<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2020/10/how-hackers-use-captcha-to-evade-automated-detection/</loc>
		<lastmod>2020-10-13T16:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/remote-hybrid-work-need-better-data-security/</loc>
		<lastmod>2020-10-14T07:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Security-Measures-Company.jpg</image:loc>
			<image:caption><![CDATA[remote work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-years-buzz-worthy-performers-the-award-and-path-to-profitability-goes-to-msps/</loc>
		<lastmod>2020-10-13T16:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-joy-of-tech-covid-fatigue/</loc>
		<lastmod>2020-10-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xplora-watches-for-kids-chinese-spyware/</loc>
		<lastmod>2020-10-13T17:16:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/child-caleb-woods-unsplash.jpg</image:loc>
			<image:title><![CDATA[child--caleb-woods--unsplash]]></image:title>
			<image:caption><![CDATA[Xplora]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-joy-of-secure-devops-demands-more-cooks-in-the-kitchen/</loc>
		<lastmod>2020-10-13T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/shifting-security-to-the-cloud/</loc>
		<lastmod>2020-10-13T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-phillip-marlows-cant-touch-this-detecting-lateral-movement/</loc>
		<lastmod>2020-10-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/akamai-launches-new-digital-badge-program-for-channel-partners/</loc>
		<lastmod>2020-10-13T19:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/splunking-with-sysmon-series-part-2-tuning/</loc>
		<lastmod>2020-10-13T18:42:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/us-cyber-command-and-microsoft-are-both-disrupting-trickbot/</loc>
		<lastmod>2020-10-15T11:01:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fake-windows-defender-antivirus-theme-used-to-spread-qbot/</loc>
		<lastmod>2020-10-13T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/microsoft-patch-tuesday-october-2020-edition/</loc>
		<lastmod>2020-10-13T20:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/october-patch-tuesday-fixes-87-vulnerabilities-6-of-them-publicly-disclosed/</loc>
		<lastmod>2020-10-13T20:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/myth-3-its-better-to-block-than-to-permit-access/</loc>
		<lastmod>2020-10-13T20:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/demand-for-healthcare-data-visualization-for-better-protection/</loc>
		<lastmod>2020-10-13T20:51:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/owning-your-professional-narrative-authentically-lessons-from-the-sans-bipoc-in-cybersecurity-forum/</loc>
		<lastmod>2020-10-13T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-hacker-mind-podcast-hacking-the-chrome-sandbox/</loc>
		<lastmod>2020-10-13T20:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whats-new-in-web-security/</loc>
		<lastmod>2020-10-13T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/balancing-protection-with-performance-to-double-down-on-ddos/</loc>
		<lastmod>2020-10-13T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-be-resilient-to-data-theft/</loc>
		<lastmod>2020-10-13T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/akamai-and-snyk-partnership-creates-a-powerful-combination-for-in-browser-script-protection/</loc>
		<lastmod>2020-10-13T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/api-discovery-and-profiling-visibility-to-protection/</loc>
		<lastmod>2020-10-13T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/akamais-polymorphic-ai-framework-preemptively-manages-bots/</loc>
		<lastmod>2020-10-13T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whats-new-in-services-and-support/</loc>
		<lastmod>2020-10-13T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-tool-kit-3/</loc>
		<lastmod>2020-10-13T21:20:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/from-the-experts-social-media-monitoring-and-dark-web-investigations/</loc>
		<lastmod>2020-10-13T22:25:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/vert-threat-alert-october-2020-patch-tuesday-analysis/</loc>
		<lastmod>2020-10-13T22:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/redirects-to-youtube-defacement-channel/</loc>
		<lastmod>2020-10-13T23:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/red-team-tactics-hiding-windows-services/</loc>
		<lastmod>2020-10-14T02:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/we-need-a-covid-phishing-vaccine-now/</loc>
		<lastmod>2020-10-14T06:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/lessons-from-teaching-cybersecurity-week-3/</loc>
		<lastmod>2020-10-14T06:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fortinet-awarded-cybersecurity-breakthrough-2020-professional-certification-program-of-the-year/</loc>
		<lastmod>2020-10-14T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/inconvenient-cybersecurity-policies-put-healthcare-organizations-at-risk/</loc>
		<lastmod>2020-10-14T07:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/do-families-need-parental-controls-avast/</loc>
		<lastmod>2020-10-14T09:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/sonicwall-vpn-portal-critical-flaw-cve-2020-5135/</loc>
		<lastmod>2020-10-14T10:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-the-pandemic-is-changing-cybercrime-2/</loc>
		<lastmod>2020-10-14T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/tala-wins-transaction-security-solution-of-the-year-in-2020-cybersecurity-breakthrough-awards/</loc>
		<lastmod>2020-10-14T11:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/can-hardware-security-modules-hsm-lower-your-insurance-costs/</loc>
		<lastmod>2020-10-14T11:43:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-the-pandemic-is-changing-cybercrime/</loc>
