-lessons-from-google/</loc>
		<lastmod>2020-09-24T11:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybersecai-connected-alex-halderman-on-election-hacking-avast/</loc>
		<lastmod>2020-09-24T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/edpb-wants-schrems-ii-compliance-now-but-clearer-guidance-is-months-away/</loc>
		<lastmod>2020-09-24T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-use-wordpress-user-roles-for-improved-wordpress-security/</loc>
		<lastmod>2020-09-24T12:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/government-services-firm-tyler-technologies-hit-by-ransomware/</loc>
		<lastmod>2020-09-24T12:03:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/crowdstrike-to-acquire-preempt-security-to-offer-customers-enhanced-zero-trust-security-capabilities/</loc>
		<lastmod>2020-09-24T12:50:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/prehistoric-security-controls-deconstructing-the-jurassic-park-insider-threat-incident/</loc>
		<lastmod>2020-09-24T12:59:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/accelerate-building-serverless-applications-in-aws-using-thundra/</loc>
		<lastmod>2020-09-24T14:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/computer-programmer-pleads-guilty-to-lying-about-silk-road-involvement/</loc>
		<lastmod>2020-09-24T14:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/instagram-photo-flaw-could-have-helped-malicious-hackers-spy-via-users-cameras-and-microphones/</loc>
		<lastmod>2020-09-24T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/royal-ripper-multi-stage-phishing-attack-adapts-to-victim-input/</loc>
		<lastmod>2020-09-24T15:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-to-expect-when-youre-expecting-to-be-hacked-2/</loc>
		<lastmod>2020-09-24T15:23:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/watch-here-using-analytics-to-measure-appsec-roi/</loc>
		<lastmod>2020-09-24T15:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-nicolas-mattioccos-red-flavour-of-soc-automation/</loc>
		<lastmod>2020-09-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/serverless-at-the-edge-enabling-magical-unicorns/</loc>
		<lastmod>2020-09-24T16:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/thank-you-for-registering-the-rising-role-of-msps-in-the-cloud-security-market-webinar/</loc>
		<lastmod>2020-09-24T16:09:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/akamai-identified-as-a-leader-among-zero-trust-providers-by-independent-research-firm-2/</loc>
		<lastmod>2020-09-24T16:33:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/rangeforce-launches-free-community-edition-to-level-up-skills-of-cybersecurity-and-it-pros/</loc>
		<lastmod>2020-09-24T16:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-joy-of-tech-apple-watchs-blood-oxygen-monitor/</loc>
		<lastmod>2020-09-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/microsoft-attackers-exploiting-zerologon-windows-flaw/</loc>
		<lastmod>2020-09-24T17:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-high-cost-of-reporting-a-non-reportable-data-breach/</loc>
		<lastmod>2020-09-25T06:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Micron-Intellectual-Property.jpg</image:loc>
			<image:title><![CDATA[cyberlaw]]></image:title>
			<image:caption><![CDATA[Accenture]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/user-experience-el-santo-grial-del-mundo-digital/</loc>
		<lastmod>2020-09-24T17:07:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/who-owns-open-source-security/</loc>
		<lastmod>2020-09-25T07:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto44559434.jpg</image:loc>
			<image:title><![CDATA[security challenges]]></image:title>
			<image:caption><![CDATA[open source security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/open-source-licenses-no-license-no-problem-or-not/</loc>
		<lastmod>2020-09-24T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/introducing-smart-life-for-5g-avast/</loc>
		<lastmod>2020-09-24T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-red-team-village-chris-kubeckas-pwn-the-world/</loc>
		<lastmod>2020-09-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/creating-a-new-cybersecurity-norm/</loc>
		<lastmod>2020-09-24T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/nist-sp-800-53-revision-5-released-next-generation-security-and-privacy-controls/</loc>
		<lastmod>2020-09-24T19:09:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/youre-going-to-want-to-patch-cve-2020-1472-zerologon-asap/</loc>
		<lastmod>2020-09-24T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ipv4-and-ipv6-overview/</loc>
		<lastmod>2020-09-24T21:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-achieve-cmmc-levels-1-through-5/</loc>
		<lastmod>2020-09-24T21:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-verify-and-respond-to-vulnerability-reports-from-security-researchers/</loc>
		<lastmod>2020-09-24T21:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/zero-day-sophos-xg-firewall-vulnerability-an-exploit-guide-for-pentesters/</loc>
		<lastmod>2020-09-24T21:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/basics-of-secure-coding/</loc>
		<lastmod>2020-09-24T21:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/new-on-sonatype-learn-outcome-based-training-new-courses-and-a-new-look/</loc>
		<lastmod>2020-09-24T22:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/apps-on-google-play-tainted-with-cerberus-banker-malware/</loc>
		<lastmod>2020-09-24T22:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cloud-workload-security-needs-a-proactive-approach-to-processes-and-technology/</loc>
		<lastmod>2020-09-25T03:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/threat-intelligence-is-the-lifeblood-of-active-security/</loc>
		<lastmod>2020-09-25T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/pci-pal-receives-g-cloud-12-certification/</loc>
		<lastmod>2020-09-25T09:20:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-social-dilemma-review-avast/</loc>
		<lastmod>2020-09-25T10:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/facebook-sued-over-instagram-spying-avast/</loc>
		<lastmod>2020-09-25T10:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/enabling-ci-cd-for-network-infrastructure-services-through-automation/</loc>
		<lastmod>2020-09-25T11:32:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-a-broken-api-led-to-teslas-entire-network-going-down-locked-out-customers-from-their-cars-and-disrupted-company-wide-operations/</loc>
		<lastmod>2020-09-25T11:35:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/town-sports-international-data-breach-exposed-personal-information-of-600000-members/</loc>
		<lastmod>2020-09-25T12:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/who-is-tech-investor-john-bernard/</loc>
		<lastmod>2020-09-25T13:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ransomware-officially-kills-a-person/</loc>
		<lastmod>2020-09-25T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/five-worthy-reads-the-evolving-employee-experience/</loc>
		<lastmod>2020-09-25T14:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/questions-to-ask-when-shopping-for-a-remote-access-solution/</loc>
		<lastmod>2020-09-25T14:25:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/advanced-practical-social-engineering-a-practical-course-in-a-virtual-world/</loc>
		<lastmod>2020-09-25T15:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/say-goodbye-to-2-year-certificates-and-hello-to-multi-year-ssl-plans/</loc>
		<lastmod>2020-09-25T15:44:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-meet-a-mentor-kickoff-meetup-20200910/</loc>
		<lastmod>2020-09-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/csa-report-surfaces-cloud-attack-patterns/</loc>
		<lastmod>2020-09-25T16:09:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Data-Cloud-Monitoring.jpg</image:loc>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/isps-can-and-should-protect-users-against-ddos-attacks/</loc>
		<lastmod>2020-09-25T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/iot-security-dont-sacrifice-data-for-usability/</loc>
		<lastmod>2020-09-28T07:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto25324624.jpg</image:loc>
			<image:title><![CDATA[canstockphoto25324624]]></image:title>
			<image:caption><![CDATA[IoT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/mount-locker-ransomware-demanding-ransom-payments-in-the-millions/</loc>
		<lastmod>2020-09-25T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybersecurity-maturity-model-certification-cmmc-in-depth/</loc>
		<lastmod>2020-09-25T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-message-boards/</loc>
		<lastmod>2020-09-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-do-you-protect-sensitive-data-if-you-cant-even-locate-it/</loc>
		<lastmod>2020-09-25T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/simple-rules-for-smart-iam-solutions-2/</loc>
		<lastmod>2020-09-25T17:36:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/fighting-smoke-with-open-source/</loc>
		<lastmod>2020-09-25T17:41:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-will-cmmc-compliance-cost-my-business/</loc>
		<lastmod>2020-09-25T17:47:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/magento-credit-card-stealing-malware-gstaticapi/</loc>
		<lastmod>2020-09-25T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-j-francisco-bolivars-and-jose-miguel-gomez-caseros-o365-squatting/</loc>
		<lastmod>2020-09-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/covid-19-leads-to-greater-consumer-awareness-of-data-security/</loc>
		<lastmod>2020-09-25T18:53:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Web-Mobile-DevSecOps.jpg</image:loc>
			<image:caption><![CDATA[data security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/under-pressure-managing-the-competing-demands-of-development-velocity-and-application-security/</loc>
		<lastmod>2020-09-25T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/eclypsium-awarded-emerging-technology-company-of-the-year-by-technology-association-of-oregon/</loc>
		<lastmod>2020-09-25T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybersecurity-risk-management-process/</loc>
		<lastmod>2020-09-25T21:39:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/top-5-penetration-testing-certifications-for-security-professionals/</loc>
		<lastmod>2020-09-25T22:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/dod-8570-iat-certification-and-requirements/</loc>
		<lastmod>2020-09-25T22:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/popular-tools-for-brute-force-attacks-updated-for-2019/</loc>
		<lastmod>2020-09-25T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/10-most-popular-password-cracking-tools-updated-2020/</loc>
		<lastmod>2020-09-25T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/top-10-security-awareness-training-topics-for-your-employees/</loc>
		<lastmod>2020-09-25T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/understanding-dos-attacks-and-the-best-free-dos-attacking-tools-updated-for-2020/</loc>
		<lastmod>2020-09-25T22:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/8-best-wordpress-security-plugins/</loc>
		<lastmod>2020-09-25T22:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/posts-from-beyond-the-grave-how-to-impress-annoy-an-analyst-during-a-briefing/</loc>
		<lastmod>2020-09-25T23:27:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/weekly-news-roundup-september-21-25-2020/</loc>
		<lastmod>2020-09-25T23:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/review-the-social-dilemma/</loc>
		<lastmod>2020-09-26T10:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-aaron-sotos-intro-to-zeek-opensoc-edition/</loc>
		<lastmod>2020-09-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-joy-of-tech-2742/</loc>
		<lastmod>2020-09-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-allen-baranovs-how-to-stop-a-virus-with-a-spreadsheet/</loc>
		<lastmod>2020-09-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-bashar-shammas-moloch/</loc>
		<lastmod>2020-09-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-parity-conservation/</loc>
		<lastmod>2020-09-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-adrian-bradleys-thinkst-canary/</loc>
		<lastmod>2020-09-27T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/death-by-ransomware-strava-flyby-ios-14-privacy-improvements/</loc>
		<lastmod>2020-09-28T04:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/consumer-identity-management-for-the-cmo-ciso-and-cio/</loc>
		<lastmod>2020-09-28T05:12:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/como-madurar-un-programa-de-gestion-de-vulnerabilidades/</loc>
		<lastmod>2020-09-28T05:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/understanding-cybersecurity-supply-chain-risk-management-c-scrm/</loc>
		<lastmod>2020-09-28T05:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/integrating-managed-detection-and-response-into-service-portfolios/</loc>
		<lastmod>2020-09-28T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/acunetix-exhibiting-at-infosecurity-online-2020/</loc>
		<lastmod>2020-09-28T07:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/linux-systems-are-hackers-next-targets/</loc>
		<lastmod>2020-09-28T08:17:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybersecurity-lessons-from-the-pandemic-perception-of-risk/</loc>
		<lastmod>2020-09-28T10:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tyler-technologies-clients-urged-to-reset-remote-network-passwords-after-ransomware-attack/</loc>
		<lastmod>2020-09-28T10:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/when-not-to-accept-cookies-avast/</loc>
		<lastmod>2020-09-28T11:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tales-from-the-front-lines-whitelist-and-forget-a-cautionary-tale/</loc>
		<lastmod>2020-09-28T12:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cmaf-this-is-the-way/</loc>
		<lastmod>2020-09-28T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/hackers-steal-150-million-from-asian-cryptocurrency-exchange/</loc>
		<lastmod>2020-09-28T13:05:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/phishers-target-businesses-with-fake-gdpr-compliance-requests/</loc>
		<lastmod>2020-09-28T13:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/school-from-home-changes-residential-internet-safety-and-security-dynamics/</loc>
		<lastmod>2020-09-28T15:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/a-bouquet-of-breaches/</loc>
		<lastmod>2020-09-28T15:36:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/could-estonia-be-the-model-for-secure-online-voting/</loc>
		<lastmod>2020-09-28T15:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-ch33r10s-indicators-of-emulation/</loc>
		<lastmod>2020-09-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/robert-m-lees-jeff-haas-little-bobby-comics-week-296/</loc>
		<lastmod>2020-09-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/microsoft-teams-and-opmanager-the-perfect-team-for-your-remote-it-management-game/</loc>
		<lastmod>2020-09-28T17:54:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-connor-morleys-outerhaven-the-uefi-memory-space-waiting-to-be-misused/</loc>
		<lastmod>2020-09-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/apwg-ssl-certificates-no-longer-indication-of-safe-browsing/</loc>
		<lastmod>2020-09-28T18:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/pandemic-leads-to-increase-in-human-like-attacks/</loc>
		<lastmod>2020-09-29T06:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto4790822.jpg</image:loc>
			<image:title><![CDATA[artificial intelligence]]></image:title>
			<image:caption><![CDATA[human]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/backdoor-obfuscation-tempnam-url-encoding/</loc>
		<lastmod>2020-09-28T18:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-calm-before-the-ccpa-storm-are-you-prepared/</loc>
		<lastmod>2020-09-29T07:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/storm.jpg</image:loc>
			<image:title><![CDATA[storm]]></image:title>
			<image:caption><![CDATA[CCPA]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/swipe-right-on-security-secure-code-warrior-empowers-early-stage-developers-with-new-secure-code-bootcamp-mobile-app/</loc>
		<lastmod>2020-10-01T13:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/security-lessons-learned-in-higher-education/</loc>
		<lastmod>2020-09-28T19:10:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/negotiating-with-ransomware-gangs/</loc>
		<lastmod>2020-09-30T11:19:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/prune-the-sprawl-get-better-appsec/</loc>
		<lastmod>2020-09-28T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/important-sqlmap-commands-2/</loc>
		<lastmod>2020-09-28T20:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/pdf-file-format-basic-structure-updated-2020/</loc>
		<lastmod>2020-09-28T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tech-companies-privacy-and-vulnerabilities-how-much-transparency-is-enough/</loc>
		<lastmod>2020-09-28T20:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/hacking-microsoft-teams-vulnerabilities-a-step-by-step-guide/</loc>
		<lastmod>2020-09-28T20:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/myth-2-compliance-is-only-urgent-when-theres-an-audit/</loc>
		<lastmod>2020-09-28T21:40:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/tyler-technologies-reveals-ransomware-affected-some-internal-systems/</loc>
		<lastmod>2020-09-28T22:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/myth-busting-at-identity-live-cloud-edition/</loc>
		<lastmod>2020-09-28T22:29:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/intertrust-releases-2020-security-report-on-global-mhealth-app-threats/</loc>
		<lastmod>2020-09-29T13:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/defeating-the-rise-of-cyber-threats-with-latest-tpm-2-0-specification/</loc>
		<lastmod>2020-09-29T01:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/targeted-attacks-part-2-pretexting-and-attack-development/</loc>
		<lastmod>2020-09-29T04:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cyrc-vulnerability-advisory-authentication-bypass-vulnerabilities-in-multiple-wireless-router-chipsets-cve-2019-18989-cve-2019-18990-and-cve-2019-18991/</loc>
		<lastmod>2020-09-29T05:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/fortinet-named-a-leader-in-gartner-2020-magic-quadrant-for-wan-edge-infrastructure/</loc>
		<lastmod>2020-09-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/preventing-shadow-it-from-blindsiding-your-zero-trust-plan/</loc>
		<lastmod>2020-09-29T07:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/alleged-ransomware-attack-disrupts-medical-care-at-uhs-hospitals-across-the-us/</loc>
		<lastmod>2020-09-29T08:30:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/want-to-improve-bulk-electric-system-cybersecurity-focus-on-specific-nist-controls/</loc>
		<lastmod>2020-09-29T08:34:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/powerful-ddos-attack-hits-hungarian-banks-and-telecoms-service/</loc>
		<lastmod>2020-09-29T10:31:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-recon-vulnerability-and-related-ttps/</loc>
		<lastmod>2020-09-29T10:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/forgerock-consumer-survey-the-new-normal/</loc>
		<lastmod>2020-09-29T11:45:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/big-c-or-little-c-the-c-in-grc-quantifying-risk-compliance-2/</loc>
		<lastmod>2020-09-29T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/big-c-or-little-c-the-c-in-grc-quantifying-risk-compliance/</loc>
		<lastmod>2020-09-29T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/system-extensions-are-replacing-macos-kernel-extensions-how-will-this-affect-you/</loc>
		<lastmod>2020-09-29T12:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/improving-maritime-cybersecurity-and-operational-resiliency/</loc>
		<lastmod>2020-09-29T12:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/improving-maritime-cybersecurity-and-operational-resiliency-2/</loc>
		<lastmod>2020-09-29T12:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/5g-network-architecture-benefits-avast/</loc>
		<lastmod>2020-09-29T12:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/bitcoin-exchange-owner-convicted-for-role-in-web-auction-fraud-scheme/</loc>
		<lastmod>2020-09-29T12:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/why-desktop-mfa-is-essential-to-your-endpoint-security-2/</loc>
		<lastmod>2020-09-29T13:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-hacker-mind-podcast-hacking-with-light-and-sound-2/</loc>
		<lastmod>2020-09-29T14:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/auto-trader-implements-pci-pal-for-secure-and-compliant-payments/</loc>
		<lastmod>2020-09-29T14:11:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/press-release-anitian-launches-securecloud-on-aws-a-cloud-security-service-pre-engineered-to-deploy-and-protect-your-mission-critical-saas-applications/</loc>
		<lastmod>2020-09-29T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/winning-the-trust-of-customers-and-partners-with-soc-2-compliance/</loc>
		<lastmod>2020-09-29T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/axis-security-raises-32-million-to-accelerate-growth-meet-enterprise-demand-for-work-from-anywhere-solutions/</loc>
		<lastmod>2020-09-29T14:36:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/kenna-security-delivers-risk-based-vulnerability-management-for-new-vmware-carbon-black-cloud-workload-solution/</loc>
		<lastmod>2020-09-29T14:37:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ransomware-cripples-uhs-hospitals-across-the-nation/</loc>
		<lastmod>2020-09-29T14:48:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/doctor-impulsq-unsplash.jpg</image:loc>
			<image:title><![CDATA[doctor--impulsq--unsplash]]></image:title>
			<image:caption><![CDATA[Universal Health Services]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-are-wordpress-admin-notices-and-how-do-they-work/</loc>
		<lastmod>2020-09-29T14:52:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-comforts-of-graphql-with-aws-appsync/</loc>
		<lastmod>2020-09-29T14:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/advanced-active-directory-attacks-simulating-domain-controller-behavior/</loc>
		<lastmod>2020-09-29T15:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/zscaler-extends-security-services-reach/</loc>
		<lastmod>2020-09-29T15:04:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Pop-Up-SOC.jpg</image:loc>
			<image:title><![CDATA[Pop-Up-SOC]]></image:title>
			<image:caption><![CDATA[zScaler]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/Zscaler-SaaS_Security_Report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/its-time-to-get-serious-about-managing-privileged-accounts/</loc>
		<lastmod>2020-09-30T07:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/IBM-Cybersecurity-Threat.jpg</image:loc>
			<image:title><![CDATA[IBM-Cybersecurity-Threat]]></image:title>
			<image:caption><![CDATA[managing privileged accounts]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-find-your-way-to-the-federated-responsibility-model-for-appsec/</loc>
		<lastmod>2020-09-29T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cspm-vs-ciem-demystifying-two-popular-cloud-security-acronyms/</loc>
		<lastmod>2020-09-29T15:51:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-eric-capuanos-osquery/</loc>
		<lastmod>2020-09-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/applying-lessons-from-cisa-to-your-firmware/</loc>
		<lastmod>2020-09-29T16:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/a-low-effort-guide-to-keeping-tabs-on-your-security-posture/</loc>
		<lastmod>2020-09-29T16:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-bitglass-sase-triangle-ztna-for-internal-applications/</loc>
		<lastmod>2020-09-29T16:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-joy-of-tech-everythings-alt-right-with-facebook/</loc>
		<lastmod>2020-09-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/crank-up-your-sensors-with-the-respond-analyst-an-xdr-engine/</loc>
		<lastmod>2020-09-29T17:13:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/newsbites-drilldown-for-the-week-ending-25-september-2020/</loc>
		<lastmod>2020-09-29T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-holger-unterbrinks-reversing-with-dynamic-data-resolver-ddr-best-practice/</loc>
		<lastmod>2020-09-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-hacker-mind-podcast-hacking-with-light-and-sound/</loc>
		<lastmod>2020-09-29T18:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/malicious-pop-up-redirects-baidu-traffic/</loc>
		<lastmod>2020-09-29T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/prepare-for-a-different-fight-runtime-is-the-new-battleground/</loc>
		<lastmod>2020-09-29T18:35:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/application-security-in-todays-multi-cloud-world/</loc>
		<lastmod>2020-09-29T18:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/public-key-cryptography-in-blockchain/</loc>
		<lastmod>2020-09-29T18:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/hash-functions-in-blockchain/</loc>
		<lastmod>2020-09-29T18:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/blockchain-structure/</loc>
		<lastmod>2020-09-29T18:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/hack-the-box-htb-machines-walkthrough-series-traceback/</loc>
		<lastmod>2020-09-29T18:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/breached-passwords-the-most-frequently-used-and-compromised-passwords-of-the-year/</loc>
		<lastmod>2020-09-29T18:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-business-value-of-comptia-cysa-employee-certification/</loc>
		<lastmod>2020-09-29T18:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/webinar-the-failed-promises-of-siem-whats-next-for-cybersecurity/</loc>
		<lastmod>2020-09-29T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/video-android-hacking-proving-ground/</loc>