		<lastmod>2020-10-14T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/osquery-using-d-bus-to-query-systemd-data/</loc>
		<lastmod>2020-10-14T12:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/enzoic-wins-fraud-prevention-innovation-of-the-year-award-in-2020-cybersecurity-breakthrough-awards-program/</loc>
		<lastmod>2020-10-14T12:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/1touch-io-named-enterprise-risk-management-solution-of-the-year-by-2020-cybersecurity-breakthrough-awards/</loc>
		<lastmod>2020-10-14T12:56:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/gtacc-2020-virtual-conference/</loc>
		<lastmod>2020-10-14T13:18:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/manageengine-positioned-in-the-2020-gartner-magic-quadrant-for-it-service-management-tools/</loc>
		<lastmod>2020-10-14T13:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hot-off-the-press-veracode-named-a-2020-gartner-peer-insights-customers-choice-for-ast/</loc>
		<lastmod>2020-10-14T14:35:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/introducing-veracodes-new-partner-training-and-certification-paths/</loc>
		<lastmod>2020-10-14T14:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/covid-19-related-emails-remain-prevalent-in-phishing-campaigns/</loc>
		<lastmod>2020-10-14T14:04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ibm-integrates-data-security/</loc>
		<lastmod>2020-10-14T14:13:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Hackers-Sandbox.jpg</image:loc>
			<image:caption><![CDATA[IBM data security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/IBM-Cloud-Pak-for-Security-Diagram.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/dont-stop-risk-distancing-remote-work-is-here-to-stay/</loc>
		<lastmod>2020-10-14T14:22:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/just-what-cyber-security-executives-dont-want-to-hear-the-skills-shortage-is-worsening/</loc>
		<lastmod>2020-10-14T14:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/never-leave-your-cloud-database-publicly-accessible/</loc>
		<lastmod>2020-10-14T14:47:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/understanding-the-after-ransomware-helps-msps-protect-against-it/</loc>
		<lastmod>2020-10-14T14:47:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-splunk-add-ons-help-you-stop-playing-hide-and-seek-with-your-logs/</loc>
		<lastmod>2020-10-14T14:57:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/top-5-cybersecurity-frameworks-to-secure-your-organization/</loc>
		<lastmod>2020-10-14T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/colorful-street-life-in-london-before-crosswalks/</loc>
		<lastmod>2020-10-14T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/defense-spotlight-finding-hidden-windows-services/</loc>
		<lastmod>2020-10-14T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-philipp-krenns-secure-your-code-injections-and-logging/</loc>
		<lastmod>2020-10-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-automate-a-ransomware-response-in-5-steps/</loc>
		<lastmod>2020-10-14T16:45:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-election-screen-time/</loc>
		<lastmod>2020-10-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/voter-suppression-avast/</loc>
		<lastmod>2020-10-14T17:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/akamais-climate-leadership/</loc>
		<lastmod>2020-10-14T17:33:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/coinbit-seizure-why-new-cryptocurrency-exchanges-conduct-wash-trading/</loc>
		<lastmod>2020-10-15T07:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Stealing-Infrastructure.jpg</image:loc>
			<image:title><![CDATA[Stealing-Infrastructure]]></image:title>
			<image:caption><![CDATA[coinbit]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/coinbit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-pedro-umbelinos-joao-morais-android-bug-foraging/</loc>
		<lastmod>2020-10-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/building-an-information-security-program-post-breach-part-iii/</loc>
		<lastmod>2020-10-14T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-awareness-month-week-2-day-in-the-life-security-evangelist/</loc>
		<lastmod>2020-10-14T18:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/contrast-receives-4-8-5-0-in-2020-gartner-peer-insights-voice-of-the-customer-ast-customers-choice/</loc>
		<lastmod>2020-10-14T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/from-survival-to-security-and-availability/</loc>
		<lastmod>2020-10-14T19:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/not-prepared-for-2020-theres-another-election-soon-to-follow/</loc>
		<lastmod>2020-10-14T20:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-create-a-subdomain-enumeration-toolkit/</loc>
		<lastmod>2020-10-14T20:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-find-weak-passwords-in-your-organizations-active-directory/</loc>
		<lastmod>2020-10-14T20:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/java-ransomware-literally-not-even-your-coffee-maker-is-safe/</loc>
		<lastmod>2020-10-14T20:31:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-win-with-propaganda/</loc>
		<lastmod>2020-10-14T20:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/no-security-budget-5-technologies-to-sunset/</loc>
		<lastmod>2020-10-14T20:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whats-new-in-security-part-2/</loc>
		<lastmod>2020-10-14T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/akamai-drives-new-standards-and-enhances-authoritative-dns-and-load-balancing-services/</loc>
		<lastmod>2020-10-14T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whats-new-in-customer-identity-and-access-management/</loc>
		<lastmod>2020-10-14T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/better-together-akamai-enhances-zero-trust-network-access-with-crowdstrike/</loc>
		<lastmod>2020-10-14T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/akamai-enhances-its-cloud-secure-web-gateway-with-dlp-application-control-and-dns-over-tls-dot/</loc>
		<lastmod>2020-10-14T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/beyond-speed-and-reliability-security-is-a-new-differentiator/</loc>
		<lastmod>2020-10-14T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/nudata-recognized-for-innovation-in-identity-authentication-and-fraud-prevention-with-2020-cybersecurity-breakthrough-award/</loc>
		<lastmod>2020-10-14T21:16:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/perimeterx-named-cloud-security-startup-of-the-year-by-the-2020-cybersecurity-breakthrough-awards/</loc>
		<lastmod>2020-10-14T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/no-one-expects-fraud-will-happen-to-them-until-it-does/</loc>
		<lastmod>2020-10-14T22:44:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fake-stop-djvu-decryptor-malware-what-it-is-how-it-works-and-how-to-prevent-it/</loc>
		<lastmod>2020-10-14T22:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/managedmethods-named-data-security-solution-of-the-year-in-the-2020-cybersecurity-breakthrough-awards/</loc>
		<lastmod>2020-10-14T23:07:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/yes-we-can-validate-leaked-emails/</loc>
		<lastmod>2020-10-14T23:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/javascript-used-by-phishing-page-to-steal-magento-credentials/</loc>
		<lastmod>2020-10-15T00:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fbi-and-cisa-warning-iranian-threat-actor-is-exploiting-vpn-vulnerabilities/</loc>
		<lastmod>2020-10-15T02:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/protect-your-organization-from-mosaicregressor-and-other-uefi-implants/</loc>
		<lastmod>2020-10-15T03:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/magento-phishing-leverages-javascript-for-exfiltration/</loc>
		<lastmod>2020-10-15T03:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/local-government-secures-operations-from-data-center-to-cloud-with-the-fortinet-security-fabric/</loc>
		<lastmod>2020-10-15T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/training-to-help-you-transform-into-a-savvy-it-professional/</loc>
		<lastmod>2020-10-15T07:30:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-research-reveals-companies-are-losing-the-web-application-security-war/</loc>
		<lastmod>2020-10-15T07:33:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-far-does-endpoint-detection-and-response-edr-take-you-to-complete-threat-intelligence/</loc>
		<lastmod>2020-10-15T08:30:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pci-pal-wins-second-consecutive-cybersecurity-breakthrough-award/</loc>
		<lastmod>2020-10-15T08:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/sonrai-security-announces-20m-in-series-b-funding/</loc>
		<lastmod>2020-10-15T09:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/uaes-information-assurance-regulation-how-to-achieve-compliance/</loc>
		<lastmod>2020-10-15T09:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/is-the-cloud-safe-for-small-businesses-avast/</loc>
		<lastmod>2020-10-15T09:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-most-fowl/</loc>
		<lastmod>2020-10-15T10:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/unprecedented-number-of-cyberattacks-hit-uk-businesses-amid-pandemic-lockdown/</loc>
		<lastmod>2020-10-15T09:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/zero-trust-cybersecurity-for-k-12-school-districts/</loc>
		<lastmod>2020-10-15T11:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/interplanetary-storm-botnet-shows-signs-of-anonymization-purpose-proxy-for-hire-infrastructure/</loc>
		<lastmod>2020-10-15T11:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-achieve-balance-between-cybersecurity-and-the-user-experience/</loc>
		<lastmod>2020-10-15T12:56:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-pocket-guide-for-implementing-the-cis-security-controls/</loc>
		<lastmod>2020-10-15T11:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/domain-controller-patch-alert-vulnerability-grants-domain-admin-access-in-10-seconds/</loc>
		<lastmod>2020-10-15T12:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/protecting-driver-privacy-requires-a-root-of-trust/</loc>
		<lastmod>2020-10-15T12:16:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hashicorp-launches-open-source-identity-management-framework/</loc>
		<lastmod>2020-10-15T12:19:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Intent-Based-Security.jpg</image:loc>
			<image:title><![CDATA[networking]]></image:title>
			<image:caption><![CDATA[HashiCorp]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/Boundary_screenshot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/post-modern-computational-propaganda-avast/</loc>
		<lastmod>2020-10-15T12:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/e-voting-is-the-future-busting-myths-and-objections/</loc>
		<lastmod>2020-10-15T12:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/barnes-noble-cyberattack-may-have-exposed-personal-information-of-shoppers/</loc>
		<lastmod>2020-10-15T13:07:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/law-firm-seyfarth-shaw-hit-by-apparent-ransomware-attack/</loc>
		<lastmod>2020-10-15T13:14:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/tools-for-remote-team-management-communication-security-wordpress-businesses-should-use/</loc>
		<lastmod>2020-10-15T13:21:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/silent-librarian-apt-targeting-universities-with-spear-phishing-attacks/</loc>
		<lastmod>2020-10-15T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/barnes-noble-warns-customers-it-has-been-hacked-customer-data-may-have-been-accessed/</loc>