		<lastmod>2020-09-29T19:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/fortanix-partners-with-vmware-to-enable-cloud-service-providers-to-deliver-data-security-as-a-service/</loc>
		<lastmod>2020-09-30T13:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/using-stats-in-splunk-part-2-seasonality/</loc>
		<lastmod>2020-09-29T21:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybersecuritys-women-of-influence-will-meet-virtually-at-the-2020-ewf-conference/</loc>
		<lastmod>2020-09-29T21:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-mitigate-format-string-vulnerabilities/</loc>
		<lastmod>2020-09-29T21:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/iot-security-fundamentals-intercepting-and-manipulating-wireless-communications/</loc>
		<lastmod>2020-09-29T21:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/whos-behind-mondays-14-state-911-outage/</loc>
		<lastmod>2020-09-29T22:26:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/iot-security-fundamentals-iot-vs-ot-operational-technology/</loc>
		<lastmod>2020-09-29T22:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/has-2020-thrown-a-spanner-in-progress-toward-zero-trust/</loc>
		<lastmod>2020-09-29T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cisa-urges-businesses-to-patch-domain-controller-netlogon-flaw/</loc>
		<lastmod>2020-09-29T22:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-top-internet-of-things-iot-authentication-methods-and-options/</loc>
		<lastmod>2020-09-29T22:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/nerc-publishes-practice-guide-for-assessing-svchost-exe/</loc>
		<lastmod>2020-09-29T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-renewed-interest-in-zero-trust/</loc>
		<lastmod>2020-09-29T23:23:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/see-everything-continuous-visibility-across-your-hybrid-network-the-5-critical-success-factors-to-agile-nspm/</loc>
		<lastmod>2020-09-30T00:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/lessons-from-teaching-cybersecurity-week-1/</loc>
		<lastmod>2020-09-30T03:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/3-takeaways-from-the-gartner-2020-security-risk-management-summit/</loc>
		<lastmod>2020-09-30T03:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/password123-consumer-vs-organisational-understanding-of-data-security-and-compliance/</loc>
		<lastmod>2020-09-30T06:33:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/building-a-cyber-aware-workforce-requires-training-and-ongoing-awareness/</loc>
		<lastmod>2020-09-30T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/using-cyber-threat-intelligence-effectively-the-importance-of-device-visibility-and-network-monitoring/</loc>
		<lastmod>2020-09-30T07:36:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-three-ways-of-devops/</loc>
		<lastmod>2020-09-30T07:43:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/encryption-is-valuable-but-without-key-management-its-destined-to-fail/</loc>
		<lastmod>2020-09-30T09:37:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/teachers-talk-distance-learning-avast/</loc>
		<lastmod>2020-09-30T09:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/zerologon-windows-server-vulnerability-avast/</loc>
		<lastmod>2020-09-30T09:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ivanti-acquires-mobileiron-and-pulse-secure/</loc>
		<lastmod>2020-09-30T10:35:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Critical-Security-Controls.jpg</image:loc>
			<image:title><![CDATA[protection]]></image:title>
			<image:caption><![CDATA[Ivanti]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/arthur-j-gallagher-insurance-brokerage-reports-cyberattack/</loc>
		<lastmod>2020-09-30T11:21:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/akamai-supporting-development-at-the-edge/</loc>
		<lastmod>2020-09-30T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/enable-new-ways-of-work-simplified-remote-user-privileged-access-with-saas/</loc>
		<lastmod>2020-09-30T12:15:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/announcement-loginradius-announces-the-availability-of-user-management-a-comprehensive-feature-to-deliver-more-personalized-consumer-experiences/</loc>
		<lastmod>2020-09-30T12:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/radware-threat-researchers-live-ddos-for-hire/</loc>
		<lastmod>2020-09-30T12:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/automating-certificate-generation-for-distributed-splunk/</loc>
		<lastmod>2020-09-30T13:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/google-backup-and-sync-is-it-really-backup/</loc>
		<lastmod>2020-09-30T13:35:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/gartner-analyst-gorka-sadowski-joins-exabeam-as-chief-strategy-officer/</loc>
		<lastmod>2020-09-30T13:40:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/webinar-maturing-your-risk-program-with-servicenow-advanced-risk/</loc>
		<lastmod>2020-09-30T13:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/reasons-to-consider-a-cloud-deployment-of-your-vendor-access-management-system/</loc>
		<lastmod>2020-09-30T14:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/more-than-12-data-points-are-publicly-available-on-60-of-internet-users/</loc>
		<lastmod>2020-09-30T14:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/seizing-the-cloud-security-opportunity/</loc>
		<lastmod>2020-09-30T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/bec-attacks-drastically-increased-in-august-report-finds/</loc>
		<lastmod>2020-09-30T14:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/many-consumers-dont-trust-the-way-companies-are-using-their-data-and-businesses-need-to-change-that-perception/</loc>
		<lastmod>2020-09-30T14:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/family-mission-statement/</loc>
		<lastmod>2020-09-30T14:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-exploit-format-string-vulnerabilities/</loc>
		<lastmod>2020-09-30T14:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/copy-paste-compromises/</loc>
		<lastmod>2020-09-30T14:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/lockphish-phishing-attack-capturing-android-pins-iphone-passcodes-over-https/</loc>
		<lastmod>2020-09-30T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/fuzzing-introduction-definition-types-and-tools-for-cybersecurity-pros/</loc>
		<lastmod>2020-09-30T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/format-string-vulnerabilities-exploitation-case-study/</loc>
		<lastmod>2020-09-30T14:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-measure-effectiveness-of-your-security-operations-with-soar-and-business-intelligence-video/</loc>
		<lastmod>2020-09-30T15:04:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/inadvertent-routing-error-causing-major-outage/</loc>
		<lastmod>2020-09-30T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-jake-smiths-and-jack-mcdowells-building-blue-spawn-an-open-source-active-defense-and-edr-solution/</loc>
		<lastmod>2020-09-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/rooty-dolphin-uses-mekotio-to-target-bank-clients-in-south-america-and-europe/</loc>
		<lastmod>2020-09-30T16:34:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/8-ways-to-secure-the-covid-19-remote-contact-center/</loc>
		<lastmod>2020-10-01T07:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/remote-working.jpg</image:loc>
			<image:title><![CDATA[remote working]]></image:title>
			<image:caption><![CDATA[remote contact center]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/xkcd-messaging-systems/</loc>
		<lastmod>2020-09-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/5-go-to-market-tips-for-msp-security-practices/</loc>
		<lastmod>2020-09-30T17:15:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/menlo-threat-labs-uncovers-a-phishing-attack-using-captchas/</loc>
		<lastmod>2020-09-30T17:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/building-an-information-security-program-post-breach-part-i/</loc>
		<lastmod>2020-09-30T17:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/every-day-is-cyber-security-awareness-month/</loc>
		<lastmod>2020-09-30T17:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/can-sast-tools-improve-developer-productivity/</loc>
		<lastmod>2020-09-30T17:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/def-con-28-safe-mode-blue-team-village-tim-johnsons-kibana/</loc>
		<lastmod>2020-09-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/understanding-how-attackers-move-inside-your-organization/</loc>
		<lastmod>2020-09-30T18:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/five-cybersecurity-facts-from-nudatas-fraud-risk-h1-2020-report/</loc>
		<lastmod>2020-09-30T19:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/bens-book-of-the-month-review-of-transforming-information-security-optimizing-five-concurrent-trends-to-reduce-resource-drain/</loc>
		<lastmod>2020-09-30T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/three-lessons-from-an-id-theft-kingpins-fraud-factory/</loc>
		<lastmod>2020-09-30T19:54:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/school-is-back-in-session-for-students-and-for-hackers/</loc>
		<lastmod>2020-09-30T20:29:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/sonatype-finds-malicious-npm-packages-which-broadcast-your-ip-username-and-device-fingerprint-info-on-the-web/</loc>
		<lastmod>2020-09-30T20:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/adding-an-s-to-your-msp/</loc>
		<lastmod>2020-09-30T21:05:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/the-subjective-nature-of-a-cvss-score/</loc>
		<lastmod>2020-09-30T22:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/september-device-threat-report/</loc>
		<lastmod>2020-09-30T22:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/aws-user-management/</loc>
		<lastmod>2020-09-30T23:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/browser-forensics-google-chrome/</loc>
		<lastmod>2020-09-30T23:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/browser-forensics-firefox/</loc>
		<lastmod>2020-09-30T23:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/browser-forensics-ie-11/</loc>
		<lastmod>2020-09-30T23:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/networking-fundamentals-for-network-security-professionals/</loc>
		<lastmod>2020-09-30T23:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/wireless-networks-and-security/</loc>
		<lastmod>2020-09-30T23:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/introduction-to-printing-and-format-strings/</loc>
		<lastmod>2020-09-30T23:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/format-string-vulnerabilities-use-and-definitions/</loc>
		<lastmod>2020-09-30T23:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/average-ccna-salary-2020/</loc>
		<lastmod>2020-09-30T23:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/detecting-deep-fakes-with-a-heartbeat/</loc>
		<lastmod>2020-10-01T11:19:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/letter-scare-tactics-have-nothing-to-do-with-car-repair/</loc>
		<lastmod>2020-10-01T03:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/linux-and-macos-versions-of-commercial-malware-finspy-found-online-by-amnesty-international/</loc>
		<lastmod>2020-10-01T06:45:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/security-must-be-built-into-the-fabric-of-sd-branch/</loc>
		<lastmod>2020-10-01T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/learning-more-about-vulnerability-scanning/</loc>
		<lastmod>2020-10-01T07:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/blueliv-and-neurosoft-announce-strategic-partnership-for-threat-intelligence-services/</loc>
		<lastmod>2020-10-01T09:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ai-vs-keyword-scanning-self-harm-monitoring-technology-and-suicide-prevention/</loc>
		<lastmod>2020-10-01T11:02:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/comparing-aws-google-and-microsoft-for-serverless/</loc>
		<lastmod>2020-10-01T11:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/social-media-vs-democracy-avast/</loc>
		<lastmod>2020-10-01T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/current-security-tools-hamper-detection-of-insider-threats-survey-shows/</loc>
		<lastmod>2020-10-01T12:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/splunk-phantom-integration-maximizing-automation-for-incident-detection-and-remediation/</loc>
		<lastmod>2020-10-01T12:35:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/imperva-to-acquire-jsonar-a-new-generation-of-data-security/</loc>
		<lastmod>2020-10-01T12:39:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/keeping-up-with-ever-changing-privacy-regulations/</loc>
		<lastmod>2020-10-01T12:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/today-signal-sciences-and-fastly-join-forces-and-our-customers-are-our-first-priority/</loc>
		<lastmod>2020-10-01T13:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/imperva-to-acquire-jsonar-together-will-lead-a-new-generation-of-data-security/</loc>