		<lastmod>2020-10-15T13:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/beware-covid-19-charity-fraudsters-warns-the-fbi/</loc>
		<lastmod>2020-10-15T13:32:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/its-time-to-address-the-growing-cybersecurity-skills-gap/</loc>
		<lastmod>2020-10-15T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/lorawan-mqtt-what-to-know-when-securing-your-iot-network/</loc>
		<lastmod>2020-10-15T14:02:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/essential-purchase-new-payment-options/</loc>
		<lastmod>2020-10-15T15:18:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/announcement-loginradius-simplifies-the-implementation-of-federated-sso-launches-federated-identity-management/</loc>
		<lastmod>2020-10-15T14:56:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/who-is-a-greater-security-threat-rogue-hackers-or-nation-states/</loc>
		<lastmod>2020-10-15T14:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecai-connected-recap-avast/</loc>
		<lastmod>2020-10-15T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-moat-is-gone-businesses-need-a-new-approach-to-protect-their-castles/</loc>
		<lastmod>2020-10-15T16:09:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/zoom-is-finally-testing-full-end-to-end-encryption/</loc>
		<lastmod>2020-10-15T15:26:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/japans-iot-scanning-project-looks-for-vulnerable-iot-devices/</loc>
		<lastmod>2020-10-15T15:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/source-1-vulnhub-ctf-walkthrough/</loc>
		<lastmod>2020-10-15T15:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/troystealer-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/</loc>
		<lastmod>2020-10-15T15:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/tcg-executive-director-stephanie-schultz-wins-a-2020-public-relations-and-marketing-excellence-award/</loc>
		<lastmod>2020-10-15T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/is-your-legacy-bot-management-vendor-forcing-you-to-change-heres-what-you-can-do/</loc>
		<lastmod>2020-10-15T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-paul-amars-stanislas-molveaus-turning-offsec-mindset-to-developers-toolset/</loc>
		<lastmod>2020-10-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/forescout-named-in-gartner-peer-insights-2020-customers-choice-and-voice-of-customer-report/</loc>
		<lastmod>2020-10-15T16:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/leave-no-apps-behind-extend-protection-from-legacy-to-cloud-to-containers/</loc>
		<lastmod>2020-10-15T16:22:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-build-an-application-in-minutes-with-aws-amplify/</loc>
		<lastmod>2020-10-15T16:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-address-the-large-and-growing-problem-of-cyberattacks-at-scale/</loc>
		<lastmod>2020-10-15T16:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mcafee-delivers-affordable-education-bundle-to-enhance-students-online-safety/</loc>
		<lastmod>2020-10-15T16:53:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-dialect-quiz/</loc>
		<lastmod>2020-10-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/community-detection-cve-2020-16898/</loc>
		<lastmod>2020-10-15T17:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-is-digital-risk-protection-2/</loc>
		<lastmod>2020-10-15T17:16:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mitigating-business-risks-in-your-5g-deployment/</loc>
		<lastmod>2020-10-15T17:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/whats-the-difference-of-vpns-and-desktop-sharing-for-remote-access/</loc>
		<lastmod>2020-10-15T17:44:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/sucuri-sit-down-episode-4-xss-wp-plugin-vulnerabilities-with-antony-garand/</loc>
		<lastmod>2020-10-15T17:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/microsoft-azure-administrator-certification-exam-az-104-domains-overview/</loc>
		<lastmod>2020-10-15T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-parsia-hakimians-localghost-escaping-the-browser-sandbox/</loc>
		<lastmod>2020-10-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-healthcare-organizations-need-to-know-about-cloud-drift/</loc>
		<lastmod>2020-10-15T19:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/webinar-recap-the-failed-promises-of-siem/</loc>
		<lastmod>2020-10-15T19:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/making-sca-part-of-your-ast-strategy/</loc>
		<lastmod>2020-10-15T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/breach-at-dickeys-bbq-smokes-3m-cards/</loc>
		<lastmod>2020-10-15T20:44:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/for-many-home-is-the-new-workplace-heres-some-practical-cybersecurity-advice/</loc>
		<lastmod>2020-10-15T20:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/moving-to-the-edge-an-outlook-into-a-new-era-of-computing/</loc>
		<lastmod>2020-10-15T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whats-next-in-security/</loc>
		<lastmod>2020-10-15T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/platform-update-highlights-for-ecommerce/</loc>
		<lastmod>2020-10-15T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whats-next-for-edge-delivery/</loc>
		<lastmod>2020-10-15T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/1touch-io-privacy-security-forum-fall-academy/</loc>
		<lastmod>2020-10-15T22:28:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/patch-tuesday-update-october-2020/</loc>
		<lastmod>2020-10-15T22:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/why-virtual-desktop-infrastructure-is-riskier-than-you-realize/</loc>
		<lastmod>2020-10-15T22:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-good-and-not-so-good-of-the-iot-cybersecurity-improvement-act-of-2020/</loc>
		<lastmod>2020-10-16T06:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/IoTSecurity-1.jpg</image:loc>
			<image:title><![CDATA[IoTSecurity]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/5-security-holes-revealed-in-cybersecurity-asset-management/</loc>
		<lastmod>2020-10-16T07:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Security-Strategies.jpg</image:loc>
			<image:title><![CDATA[Security-Strategies]]></image:title>
			<image:caption><![CDATA[asset management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/vulnerability-management-maturity-model-part-ii/</loc>
		<lastmod>2020-10-16T02:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fortinet-scores-highest-in-two-key-use-cases-in-2020-gartner-critical-capabilities-for-wan-edge-infrastructure-report/</loc>
		<lastmod>2020-10-16T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fortinet-ranks-highest-in-two-key-use-cases-in-2020-gartner-critical-capabilities-for-wan-edge-infrastructure-report/</loc>
		<lastmod>2020-10-16T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/facebook-to-stop-political-ads-post-election-avast/</loc>
		<lastmod>2020-10-16T10:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/sast-teaches-how-to-go-around-problems-not-fix-them/</loc>
		<lastmod>2020-10-16T11:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/dealing-with-data-glut-why-rot-data-is-an-issue-and-how-to-manage-it/</loc>
		<lastmod>2020-10-16T12:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/attackiq-named-one-of-the-2020-best-small-medium-workplaces-by-great-place-to-work-and-fortune/</loc>
		<lastmod>2020-10-16T12:09:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/credit-card-details-of-3-million-dickeys-bbq-customers-up-for-sale-on-dark-web-marketplace/</loc>
		<lastmod>2020-10-16T12:53:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-problem-with-traditional-threat-detection-and-response/</loc>
		<lastmod>2020-10-16T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/two-thirds-of-businesses-have-suffered-endpoint-and-iot-security-incidents-during-covid-19/</loc>
		<lastmod>2020-10-16T13:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/prepare-your-it-network-to-adapt-to-the-dual-workforce-model-virtual-seminar/</loc>
		<lastmod>2020-10-16T15:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-gartner-report-sheds-light-on-digital-transformation-strategies-in-a-postpandemic-world/</loc>
		<lastmod>2020-10-16T15:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/digital-independence-for-kids-avast/</loc>
		<lastmod>2020-10-16T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mamocrypt-ransomware-decryption-tool/</loc>
		<lastmod>2020-10-16T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-mehmet-d-inces-a-heaven-for-hackers-breaking-a-web-security-virtual-appliance/</loc>
		<lastmod>2020-10-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/watch-here-how-to-build-a-successful-appsec-program/</loc>
		<lastmod>2020-10-16T16:17:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/16-reasons-to-use-third-party-cloud-security-and-not-salesforce-shield/</loc>
		<lastmod>2020-10-16T16:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/having-saved-credit-card-details-in-plaintext-since-2015-british-airways-is-fined-20-million/</loc>
		<lastmod>2020-10-16T16:43:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/bleedingtooth-intel-discloses-early-angering-linux-lovers/</loc>
		<lastmod>2020-10-16T16:44:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/bleeding-tooth-bernypisa-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[bleeding-tooth--bernypisa--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Intel]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mcsweeney-soheil-rezayazdi-and-his-marvelously-nihilistic-password-security-questions/</loc>
		<lastmod>2020-10-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/trickbot-on-the-ropes-part-2-the-qqaazz-money-laundering-ring/</loc>
		<lastmod>2020-10-16T17:34:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/trickbot-on-the-ropes-microsofts-case-against-trickbot/</loc>
		<lastmod>2020-10-16T17:36:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-mario-areias-threat-modeling-the-death-star/</loc>
		<lastmod>2020-10-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pandemic-pushes-security-analysts-to-the-brink/</loc>
		<lastmod>2020-10-19T07:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/stressedout.jpg</image:loc>
			<image:title><![CDATA[stressedout]]></image:title>
			<image:caption><![CDATA[security analysts]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/u-s-federal-court-issues-restraining-order-against-tech-support-scheme/</loc>
		<lastmod>2020-10-16T18:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/synopsys-seeker-iast-wins-best-cloud-and-web-application-security-category-at-cybersecasia-awards/</loc>
		<lastmod>2020-10-16T18:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/win-kex-version-2-0-from-kali-linux/</loc>
		<lastmod>2020-10-16T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/kali-linux-2020-3-release-zsh-win-kex-hidpi-bluetooth-arsenal-from-kali-linux/</loc>
		<lastmod>2020-10-16T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/installing-the-remnux-virtual-appliance-for-malware-analysis/</loc>
		<lastmod>2020-10-16T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cyberweek-2020-speaker-slides/</loc>
		<lastmod>2020-10-16T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-i-learned-from-devsecops-leaders-in-a-high-tech-world/</loc>
		<lastmod>2020-10-16T20:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/split-second-phantom-images-fool-autopilots/</loc>
		<lastmod>2020-10-19T11:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/no-font-errors-mean-nothing-in-that-nypost-article/</loc>
		<lastmod>2020-10-16T21:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/weekly-news-roundup-october-12-16-2020/</loc>