		<lastmod>2020-10-01T13:07:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-to-take-away-from-irans-global-malware-campaign/</loc>
		<lastmod>2020-10-01T13:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/top-distribution-firm-logon-software-asia-and-the-third-party-application-security-vendor-reflectiz-are-announcing-a-new-partnership/</loc>
		<lastmod>2020-10-01T13:15:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/admin-notices-manager-announcing-the-new-plugin/</loc>
		<lastmod>2020-10-01T13:26:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-to-do-first-when-your-company-suffers-a-ransomware-attack/</loc>
		<lastmod>2020-10-01T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/russian-gets-7-years-in-prison-for-linkedin-dropbox-formspring-hacks/</loc>
		<lastmod>2020-10-01T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/an-order-of-cybersecurity-with-a-side-of-hope/</loc>
		<lastmod>2020-10-01T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/welcome-to-cybersecurity-awareness-month-2020/</loc>
		<lastmod>2020-10-01T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/be-on-alert-during-election-season/</loc>
		<lastmod>2020-10-01T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/october-is-national-cybersecurity-awareness-month-do-your-part-meet-pam-and-becybersmart/</loc>
		<lastmod>2020-10-01T14:50:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/october-is-cybersecurity-awareness-month/</loc>
		<lastmod>2020-10-01T14:53:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/red-canary-delivers-alert-fatigue-relief-for-security-teams/</loc>
		<lastmod>2020-10-01T14:53:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/gitlab-instant-inline-indispensable-developer-insights/</loc>
		<lastmod>2020-10-01T14:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/untangle-wins-silver-for-best-small-medium-business-service-in-best-in-biz-awards-2020-international/</loc>
		<lastmod>2020-10-01T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/its-time-to-re-evaluate-your-ransomware-prevention-strategy/</loc>
		<lastmod>2020-10-01T15:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/zion-1-2-vulnhub-ctf-walkthrough-part-1/</loc>
		<lastmod>2020-10-01T15:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/tycoon-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-10-01T15:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybercrime-at-scale-dissecting-a-dark-web-phishing-kit/</loc>
		<lastmod>2020-10-01T15:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/average-ccnp-salary-2020/</loc>
		<lastmod>2020-10-01T15:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/ccna-certification-prep-network-fundamentals-updated-2020/</loc>
		<lastmod>2020-10-01T15:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-blue-team-village-josh-stroscheins-suricata/</loc>
		<lastmod>2020-10-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ransomware-victims-that-pay-up-could-incur-steep-fines-from-uncle-sam/</loc>
		<lastmod>2020-10-01T16:36:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-joy-of-tech-debate-pain/</loc>
		<lastmod>2020-10-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/webinar-recap-secure-multi-cloud-environments-intelligent-cloud-security-posture-management/</loc>
		<lastmod>2020-10-01T17:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-tool-kit/</loc>
		<lastmod>2020-10-01T17:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-blue-team-village-kunyu-chens-and-junwei-songs-quark-engine/</loc>
		<lastmod>2020-10-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/96-of-organizations-use-open-source-libraries-but-less-than-50-manage-their-library-security-flaws/</loc>
		<lastmod>2020-10-01T18:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/boolean-math-and-logic-cissp-domain-3/</loc>
		<lastmod>2020-10-01T18:38:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/rapid7-announces-cloud-identity-and-access-management-governance-module-for-divvycloud/</loc>
		<lastmod>2020-10-06T13:05:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-are-open-redirects/</loc>
		<lastmod>2020-10-01T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-retain-your-security-analyst/</loc>
		<lastmod>2020-10-01T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/3-years-later-the-equifax-breach/</loc>
		<lastmod>2020-10-01T19:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/keep-your-playstation-secure-avast/</loc>
		<lastmod>2020-10-01T19:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/raising-the-tide-driving-improvement-in-security-by-being-a-good-human/</loc>
		<lastmod>2020-10-01T20:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/eclypsium-announces-13m-funding-round/</loc>
		<lastmod>2020-10-01T20:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-at-the-movies-la-la-land/</loc>
		<lastmod>2020-10-01T21:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/gfx-xsender-hack-tool-a-spam-mailer/</loc>
		<lastmod>2020-10-01T21:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/qa-conversion-rate-revenue-protection/</loc>
		<lastmod>2020-10-01T21:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/nazi-operation-masqueraded-as-right-wing-news-station-to-target-voters/</loc>
		<lastmod>2020-10-01T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/becybersmart-at-work-and-at-home/</loc>
		<lastmod>2020-10-02T00:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/join-delphix-at-the-devops-enterprise-summit-2020/</loc>
		<lastmod>2020-10-02T02:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/how-to-prioritize-security-investment-through-risk-quantification/</loc>
		<lastmod>2020-10-02T03:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/everything-you-need-to-know-about-nist-cybersecurity-frameworks-informative-references/</loc>
		<lastmod>2020-10-02T06:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ensuring-continuous-security-integration-for-devsecops/</loc>
		<lastmod>2020-10-02T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/municipality-leverages-secure-sd-wan-for-multi-cloud-to-optimize-cloud-security/</loc>
		<lastmod>2020-10-02T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/financial-cybersecurity-are-your-finances-safe/</loc>
		<lastmod>2020-10-02T10:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-startups-build-effective-cybersecurity-programs/</loc>
		<lastmod>2020-10-02T10:44:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Corporate-Boot-Camps.jpg</image:loc>
			<image:title><![CDATA[cybersecurity]]></image:title>
			<image:caption><![CDATA[cybersecurity startups]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fbi-41-of-financial-sector-cyber-attacks-come-from-credential-stuffing/</loc>
		<lastmod>2020-10-02T11:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-build-a-company-culture-of-leadership/</loc>
		<lastmod>2020-10-02T12:09:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/protect-your-home-this-cybersecurity-awareness-month-avast/</loc>
		<lastmod>2020-10-02T12:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mobile-stalkerware-signs-avast/</loc>
		<lastmod>2020-10-02T12:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/avast-proves-iot-firmware-can-be-hacked-avast/</loc>
		<lastmod>2020-10-02T12:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-weaponization-of-active-directory-an-inside-look-at-ransomware-attacks-ryuk-maze-and-savethequeen/</loc>
		<lastmod>2020-10-02T13:04:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ncsc-warns-admins-not-to-disable-updates-to-keep-flash-alive-in-2021/</loc>
		<lastmod>2020-10-02T13:12:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/social-media-intelligence-cutting-through-the-noise/</loc>
		<lastmod>2020-10-02T14:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-marketing-in-the-time-of-covid-3-leaders-speak/</loc>
		<lastmod>2020-10-02T14:27:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Update2.jpg</image:loc>
			<image:title><![CDATA[security marketing]]></image:title>
			<image:caption><![CDATA[Marketing]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/Dean_Nicolls_square.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/Atri-web-image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/Ryan-head.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/its-cybersecurity-awareness-month/</loc>
		<lastmod>2020-10-02T14:30:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ransom-payments-could-result-in-civil-penalties-for-ransomware-victims/</loc>
		<lastmod>2020-10-02T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-blue-team-village-lennart-koopmanns-graylog/</loc>
		<lastmod>2020-10-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-amelias-farm-fresh-cookies/</loc>
		<lastmod>2020-10-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-a-personal-ceo-liability/</loc>
		<lastmod>2020-10-02T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-blue-team-village-mangatas-tongdang-detecting-the-not-powershell-gang/</loc>
		<lastmod>2020-10-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/court-dismisses-new-mexico-ags-lawsuit-challenging-googles-educational-tools-for-kids/</loc>
		<lastmod>2020-10-02T18:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/attacks-aimed-at-disrupting-the-trickbot-botnet/</loc>
		<lastmod>2020-10-02T18:20:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/covid-19-and-acedia/</loc>
		<lastmod>2020-10-02T19:15:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/storage-management-best-practices-part-2-expand-storage-with-ease/</loc>
		<lastmod>2020-10-02T19:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/phishing-2-0-is-here-make-sure-youre-prepared/</loc>
		<lastmod>2020-10-03T02:11:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/employee-spotlight-ramith-padaki-machine-learning-engineer/</loc>
		<lastmod>2020-10-03T03:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-takes-top-tech-priority-as-covid-19-spurs-transformation-projects/</loc>
		<lastmod>2020-10-03T07:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/modern-healthcare-tech-also-means-modern-security/</loc>
		<lastmod>2020-10-05T07:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Ransomware-Health-Care.jpg</image:loc>
			<image:title><![CDATA[healthcare]]></image:title>
			<image:caption><![CDATA[healthcare]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/smb-security-backups-need-to-include-more-than-data/</loc>
		<lastmod>2020-10-05T06:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Insider-Treasury-Secrets.jpg</image:loc>
			<image:caption><![CDATA[SMB]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-blue-team-village-mask-con-intro/</loc>
		<lastmod>2020-10-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-masks/</loc>
		<lastmod>2020-10-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-blue-team-village-mike-cohens-velociraptor/</loc>
		<lastmod>2020-10-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/weekly-news-roundup-september-28-october-2-2020/</loc>
		<lastmod>2020-10-03T19:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-recon-village-ladislav-bacos-hunting-for-blue-mockingbird-coinminers/</loc>
		<lastmod>2020-10-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/robert-m-lees-jeff-haas-little-bobby-comics-week-297/</loc>
		<lastmod>2020-10-04T17:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-safe-mode-recon-village-mauro-eldritchs-covid-1984-pandemic-propaganda-and-surveillance/</loc>
		<lastmod>2020-10-04T18:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/more-hospital-ransomware-attacks-fbis-disinformation-warning-android-11-privacy-features/</loc>
		<lastmod>2020-10-05T04:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/tripwire-patch-priority-index-for-september-2020/</loc>
		<lastmod>2020-10-05T04:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/zero-trust-architecture-what-is-nist-sp-800-207-all-about/</loc>
		<lastmod>2020-10-05T04:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/from-botnets-to-phishing-a-discussion-on-the-2020-threat-landscape/</loc>
		<lastmod>2020-10-05T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/research-finds-450-increase-in-remote-employees-circumventing-security-to-mask-online-habits-or-steal-data/</loc>
		<lastmod>2020-10-05T07:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/moving-to-the-cloud-dont-forget-application-security/</loc>
		<lastmod>2020-10-05T08:27:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/30-ransomware-prevention-tips/</loc>
		<lastmod>2020-10-05T09:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/retail-giant-hm-fined-more-than-41-million-for-breaching-gdpr-regulations/</loc>
		<lastmod>2020-10-05T10:11:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/5g-network-vulnerabilities-avast/</loc>
		<lastmod>2020-10-05T10:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/six-more-reasons-to-love-forgerock-sdks/</loc>