		<lastmod>2020-10-17T02:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/no-thats-not-how-warrantee-expiration-works/</loc>
		<lastmod>2020-10-17T02:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-maddie-stones-whos-secure-whos-not-who-makes-that-choice/</loc>
		<lastmod>2020-10-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-chemist-eggs/</loc>
		<lastmod>2020-10-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-kelley-robinsons-2fa-in-2020-and-beyond/</loc>
		<lastmod>2020-10-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hundreds-of-live-phishing-sites-menacing-amazon-prime-day-shoppers/</loc>
		<lastmod>2020-10-17T20:36:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-jarrod-oversons-hackium-a-browser-for-web-hackers/</loc>
		<lastmod>2020-10-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/twitter-breaches-mfas-and-the-need-for-identity-proofing/</loc>
		<lastmod>2020-10-18T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/robert-m-lees-jeff-haas-little-bobby-comics-week-299/</loc>
		<lastmod>2020-10-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-fredrick-flee-lees-what-bruce-lee-can-teach-us-about-appsec/</loc>
		<lastmod>2020-10-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/trickbot-takedown-vpn-flaws-zoom-end-to-end-encryption/</loc>
		<lastmod>2020-10-19T04:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/qanon-8chan-sites-briefly-knocked-offline/</loc>
		<lastmod>2020-10-19T04:03:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/iot-devices-privacy-and-security-in-abusive-relationships/</loc>
		<lastmod>2020-10-19T04:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/3-zones-that-require-network-security-for-industrial-remote-access/</loc>
		<lastmod>2020-10-19T04:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/leveraging-security-to-capture-the-5g-business-market/</loc>
		<lastmod>2020-10-19T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/bridging-the-cybersecurity-skills-gap-with-robust-training-programs/</loc>
		<lastmod>2020-10-19T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-does-a-hacker-look-like/</loc>
		<lastmod>2020-10-19T08:30:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/still-looking-for-rasp-resources-sans-has-a-rasp-report/</loc>
		<lastmod>2020-10-19T08:35:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/iot-sex-toy-security-flaw-avast/</loc>
		<lastmod>2020-10-19T09:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/bbb-warns-of-health-insurance-open-enrollment-scams/</loc>
		<lastmod>2020-10-19T09:54:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-lessons-from-the-pandemic-plans-exercises-and-warnings/</loc>
		<lastmod>2020-10-19T10:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-professionals-feel-threatened-by-the-adoption-of-ai-and-automation-tools-survey-finds/</loc>
		<lastmod>2020-10-19T11:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/rapper-who-bragged-about-defrauding-us-cares-act-program-could-face-up-to-22-years-in-prison/</loc>
		<lastmod>2020-10-19T12:48:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/albion-online-gamers-told-to-change-passwords-following-forum-hack/</loc>
		<lastmod>2020-10-19T13:14:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xm-cyber-achieves-soc-2-type-ii-certification-for-second-consecutive-year/</loc>
		<lastmod>2020-10-19T13:22:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/can-edge-computing-exist-without-the-edge-part-1-the-edge/</loc>
		<lastmod>2020-10-19T14:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-cisos-guide-to-digital-transformation/</loc>
		<lastmod>2020-10-19T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/healthcare-elite-data/</loc>
		<lastmod>2020-10-19T14:51:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/04/sans-challenge-coins-the-ultimate-recognition-to-elite-cybersecurity-professionals/</loc>
		<lastmod>2020-10-19T14:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/thwarting-malware-attacks-with-bitglass/</loc>
		<lastmod>2020-10-19T14:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/lack-of-security-in-iot-devices-explained-what-can-we-do-about-it/</loc>
		<lastmod>2020-10-19T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/6-top-risk-factors-to-triage-vulnerabilities-effectively/</loc>
		<lastmod>2020-10-19T15:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/tackling-bias-in-ai-avast/</loc>
		<lastmod>2020-10-19T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/typo-1-vulnhub-ctf-walkthrough-part-1/</loc>
		<lastmod>2020-10-19T15:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/open-source-application-security-flaws-what-you-should-know-and-how-to-spot-them/</loc>
		<lastmod>2020-10-19T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-avoid-getting-locked-out-of-your-own-account-with-multi-factor-authentication/</loc>
		<lastmod>2020-10-19T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pci-dss-compliance-comes-under-the-spotlight-in-verizons-payment-security-report-2020/</loc>
		<lastmod>2020-10-19T15:54:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-david-waldrops-the-devops-and-agile-security-toolkit/</loc>
		<lastmod>2020-10-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/guest-essay-cyberxchange-presents-a-much-needed-platform-for-cybersecurity-purchases/</loc>
		<lastmod>2020-10-19T16:18:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/2020-el-ano-de-quiebre-para-la-ciberseguridad/</loc>
		<lastmod>2020-10-19T16:26:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/get-effective-devsecops-with-version-control/</loc>
		<lastmod>2020-10-19T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-importance-of-women-in-cybersecurity-for-innovation-investment-and-enrichment/</loc>