		<lastmod>2020-10-05T11:12:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/leadership-in-threat-containment-new-broom-vs-old-hand/</loc>
		<lastmod>2020-10-05T13:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/acunetix-exhibiting-at-global-appsec-2020-virtual/</loc>
		<lastmod>2020-10-05T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/to-succeed-security-leaders-must-align-themselves-with-the-business/</loc>
		<lastmod>2020-10-05T13:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/data-in-the-browser-is-data-at-risk/</loc>
		<lastmod>2020-10-05T13:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/anti-virus-vulnerabilities-whos-guarding-the-watch-tower/</loc>
		<lastmod>2020-10-05T14:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/tennessee-man-sentenced-to-17-years-in-federal-prison-for-identity-theft-and-fraud/</loc>
		<lastmod>2020-10-05T14:11:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/boolean-math-or-logic-cissp-domain-3/</loc>
		<lastmod>2020-10-08T15:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ld_preload-introduction/</loc>
		<lastmod>2020-10-13T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/providing-security-and-acceleration-of-single-page-applications/</loc>
		<lastmod>2020-10-05T14:40:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/zerologon-tripwire-industrial-visibility-threat-definition-update-released/</loc>
		<lastmod>2020-10-05T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/boolean-math-xor-logic-cissp-domain-3/</loc>
		<lastmod>2020-10-15T15:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/boolean-math-not-logic-cissp-domain-3/</loc>
		<lastmod>2020-10-22T15:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/dhs-works-to-protect-national-critical-infrastructure/</loc>
		<lastmod>2020-10-05T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/remote-audits-continuous-compliance-in-wfh/</loc>
		<lastmod>2020-10-06T07:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/observability.jpg</image:loc>
			<image:title><![CDATA[observability]]></image:title>
			<image:caption><![CDATA[remote audits]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/zeronorth-delivers-new-capabilities-to-rapidly-identify-prioritize-and-remove-vulnerabilities-standing-in-the-way-of-software-excellence/</loc>
		<lastmod>2020-10-08T12:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/troy-hunt-flags-up-sensational-sextortion-bug-in-grindr/</loc>
		<lastmod>2020-10-05T15:37:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/grindr-hanna-sorensson-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[grindr--hanna-sörensson--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Grindr]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/veracode-makes-devsecops-a-seamless-experience-with-github-code-scanning/</loc>
		<lastmod>2020-10-05T15:42:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/lets-celebrate-by-bringing-security-and-devops-together/</loc>
		<lastmod>2020-10-05T15:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/dont-look-now-but-national-cybersecurity-awareness-month-ncsam-is-here/</loc>
		<lastmod>2020-10-05T15:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-recon-village-cytisus-eurydices-levitannin-ambly-the-smart-darknet-spider/</loc>
		<lastmod>2020-10-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/veracode-streamlines-appsec-workflows-for-developerswith-new-github-action/</loc>
		<lastmod>2020-10-05T16:19:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fake-npm-packages-found-in-github-repository/</loc>
		<lastmod>2020-10-05T16:19:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/google-prepares-security-team-to-investigate-third-party-apps/</loc>
		<lastmod>2020-10-05T16:22:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/higher-education-and-cmmc-7-top-of-mind-questions/</loc>
		<lastmod>2020-10-05T16:59:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/if-you-connect-it-protect-it/</loc>
		<lastmod>2020-10-05T17:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/youre-all-living-in-smart-homes-how-did-this-happen/</loc>
		<lastmod>2020-10-05T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-bigger-problem/</loc>
		<lastmod>2020-10-05T17:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/your-in-depth-guide-to-collecting-google-drive-activity-logs-in-splunk/</loc>
		<lastmod>2020-10-05T17:45:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/expert-qa-on-securing-code-in-github-with-checkmarx/</loc>
		<lastmod>2020-10-05T17:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/indoor-drones-raise-privacy-law-risksuntitled/</loc>
		<lastmod>2020-10-05T17:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-recon-village-chloe-messdaghi-burnout-is-real/</loc>
		<lastmod>2020-10-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/proxies-pivots-and-tunnels-oh-my/</loc>
		<lastmod>2020-10-06T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/dh2i-extends-software-defined-perimeter-to-iot-devices/</loc>
		<lastmod>2020-10-05T18:28:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/IoTsecurity.jpg</image:loc>
			<image:title><![CDATA[IoTsecurity]]></image:title>
			<image:caption><![CDATA[IoT Security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/DH2i.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ccna-certification-prep-security-fundamentals/</loc>
		<lastmod>2020-10-05T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hack-the-box-htb-machines-walkthrough-series-cascade-part-1/</loc>
		<lastmod>2020-10-05T19:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/microsoft-azure-certification-overview-and-career-path/</loc>
		<lastmod>2020-10-05T19:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/time-to-prepare-for-increased-u-s-china-tensions-in-cyberspace/</loc>
		<lastmod>2020-10-05T23:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/why-employees-arent-really-getting-your-cybersecurity-training/</loc>
		<lastmod>2020-10-05T23:23:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/announcing-polaris-support-for-github-actions/</loc>
		<lastmod>2020-10-05T23:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/file-integrity-monitoring-fim-your-friendly-network-detective-control/</loc>
		<lastmod>2020-10-06T05:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/six-key-considerations-for-a-flexible-secure-sd-wan-deployment/</loc>
		<lastmod>2020-10-06T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-data-normalization-in-cybersecurity-impacts-regulatory-compliance/</loc>
		<lastmod>2020-10-06T09:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/social-engineering-attacks-prevention-and-best-practices-infographic/</loc>
		<lastmod>2020-10-06T10:37:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-are-the-cis-implementation-groups/</loc>
		<lastmod>2020-10-06T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ringing-in-archers-next-chapter-with-a-new-identity/</loc>
		<lastmod>2020-10-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/managing-risk-during-a-pandemic-a-discussion-with-discover-financial-services/</loc>
		<lastmod>2020-10-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-do-you-define-risk/</loc>
		<lastmod>2020-10-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/in-the-digital-world-grc-evolves-and-converges-with-cybersecurity/</loc>
		<lastmod>2020-10-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/managing-risk-in-times-of-disruption-how-rsa-archer-customers-rise-to-the-challenge/</loc>
		<lastmod>2020-10-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/protecting-connected-cars-from-cyberattack/</loc>
		<lastmod>2020-10-07T07:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Connected-Vehicles-Hackable.jpg</image:loc>
			<image:title><![CDATA[Connected-Vehicles-Hackable]]></image:title>
			<image:caption><![CDATA[connected cars]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/becybersmart-protect-your-cyberspace/</loc>
		<lastmod>2020-10-06T12:29:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/simplified-ux-for-improved-platform-management-a-win-win-for-expanding-your-pam-program/</loc>
		<lastmod>2020-10-06T12:30:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/sisters-of-charity-health-system-informs-patients-of-data-breach/</loc>
		<lastmod>2020-10-06T12:35:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/aussie-social-news-app-leaks-80000-user-records-online/</loc>
		<lastmod>2020-10-06T12:47:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mcafee-and-uc-berkeley-center-for-long-term-cybersecurity-study-finds-mitre-attck-improves-cloud-security-yet-many-enterprises-struggle-to-implement-it/</loc>
		<lastmod>2020-10-06T12:54:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecai-connected-preview-avast/</loc>
		<lastmod>2020-10-06T12:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/rapid7-announces-cloud-identity-and-access-management-governance-module-for-divvycloud-2/</loc>
		<lastmod>2020-10-06T13:06:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/us-government-seeks-to-sanction-companies-that-pay-ransomware-operators/</loc>
		<lastmod>2020-10-06T13:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/5-questions-cisos-must-ask-when-addressing-the-new-wfh-reality/</loc>
		<lastmod>2020-10-06T13:36:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/local-authorities-the-compliance-solution/</loc>
		<lastmod>2020-10-06T13:37:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/snyk-and-perimeterx-partner-to-address-open-source-javascript-risk-increasingly-common-in-web-applications/</loc>
		<lastmod>2020-10-06T13:43:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/zerofox-acquires-cyveillance-strengthening-global-leadership-in-digital-risk-protection/</loc>
		<lastmod>2020-10-06T13:54:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-awareness-month-2020-the-perfect-year-to-talk-think-and-act-cybersecurity/</loc>
		<lastmod>2020-10-06T14:03:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/forgerock-updates-gsa-schedule/</loc>
		<lastmod>2020-10-06T14:45:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ddos-attacks-and-the-2020-election/</loc>
		<lastmod>2020-10-06T14:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/untangle-sd-wan-router-wins-silver-for-best-small-medium-business-service-in-best-in-biz-awards-2020-international/</loc>
		<lastmod>2020-10-06T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/untangle-sd-wan-router-wins-silver-for-best-small-medium-business-service-in-best-in-biz-awards-2020-international-2/</loc>
		<lastmod>2020-10-06T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cisa-and-dod-warn-of-sophisticated-threat-actor-wielding-new-slothfulmedia-malware/</loc>
		<lastmod>2020-10-06T15:24:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/your-ast-guide-for-the-disenchanted-part-4-2/</loc>
		<lastmod>2020-10-06T16:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-the-building-in-security-maturity-model-bsimm-says-about-the-role-of-sast-and-sca/</loc>
		<lastmod>2020-10-06T15:47:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/multi-browser-management-made-easy-with-browser-security-plus/</loc>
		<lastmod>2020-10-06T15:57:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/make-your-compliant-environment-secure-with-thundra/</loc>
		<lastmod>2020-10-06T15:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-recon-village-master-chens-twitter-word-phrequency/</loc>
		<lastmod>2020-10-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/akamai-named-to-indias-best-workplaces-for-women/</loc>
		<lastmod>2020-10-06T16:19:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mosaicregressor-chinese-uefi-bootkit-snoops-on-north-korean-foes/</loc>
		<lastmod>2020-10-06T16:19:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/china-klaus-chuttersnap-tan-unsplash.jpg</image:loc>
			<image:title><![CDATA[china-- klaus-chuttersnap-tan--unsplash]]></image:title>
			<image:caption><![CDATA[UEFI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/rapid7-announces-cloud-identity-and-access-management-governance-module-for-divvycloud-3/</loc>
		<lastmod>2020-10-06T16:25:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/managing-the-evolving-security-threat-landscape/</loc>
		<lastmod>2020-10-06T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ddos-attacks-grow-more-sophisticated-as-imperva-mitigates-largest-attack/</loc>
		<lastmod>2020-10-06T16:54:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/bitglass-security-spotlight-ransomware-attack-affects-more-than-320k-students-in-nevada-school-district/</loc>
		<lastmod>2020-10-06T16:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/qa-experts-weigh-in-on-the-hidden-world-of-shadow-code/</loc>
		<lastmod>2020-10-06T16:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/security-awareness-training-how-often-should-your-employees-get-retrained/</loc>
		<lastmod>2020-10-06T16:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/prognosen-fur-2020-cloud-vernetzte-autos-und-medizin-sowie-cybersicherheit-das-sind-die-trends-17-dezember-2019/</loc>