		<lastmod>2020-10-19T17:31:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cloudflare-unfurls-secure-network-as-a-service-platform/</loc>
		<lastmod>2020-10-19T16:55:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Endpoints-Entropy-Chaos.jpg</image:loc>
			<image:caption><![CDATA[Sumo Logic]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/CloudFlareScreen.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/CloudFlareNet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/adapt-to-change-network-policy-change-management-the-5-critical-success-factors-to-agile-nspm/</loc>
		<lastmod>2020-10-19T16:57:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-joy-of-tech-magsafe-meets-new-magsafe/</loc>
		<lastmod>2020-10-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-read-inclusion-vulnerability/</loc>
		<lastmod>2020-10-19T17:02:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/securing-devops-using-deception-and-denial/</loc>
		<lastmod>2020-10-20T07:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/canstockphoto9837967.jpg</image:loc>
			<image:title><![CDATA[canstockphoto9837967]]></image:title>
			<image:caption><![CDATA[DevOps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-cisos-role-in-improving-pci-dss-compliance/</loc>
		<lastmod>2020-10-20T06:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Exposing.jpg</image:loc>
			<image:title><![CDATA[Exposing]]></image:title>
			<image:caption><![CDATA[PCI DSS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-david-sopas-paulo-silvas-api-insecurity-top-10/</loc>
		<lastmod>2020-10-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/day-in-the-life-of-a-data-junkie/</loc>
		<lastmod>2020-10-19T19:17:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/dont-miss-these-top-rated-sans-summit-replays/</loc>
		<lastmod>2020-10-19T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/securing-internet-connected-devices-in-healthcare/</loc>
		<lastmod>2020-10-19T19:39:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/state-cios-lead-digital-transformation-during-the-pandemic/</loc>
		<lastmod>2020-10-19T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/directory-traversal-web-based-application-security-part-8/</loc>
		<lastmod>2020-10-19T20:48:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/verodin-latam-party-porto-alegre-brazil-by-brian-contos/</loc>
		<lastmod>2020-10-19T20:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/yubikey-pin-puk-configuration-at-scale/</loc>
		<lastmod>2020-10-19T20:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fake-image-detection/</loc>
		<lastmod>2020-10-19T21:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/yubikey-piv-certificate-slot-configuration/</loc>
		<lastmod>2020-10-19T22:25:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/can-i-use-nps-with-cloud-directories/</loc>
		<lastmod>2020-10-19T22:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/children-smartphones-and-the-surveillance-economy/</loc>
		<lastmod>2020-10-20T00:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-closer-look-at-the-attempted-ransomware-attack-on-tesla/</loc>
		<lastmod>2020-10-20T03:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/why-is-cyber-security-awareness-a-priority-in-organizations/</loc>
		<lastmod>2020-10-20T07:47:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/becybersmart-each-one-teach-one/</loc>
		<lastmod>2020-10-20T07:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/remote-access-shield-announcement-avast/</loc>
		<lastmod>2020-10-20T08:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cve-2020-2280-csrf-in-jenkins-warnings-plugin/</loc>
		<lastmod>2020-10-20T11:03:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/6-common-phishing-attacks-and-how-to-protect-against-them/</loc>
		<lastmod>2020-10-20T10:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-top-web-attacks-can-we-expect-in-the-new-owasp-top-10/</loc>
		<lastmod>2020-10-20T10:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-awareness-month-week-3-day-in-the-life-appsec-educator/</loc>
		<lastmod>2020-10-20T12:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ransomware-gang-donated-part-of-ransom-demands-to-charities/</loc>
		<lastmod>2020-10-20T12:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-is-a-firewall-definition-types-business-uses/</loc>
		<lastmod>2020-10-20T13:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/debug-your-python-functions-locally/</loc>
		<lastmod>2020-10-20T13:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/simplifying-o365-security-with-infocyte-coming-fall-2020/</loc>
		<lastmod>2020-10-20T14:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/your-ast-guide-for-the-disenchanted-part-5-2/</loc>
		<lastmod>2020-10-20T15:41:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/survey-reveals-7-out-of-10-people-will-avoid-christmas-shopping-with-brands-that-have-experienced-a-data-security-incident-in-the-last-year/</loc>
		<lastmod>2020-10-20T14:48:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-will-santa-shop-in-the-covid-19-era-pci-pal-study-shows-massive-shift-to-online-shopping-this-holiday-season/</loc>
		<lastmod>2020-10-20T14:53:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/financial-institutions-care-about-fast-deployments/</loc>
		<lastmod>2020-10-20T14:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/safeguarding-our-health-information-in-a-global-pandemic/</loc>
		<lastmod>2020-10-20T14:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/choosing-the-right-vpn-for-your-business/</loc>
		<lastmod>2020-10-20T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/5-best-practices-for-securing-privileged-access-and-identities-for-the-cloud-management-console/</loc>
		<lastmod>2020-10-20T15:53:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/microsoft-azure-job-outlook/</loc>