		<lastmod>2020-10-06T17:38:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/from-the-archive-robert-m-lees-jeff-haas-little-bobby-comics-week-114/</loc>
		<lastmod>2020-10-06T17:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whats-new-in-keyfactor-8-ui-improvements-ssh-key-manager-more/</loc>
		<lastmod>2020-10-06T17:59:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/are-open-source-security-tools-secure-weighing-the-pros-and-cons/</loc>
		<lastmod>2020-10-06T17:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-is-a-cyber-range/</loc>
		<lastmod>2020-10-06T17:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/microsoft-azure-fundamentals-az-900-domains-overview/</loc>
		<lastmod>2020-10-06T17:59:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/giving-effective-presentations-a-crash-course-with-chris-crowley/</loc>
		<lastmod>2020-10-06T17:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-nahid-farhadys-and-vincent-phams-spectrum-framework-for-ml-based-threat-monitoring/</loc>
		<lastmod>2020-10-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-take-down-social-media-threats/</loc>
		<lastmod>2020-10-06T18:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bsimm9-not-a-how-to-but-a-roadmap-to-a-better-ssi/</loc>
		<lastmod>2020-10-06T18:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/backdoor-shell-dropper-deploys-cms-specific-malware/</loc>
		<lastmod>2020-10-06T18:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/why-splunk-the-benefits-of-better-logging/</loc>
		<lastmod>2020-10-06T18:44:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/types-of-cyber-attacks-a-closer-look-at-common-threats/</loc>
		<lastmod>2020-10-06T18:47:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/turning-our-vision-into-reality/</loc>
		<lastmod>2020-10-06T18:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/if-you-connect-it-protect-it-2/</loc>
		<lastmod>2020-10-06T18:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/eliminate-blind-spots-protect-the-full-application-stack/</loc>
		<lastmod>2020-10-06T19:19:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ciso-talk-security-challenges-during-covid-19/</loc>
		<lastmod>2020-10-06T19:55:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/pandemicsecurity.jpg</image:loc>
			<image:title><![CDATA[pandemicsecurity]]></image:title>
			<image:caption><![CDATA[CISO Talk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/knowledge-raises-your-organisations-abilities/</loc>
		<lastmod>2020-10-06T20:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/microsoft-domain-controller-zerologon-and-rce-vulnerabilities-test/</loc>
		<lastmod>2020-10-06T21:01:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/uem-es-tiempo-de-asegurar-los-navegadores-de-su-empresa/</loc>
		<lastmod>2020-10-06T21:19:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-attack-abused-windows-error-reporting-service-to-evade-detection/</loc>
		<lastmod>2020-10-06T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/aquas-trivy-now-available-as-a-github-action/</loc>
		<lastmod>2020-10-07T16:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/your-ast-guide-for-the-disenchanted-part-4/</loc>
		<lastmod>2020-10-06T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/windows-server-flaw-prompts-emergency-action/</loc>
		<lastmod>2020-10-06T23:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/newsbites-drilldown-for-the-week-ending-2-october-2020/</loc>
		<lastmod>2020-10-07T01:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/lessons-from-teaching-cybersecurity-week-2/</loc>
		<lastmod>2020-10-07T05:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/achieving-nse-8-certification-through-fortinets-nse-training-institute-program/</loc>
		<lastmod>2020-10-07T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/polarproxy-in-docker-2/</loc>
		<lastmod>2020-10-07T08:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/soar-faster-and-smoother-with-swimlane-10-2/</loc>
		<lastmod>2020-10-07T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/polarproxy-in-docker/</loc>
		<lastmod>2020-10-07T08:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/covid-19-exacerbated-existing-cybercrime-patterns-europol-says/</loc>
		<lastmod>2020-10-07T09:36:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/generation-lockdown-survey-findings-avast/</loc>
		<lastmod>2020-10-07T09:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/get-visibility-and-insight-into-your-application-landscape-with-appviewx-adc/</loc>
		<lastmod>2020-10-07T10:12:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fbi-and-cisa-warn-of-spoofed-website-domains-and-emails-exploiting-the-2020-election/</loc>
		<lastmod>2020-10-07T11:55:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/opmanager-msp-manageengines-new-msp-focused-network-monitoring-solution/</loc>
		<lastmod>2020-10-07T12:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/death-by-a-thousand-cuts-nuisance-ddos-attacks-in-the-games-industry/</loc>
		<lastmod>2020-10-07T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/making-developers-lives-easier-as-we-enter-the-new-frontier-of-dependency-management/</loc>
		<lastmod>2020-10-07T13:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-pick-the-best-cyber-range-for-your-cybersecurity-training-needs-and-budget/</loc>
		<lastmod>2020-10-07T13:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/monitoring-business-communication-tools-like-slack-for-data-infiltration-risks/</loc>
		<lastmod>2020-10-07T13:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/inside-the-lyceum-hexane-malware/</loc>
		<lastmod>2020-10-07T13:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/insider-look-from-the-frontlines-of-cybersecurity/</loc>
		<lastmod>2020-10-07T14:05:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/why-cisos-must-let-iam-guide-cloud-security/</loc>
		<lastmod>2020-10-07T14:25:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/application-control-and-traffic-shaping-key-factors-to-consider/</loc>
		<lastmod>2020-10-07T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/digital-shadows-launches-access-key-alerts-to-mitigate-the-growing-problem-of-credentials-exposed-during-software-development/</loc>
		<lastmod>2020-10-07T14:31:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/aws-identity-federation-and-least-privilege-friends-or-foes/</loc>
		<lastmod>2020-10-07T14:35:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/42crunch-releases-openapi-static-security-audit-in-github-code-scanning/</loc>
		<lastmod>2020-10-07T14:56:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-awareness-month-week-1-day-in-the-life-security-researcher/</loc>
		<lastmod>2020-10-07T14:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-is-a-cyber-risk-assessment/</loc>
		<lastmod>2020-10-07T14:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/promising-infusions-of-cash-fake-investor-john-bernard-walked-away-with-30m/</loc>
		<lastmod>2020-10-07T14:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-effective-is-castle-against-credential-stuffing/</loc>
		<lastmod>2020-10-07T15:45:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/visa-warns-of-pos-malware-campaigns-in-north-america/</loc>
		<lastmod>2020-10-07T15:51:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-nahid-farhadys-a-dive-into-privacy-preserving-machine-learning/</loc>
		<lastmod>2020-10-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-vendor-access-management-is-like-having-a-plumber-at-your-home/</loc>
		<lastmod>2020-10-07T16:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/building-a-team-to-secure-the-enterprise-of-things/</loc>
		<lastmod>2020-10-07T16:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-valak-variant-makes-most-wanted-malware-list-for-first-time/</loc>
		<lastmod>2020-10-07T16:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/why-is-threat-detection-hard/</loc>
		<lastmod>2020-10-07T16:40:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/feature-release-20-5/</loc>
		<lastmod>2020-10-07T16:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/top-managers-increasingly-asked-to-sit-in-on-cybersecurity-meetings/</loc>
		<lastmod>2020-10-07T16:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/remote-or-hybrid-work-is-likely-the-future-new-research-finds/</loc>
		<lastmod>2020-10-07T16:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-joy-of-tech-wish-the-emperor-well/</loc>
		<lastmod>2020-10-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/incident-response-pay-a-ransom-go-to-jail/</loc>
		<lastmod>2020-10-08T06:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Ransomware-Strains.jpg</image:loc>
			<image:title><![CDATA[Ransomware]]></image:title>
			<image:caption><![CDATA[ransom]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hyperproof-now-supports-nist-cybersecurity-framework-and-csa-ccm/</loc>
		<lastmod>2020-10-07T17:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/understanding-the-security-risks-of-cloud-environments/</loc>
		<lastmod>2020-10-07T17:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-leo-meyerovichs-project-domino-citizen-data-science-against-covid-misinformation/</loc>
		<lastmod>2020-10-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/building-an-information-security-program-post-breach-part-ii/</loc>
		<lastmod>2020-10-07T18:58:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/community-id-support-for-wireshark/</loc>
		<lastmod>2020-10-07T19:07:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-the-tech-landscape-could-change-post-election/</loc>
		<lastmod>2020-10-08T07:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/election.jpg</image:loc>
			<image:title><![CDATA[election]]></image:title>
			<image:caption><![CDATA[election]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/sitecheck-malware-report-september-summary/</loc>
		<lastmod>2020-10-07T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-tool-kit-2/</loc>
		<lastmod>2020-10-07T22:30:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/starting-from-the-right-place-introducing-casb-data-discovery/</loc>
		<lastmod>2020-10-08T06:44:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/achieving-compliance-with-qatars-national-information-assurance-policy/</loc>
		<lastmod>2020-10-08T06:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-tripwire-custom-workflow-automation-can-enhance-your-network-visibility/</loc>
		<lastmod>2020-10-08T06:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-race-against-time-customer-rapidly-transitions-7000-employees-to-telework/</loc>
		<lastmod>2020-10-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-statement-of-applicability-in-iso-27001-2/</loc>
		<lastmod>2020-10-08T07:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/travel-giants-fail-to-secure-websites-despite-high-profile-breaches/</loc>
		<lastmod>2020-10-08T07:07:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whitepaper-the-failed-promises-of-siem/</loc>
		<lastmod>2020-10-08T07:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-quarter-of-canadian-it-decision-makers-report-coronavirus-themed-cyberattacks-during-pandemic/</loc>
		<lastmod>2020-10-08T09:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/37-of-remote-employees-have-no-security-restrictions-on-corporate-devices/</loc>
		<lastmod>2020-10-08T09:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-cybersecurity-and-cyberbullying-are-intertwined-in-k-12-schools/</loc>
		<lastmod>2020-10-08T11:04:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/canceling-the-cancel-culture-avast/</loc>
		<lastmod>2020-10-08T11:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/allan-thomson-profile-avast/</loc>
		<lastmod>2020-10-08T11:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/business-cloud-security-summit-takeaways-avast/</loc>
		<lastmod>2020-10-08T11:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/lemonduck-crypto-miner-a-kingminer-successor/</loc>
		<lastmod>2020-10-08T11:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/automate-employee-life-cycle-management-with-the-admanager-plus-ultipro-integration/</loc>
		<lastmod>2020-10-08T12:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/privacyraven-has-left-the-nest/</loc>
		<lastmod>2020-10-08T12:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/is-your-org-supporting-employee-cybersecurity-skills-growth/</loc>
		<lastmod>2020-10-08T12:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/3-attack-surfaces-that-can-take-your-game-offline/</loc>
		<lastmod>2020-10-08T12:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cmmc-the-new-cybersecurity-standard-for-defense-contractors/</loc>
		<lastmod>2020-10-08T13:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hackers-disguise-malware-attack-as-new-details-on-donald-trumps-covid-19-illness/</loc>
		<lastmod>2020-10-08T13:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-montysthree-toolset-used-in-targeted-industrial-espionage-attacks/</loc>
		<lastmod>2020-10-08T13:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-zeronorth-is-driving-the-devsecops-revolution-for-the-good-of-software-with-new-capabilities/</loc>
		<lastmod>2020-10-08T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fbi-warns-teleworkers-of-the-risks-of-using-hotel-wi-fi-networks/</loc>
		<lastmod>2020-10-08T14:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-leader-in-the-wave-for-customer-iam/</loc>
		<lastmod>2020-10-08T14:27:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/on-premises-vs-cloud-based-cyber-ranges-why-virtual-learning-environments-are-best/</loc>
		<lastmod>2020-10-08T14:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-state-of-ransomware-2020-key-findings-from-sophos-malwarebytes/</loc>
		<lastmod>2020-10-08T14:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hack-the-box-htb-machines-walkthrough-series-cascade-part-2/</loc>
		<lastmod>2020-10-08T14:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/emotet-is-back-and-its-targeting-local-and-state-governments-cisa-warns/</loc>
		<lastmod>2020-10-08T14:37:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/covid-19-vaccine-trials-slowed-down-by-a-ransomware-attack/</loc>
		<lastmod>2020-10-08T14:42:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/five-cloud-security-considerations-for-cisos/</loc>
		<lastmod>2020-10-08T14:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/statistics-highlight-the-biggest-source-of-wordpress-vulnerabilities/</loc>
		<lastmod>2020-10-08T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/beating-alert-fatigue-with-integrated-data/</loc>
		<lastmod>2020-10-08T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/virtual-desktop-infrastructure-crucial-in-a-work-from-home-world/</loc>
		<lastmod>2020-10-08T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/securely-automate-it-tasks-with-ansible-and-cyberark/</loc>
		<lastmod>2020-10-08T15:35:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/step-by-step-configuration-with-azure-devops-services/</loc>
		<lastmod>2020-10-08T15:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-implement-nist-csf/</loc>
		<lastmod>2020-10-08T15:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-hyrum-andersons-zoltan-balaz-machine-learning-competition-2020/</loc>
		<lastmod>2020-10-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-dangers-of-government-mandated-encryption-backdoors/</loc>
		<lastmod>2020-10-09T06:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/backdoor.jpg</image:loc>
			<image:title><![CDATA[backdoor]]></image:title>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-are-aws-lambda-extensions-and-how-it-will-foster-serverless/</loc>
		<lastmod>2020-10-08T16:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-all-in-one/</loc>
		<lastmod>2020-10-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/combatendo-burnout-para-assegurar-o-futuro-do-trabalho-remoto/</loc>
		<lastmod>2020-10-08T17:18:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/integrate-anywhere-api-first-agile-approach-the-5-critical-success-factors-to-agile-nspm/</loc>
		<lastmod>2020-10-08T17:18:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/intelligence-operations-we-need-more-human-in-cybersecurity-intelligence/</loc>
		<lastmod>2020-10-08T17:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/5-lessons-about-software-security-for-cybersecurity-awareness-month/</loc>
		<lastmod>2020-10-08T17:52:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-journal-club-lives-pursuit-of-exploitable-bugs-in-machine-learning/</loc>
		<lastmod>2020-10-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/securing-an-agile-and-hybrid-workforce/</loc>
		<lastmod>2020-10-08T19:41:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/amid-an-embarrassment-of-riches-ransom-gangs-increasingly-outsource-their-work/</loc>
		<lastmod>2020-10-08T19:42:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/trends-in-it-risk-management/</loc>
		<lastmod>2020-10-08T19:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fake-users-rave-but-real-users-rant-as-apps-on-google-play-deal-aggressive-adware/</loc>
		<lastmod>2020-10-08T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/your-ast-guide-for-the-disenchanted-part-2-3/</loc>
		<lastmod>2020-10-08T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/misconfiguration-errors-are-a-magecart-delight/</loc>
		<lastmod>2020-10-08T22:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/factcheck-regenerons-use-of-embryonic-stem-cells/</loc>
		<lastmod>2020-10-09T01:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/firebase-google-clouds-evil-twin-excerpt/</loc>
		<lastmod>2020-10-09T01:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-best-practices-for-small-to-mid-sized-businesses-avast/</loc>
		<lastmod>2020-10-09T04:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/securing-the-future-with-ai-driven-security-operations/</loc>
		<lastmod>2020-10-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/key-insights-from-a-retail-industry-cybersecurity-survey-trends-report/</loc>
		<lastmod>2020-10-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/former-medical-transcriptionist-accused-of-trying-to-extort-toronto-hospital-using-stolen-patient-data/</loc>
		<lastmod>2020-10-09T08:51:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/small-businesses-and-consumers-grossly-underestimate-danger-of-cyberattacks/</loc>
		<lastmod>2020-10-09T09:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/best-idaas-provider-why-loginradius-is-considered-as-the-best-idaas-solution/</loc>
		<lastmod>2020-10-09T11:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/build-a-resilient-cybersecurity-framework-by-transforming-your-it-team-into-a-security-team/</loc>
		<lastmod>2020-10-09T12:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/detecting-iterator-invalidation-with-codeql/</loc>
		<lastmod>2020-10-09T12:30:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/android-locker-variant-uses-innovative-sequence-to-load-ransom-note/</loc>
		<lastmod>2020-10-09T12:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/massachusetts-public-school-district-cancels-online-classes-after-alleged-cyberattack/</loc>
		<lastmod>2020-10-09T14:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/tesla-fires-employee-for-allegedly-sabotaging-operations-at-california-based-factory/</loc>
		<lastmod>2020-10-09T14:09:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-is-smishing-definition-examples-protection-tips/</loc>
		<lastmod>2020-10-09T14:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/setting-up-a-virtual-machine-for-your-ctf-toolbox/</loc>
		<lastmod>2020-10-09T14:54:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/accurics-enables-self-healing-infrastructure-with-github-app/</loc>
		<lastmod>2020-10-09T15:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/must-read-the-10-best-cybersecurity-books-you-need-to-know-about/</loc>
		<lastmod>2020-10-09T15:22:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/monitoring-and-vulnerability-management/</loc>
		<lastmod>2020-10-09T15:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/secure-code-warrior-announces-new-github-action-and-integration-with-snyk-to-embed-secure-coding-skills-at-every-stage-of-the-development-lifecycle/</loc>
		<lastmod>2020-10-09T15:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-journal-club-lives-fawkes-facial-recognition/</loc>
		<lastmod>2020-10-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/five-worthy-reads-every-month-should-be-cybersecurity-awareness-month/</loc>
		<lastmod>2020-10-09T16:05:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/tech-savvy-teens-save-parents-thousands-avast/</loc>
		<lastmod>2020-10-09T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-joy-of-tech-anti-anti-trust/</loc>
		<lastmod>2020-10-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/opening-the-conversation-about-website-security/</loc>
		<lastmod>2020-10-09T17:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/digital-risk-protection-vs-threat-intelligence/</loc>
		<lastmod>2020-10-09T17:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/theres-a-new-a-golang-written-rat-in-town/</loc>
		<lastmod>2020-10-09T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-sven-cattell-comathematicians-hyperlocal-drift-detection-with-goko/</loc>
		<lastmod>2020-10-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/google-gives-cops-your-search-terms-let-the-frog-boiling-commence/</loc>
		<lastmod>2020-10-09T18:05:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/burning-car-flavio-gasperini-unsplash.jpg</image:loc>
			<image:title><![CDATA[burning-car--flavio-gasperini--unsplash]]></image:title>
			<image:caption><![CDATA[Google]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/introducing-the-new-castle/</loc>
		<lastmod>2020-10-09T19:41:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mass-move-to-the-cloud-3-essential-tips-for-cloud-migration/</loc>
		<lastmod>2020-10-09T20:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/enhancing-security-workflows-in-palo-alto-networks-cortex-xsoar-with-layer-7-indicators/</loc>
		<lastmod>2020-10-09T20:57:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/russian-and-chinese-business-leaders-not-worried-about-cyber-attacks/</loc>
		<lastmod>2020-10-09T20:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/analiticas-la-importancia-de-medir-su-trabajo/</loc>
		<lastmod>2020-10-09T21:01:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/wireless-pentesting-part-4-performing-an-actual-wireless-pentest/</loc>
		<lastmod>2020-10-09T21:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/2021-msse-cloud-security-elective/</loc>
		<lastmod>2020-10-09T22:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/detect-and-mitigate-critical-intel-vulnerabilities-intel-sa-00241-intel-sa-00404/</loc>
		<lastmod>2020-10-10T01:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/report-u-s-cyber-command-behind-trickbot-tricks/</loc>
		<lastmod>2020-10-10T04:47:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-gtklondikes-hacking-with-skynet-how-ai-is-empowering-adversaries/</loc>
		<lastmod>2020-10-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-prediction/</loc>
		<lastmod>2020-10-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/doh-and-phishing-risks-what-you-need-to-know-now/</loc>
		<lastmod>2020-10-10T17:16:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-vahid-behdazans-security-challenges-in-deep-reinforcement-learning/</loc>
		<lastmod>2020-10-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/weekly-news-roundup-october-4-8-2020/</loc>
		<lastmod>2020-10-10T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-workshop-adversarial-machine-learning-attacking-amsi-providers/</loc>
		<lastmod>2020-10-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/from-the-archive-robert-m-lees-jeff-haas-little-bobby-comics-week-298/</loc>
		<lastmod>2020-10-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-younghoo-lees-joshua-saxes-detecting-social-engineering-emails-with-a-bleeding-edge-neural-model/</loc>
		<lastmod>2020-10-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/computing-at-the-edge/</loc>
		<lastmod>2020-10-11T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/you-are-here-giving-your-users-the-local-experience-they-deserve/</loc>
		<lastmod>2020-10-11T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/edgeworkers-use-story-creating-high-performing-individualized-campaign-responses-in-online-retail/</loc>
		<lastmod>2020-10-11T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-social-dilemma/</loc>
		<lastmod>2020-10-12T04:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-cybersecurity-leaders-can-understand-the-value-of-their-organizations-security-solutions/</loc>
		<lastmod>2020-10-12T05:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/deepfake-voice-technology-iterates-on-old-phishing-strategies/</loc>
		<lastmod>2020-10-12T05:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/building-a-human-firewall-to-address-insider-threats/</loc>
		<lastmod>2020-10-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/most-workers-not-interested-in-switching-to-a-cybersecurity-role/</loc>
		<lastmod>2020-10-12T07:30:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/43-of-global-employees-are-not-sure-what-a-phishing-attack-is/</loc>
		<lastmod>2020-10-12T08:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/kids-and-online-dangers-avast/</loc>
		<lastmod>2020-10-12T10:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/infinite-diversity-in-infinite-complexity-but-finite-resilience/</loc>
		<lastmod>2020-10-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-design-layout-and-features-the-all-new-ui-of-servicedesk-plus-cloud-is-here/</loc>
		<lastmod>2020-10-12T12:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/prison-video-calling-service-exposes-call-transcripts-between-convicts-and-attorneys/</loc>
		<lastmod>2020-10-12T12:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mcafee-releases-saas-based-suites-that-deliver-comprehensive-and-unified-cybersecurity-across-endpoints-web-and-cloud/</loc>
		<lastmod>2020-10-12T12:16:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/seven-active-directory-security-tips-from-the-experts/</loc>
		<lastmod>2020-10-12T12:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/joining-castle-to-help-protect-your-online-identity/</loc>
		<lastmod>2020-10-12T12:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/microsoft-uses-trademark-law-to-disrupt-trickbot-botnet/</loc>
		<lastmod>2020-10-12T12:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/personal-and-medical-information-of-children-and-adults-stolen-in-dhs-data-breach/</loc>
		<lastmod>2020-10-12T12:54:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/widespread-unemployment-fraud-is-overwhelming-state-systems/</loc>
		<lastmod>2020-10-12T12:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/security-researchers-awarded-over-250000-for-reporting-55-vulnerabilities-in-apples-bug-bounty-program/</loc>
		<lastmod>2020-10-12T13:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/an-alternative-approach-to-waap-architecture/</loc>
		<lastmod>2020-10-12T13:09:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-is-forced-browsing/</loc>
		<lastmod>2020-10-12T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pwned-1-vulnhub-ctf-walkthrough/</loc>
		<lastmod>2020-10-12T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/microsoft-azure-security-technologies-exam-az-500-overview-of-domains/</loc>
		<lastmod>2020-10-12T14:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/introducing-the-5-biggest-security-operations-trends-shaping-todays-mssp-free-guide/</loc>
		<lastmod>2020-10-12T15:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fugue-introduces-next-generation-cspm-to-prove-compliance-and-eliminate-cloud-misconfiguration/</loc>
		<lastmod>2020-10-14T12:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/google-responds-to-warrants-for-about-searches/</loc>
		<lastmod>2020-10-13T11:20:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/security-threats-targeting-the-remote-workforce/</loc>
		<lastmod>2020-10-13T07:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Survey-Cybersecurity-Crowdsourcing.jpg</image:loc>
			<image:caption><![CDATA[remote workforce]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-iot-bots-reveal-why-isps-have-to-shoulder-the-responsibility-for-cybersecurity/</loc>
		<lastmod>2020-10-12T15:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/6-signs-devsecops-maturity-has-a-long-way-to-go/</loc>
		<lastmod>2020-10-12T15:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/covid-19-gives-rise-to-next-gen-cisos/</loc>
		<lastmod>2020-10-13T06:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/superhero.jpg</image:loc>
			<image:title><![CDATA[superhero]]></image:title>
			<image:caption><![CDATA[next-gen CISOs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ai-village-erick-galinkins-babys-first-100-mlsec-words/</loc>
		<lastmod>2020-10-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-bedrock-of-it-security-whats-next-for-pki/</loc>
		<lastmod>2020-10-12T16:23:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/canada-thanksgiving-action-de-grace-au-canada/</loc>
		<lastmod>2020-10-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/to-click-or-not-to-click-an-osint-investigation-overview/</loc>
		<lastmod>2020-10-12T17:07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-gregg-hortond-ryan-slamas-10000-dependencies-under-the-sea/</loc>
		<lastmod>2020-10-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/securing-devices-at-work-and-at-home/</loc>
		<lastmod>2020-10-12T18:13:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/proof-of-work/</loc>
		<lastmod>2020-10-12T18:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-are-command-injection-vulnerabilities/</loc>
		<lastmod>2020-10-12T18:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/u-s-cyber-command-says-it-nuked-trickbot-but-microsoft-and-chums-claim-credit/</loc>
		<lastmod>2020-10-12T18:37:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/cyber-command-us-army-pd.jpg</image:loc>
			<image:caption><![CDATA[Trickbot]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-sans-five-day-security-culture-course/</loc>
		<lastmod>2020-10-12T18:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/accurics-adds-support-for-hashicorp-terraform-cloud-and-sentinel-policy-as-code/</loc>
		<lastmod>2020-10-12T19:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/impervas-mobile-security-app/</loc>
		<lastmod>2020-10-12T19:57:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/secure-your-in-home-iot-avast/</loc>
		<lastmod>2020-10-12T19:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/securing-devices-at-home-and-work/</loc>
		<lastmod>2020-10-12T20:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/measuring-improving-core-web-vitals/</loc>
		<lastmod>2020-10-12T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/timers-metrics-and-dimensions-whats-new-in-mpulse-in-2020/</loc>
		<lastmod>2020-10-12T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/media-services-live-features-upgrades-to-support-modern-day-live-streaming-needs/</loc>
		<lastmod>2020-10-12T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/three-cloud-first-akamai-initiatives-to-support-your-cloud-journey/</loc>
		<lastmod>2020-10-12T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/making-the-edge-come-alive/</loc>
		<lastmod>2020-10-12T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whats-the-411-with-the-updated-cysa/</loc>
		<lastmod>2020-10-12T21:49:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/practice-safe-secs-cyber-intelligence-experts-on-building-safe-operational-security-and-information-security-practices/</loc>
		<lastmod>2020-10-12T22:28:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whats-new-in-delivery/</loc>
		<lastmod>2020-10-12T23:05:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/preparing-the-edge-for-a-big-year-in-live-streaming/</loc>
		<lastmod>2020-10-12T23:07:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mobile-malware-what-makes-it-dangerous/</loc>
		<lastmod>2020-10-12T23:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/are-you-ready-for-iso-sae-21434-cybersecurity-of-road-vehicles/</loc>
		<lastmod>2020-10-13T00:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-iot-bots-reveal-why-isps-have-to-shoulder-the-responsibility-for-cybersecurity-2/</loc>
		<lastmod>2020-10-13T02:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/6-signs-devsecops-maturity-has-a-long-way-to-go-2/</loc>
		<lastmod>2020-10-13T02:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/43-of-global-employees-are-not-sure-what-a-phishing-attack-is-2/</loc>
		<lastmod>2020-10-13T02:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/small-businesses-and-consumers-grossly-underestimate-danger-of-cyberattacks-2/</loc>
		<lastmod>2020-10-13T02:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/is-your-org-supporting-employee-cybersecurity-skills-growth-2/</loc>
		<lastmod>2020-10-13T02:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-quarter-of-canadian-it-decision-makers-report-coronavirus-themed-cyberattacks-during-pandemic-2/</loc>
		<lastmod>2020-10-13T02:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/37-of-remote-employees-have-no-security-restrictions-on-corporate-devices-2/</loc>
		<lastmod>2020-10-13T02:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/top-managers-increasingly-asked-to-sit-in-on-cybersecurity-meetings-2/</loc>
		<lastmod>2020-10-13T02:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/remote-or-hybrid-work-is-likely-the-future-new-research-finds-2/</loc>
		<lastmod>2020-10-13T02:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/knowledge-raises-your-organisations-abilities-2/</loc>
		<lastmod>2020-10-13T02:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/85-of-developers-in-the-technology-industry-deploy-daily-yet-8-in-10-arent-going-fast-enough/</loc>
		<lastmod>2020-10-13T03:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/shared-responsibility-and-configuration-management-in-the-cloud-sector-2020/</loc>
		<lastmod>2020-10-13T05:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/podcast-episode-10-face-off-debating-facial-recognition-with-thom-langford-paul-edon/</loc>
		<lastmod>2020-10-13T05:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-fortiguard-labs-team-discusses-threat-intelligence-global-partnerships-and-more/</loc>
		<lastmod>2020-10-13T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/deep-analysis-the-eking-variant-of-phobos-ransomware/</loc>
		<lastmod>2020-10-13T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-evolution-of-siem/</loc>
		<lastmod>2020-10-13T07:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hazards-to-avoid-when-implementing-soar/</loc>
		<lastmod>2020-10-13T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/swarms-of-decoys-disarmed-anti-aircraft-defenses-in-world-war-ii/</loc>
		<lastmod>2020-10-13T10:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ermetic-unveils-board-of-advisors-featuring-top-executives-from-atlassian-google-netflix-and-publicis-groupe/</loc>
		<lastmod>2020-10-13T10:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/bitglass-leads-the-pack-in-kuppingercoles-casb-market-compass/</loc>
		<lastmod>2020-10-13T11:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/overcoming-the-challenges-of-detecting-p2p-botnets-on-your-network/</loc>
		<lastmod>2020-10-13T12:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/overcoming-the-challenges-of-detecting-p2p-botnets-on-your-network-2/</loc>
		<lastmod>2020-10-13T12:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/managedmethods-launches-google-classroom-monitoring-reporting-for-k-12-school-district-it-teams/</loc>
		<lastmod>2020-10-13T12:07:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pci-pal-announces-strategic-alliance-with-stripe-to-rapidly-deploy-payment-security-deployments/</loc>
		<lastmod>2020-10-13T12:18:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/untangle-offers-powerful-vpn-choices-with-ng-firewall-16-release/</loc>
		<lastmod>2020-10-13T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/three-types-of-serverless-monitoring-metrics-on-aws/</loc>
		<lastmod>2020-10-13T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/creating-and-weaponizing-deep-fakes-avast/</loc>
		<lastmod>2020-10-13T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/more-than-half-of-employees-use-rogue-apps-for-work-survey-finds/</loc>
		<lastmod>2020-10-13T13:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-hacker-mind-podcast-hacking-the-chrome-sandbox-2/</loc>
		<lastmod>2020-10-13T14:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/orca-security-finds-400000-virtual-appliance-vulnerabilities/</loc>
		<lastmod>2020-10-13T13:58:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/APT-Attacks.jpg</image:loc>
			<image:title><![CDATA[APT-Attacks]]></image:title>
			<image:caption><![CDATA[virtual appliances]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/understanding-the-shared-responsibility-model/</loc>
		<lastmod>2020-10-13T13:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cyborg-security-introduces-new-platform-for-threat-hunting/</loc>
		<lastmod>2020-10-13T14:50:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/morgan-stanley-receives-60-million-fine-for-improper-handling-of-customer-data/</loc>
		<lastmod>2020-10-13T15:02:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/shiftleft-tales%e2%80%8a-%e2%80%8areducing-pov-onboarding-times-from-few-weeks-to-less-than-5-minutes/</loc>
		<lastmod>2020-10-13T15:17:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cisa-and-fbi-observed-apt-groups-targeting-state-networks-related-to-us-election-systems/</loc>
		<lastmod>2020-10-13T15:25:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-vandana-verma-sehgals-running-an-appsec-program-wtih-open-source/</loc>
		<lastmod>2020-10-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pandemic-burnout-yes-its-a-thing-and-its-a-security-risk/</loc>
		<lastmod>2020-10-14T06:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/burnout.jpg</image:loc>
			<image:title><![CDATA[burnout]]></image:title>
			<image:caption><![CDATA[burnout]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-important-is-cybersecurity-to-mobile-subscribers/</loc>
		<lastmod>2020-10-13T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/using-merlin-agents-to-evade-detection/</loc>
		<lastmod>2020-10-13T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-ultimate-guide-to-encryption-key-management/</loc>
		<lastmod>2020-10-13T16:28:30+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->