		<lastmod>2020-10-20T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cost-of-non-compliance-8-largest-data-breach-fines-and-penalties/</loc>
		<lastmod>2020-10-20T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/implementing-a-zero-trust-model-the-key-to-securing-microservices/</loc>
		<lastmod>2020-10-20T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-christian-schneiders-threagile-agile-threat-modeling/</loc>
		<lastmod>2020-10-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/5-steps-for-secure-malware-analysis/</loc>
		<lastmod>2020-10-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/crane-lifting-scala-onto-code-property-graph-to-conduct-vulnerability-analysis/</loc>
		<lastmod>2020-10-20T16:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/life-post-acquisition-a-people-centric-plan-to-get-you-total-data-security-a-lot-faster/</loc>
		<lastmod>2020-10-20T16:18:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/paypal-request-money-avast/</loc>
		<lastmod>2020-10-20T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/meet-the-underground-business-of-og-account-takeover-attacks/</loc>
		<lastmod>2020-10-20T16:35:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ad-ds-explained/</loc>
		<lastmod>2020-10-20T16:45:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-death-and-rebirth-of-musashi-js-or-how-i-turned-personal-failure-into-better-teaching-tools/</loc>
		<lastmod>2020-10-20T16:50:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-10000-hours/</loc>
		<lastmod>2020-10-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/saml-vs-ldap-access-protocol-comparison/</loc>
		<lastmod>2020-10-20T17:51:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/russian-gru-agents-indicted-for-hacking-multiple-targets/</loc>
		<lastmod>2020-10-20T17:56:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/gru-mil-ru-cc-by.jpg</image:loc>
			<image:title><![CDATA[gru--mil-ru--cc-by]]></image:title>
			<image:caption><![CDATA[GRU]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/building-a-more-complete-cloud-security-solution-from-a-casb-and-sase-perspective/</loc>
		<lastmod>2020-10-20T18:01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/eliminating-the-threat-of-look-alike-domains/</loc>
		<lastmod>2020-10-20T20:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/respond-software-embarks-on-fedramp-journey-to-drive-soc-automation-for-government-agencies-names-earthling-security-3pao-and-mssp/</loc>
		<lastmod>2020-10-20T20:31:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/processo-controle-comunicacao-ou-digitalops-como-manter-sua-empresa-segura-e-em-conformidade/</loc>
		<lastmod>2020-10-20T20:36:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-cybersecurity-skills-gap-is-swelling-at-a-frightening-pace/</loc>
		<lastmod>2020-10-20T21:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/okta-smartcard-authentication-expanded/</loc>
		<lastmod>2020-10-20T21:49:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-passpoint-solution-for-mac-randomization/</loc>
		<lastmod>2020-10-20T21:56:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/digital-skimming-the-lucrative-cybercrime/</loc>
		<lastmod>2020-10-20T21:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/2021-will-be-the-year-of-catch-up/</loc>
		<lastmod>2020-10-20T22:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/active-directory-explained/</loc>
		<lastmod>2020-10-20T23:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-choose-a-managed-cloud-pki/</loc>
		<lastmod>2020-10-20T23:23:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-is-a-tpm/</loc>
		<lastmod>2020-10-21T00:30:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/securing-your-online-store-for-the-holidays/</loc>
		<lastmod>2020-10-21T01:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-appsec-village-chloe-messdaghis-the-elephant-in-the-room-burnout/</loc>
		<lastmod>2020-10-21T06:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/your-ast-guide-for-the-disenchanted-part-5/</loc>
		<lastmod>2020-10-21T06:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fortiguard-labs-discovers-multiple-critical-vulnerabilities-in-multiple-adobe-products/</loc>
		<lastmod>2020-10-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fortinet-maintains-position-as-a-challenger-in-the-2020-gartner-magic-quadrant-for-web-application-firewalls/</loc>
		<lastmod>2020-10-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/is-telco-cybersecurity-the-new-competitive-edge-for-service-providers/</loc>
		<lastmod>2020-10-21T07:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hpsci-takes-misinformation-conspiracy-theories-hearing-online/</loc>
		<lastmod>2020-10-21T08:07:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Lies.jpg</image:loc>
			<image:title><![CDATA[Lies]]></image:title>
			<image:caption><![CDATA[misinformation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-tackle-the-5-biggest-enterprise-iot-security-challenges/</loc>
		<lastmod>2020-10-21T08:20:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Securing-IoT-Time.jpg</image:loc>
			<image:title><![CDATA[IoT]]></image:title>
			<image:caption><![CDATA[IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cve-2020-19447-sql-injection-on-joomlas-jdownloads-component/</loc>
		<lastmod>2020-10-21T09:22:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-future-of-customer-experience-depends-on-the-digital-assembly-line-and-data/</loc>
		<lastmod>2020-10-21T08:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/multi-factor-authentication-for-remote-desktop-gateway-and-rdp-connections/</loc>
		<lastmod>2020-10-21T10:01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cyber-threats-technology-tips-that-your-business-cant-ignore/</loc>
		<lastmod>2020-10-21T11:25:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/more-effective-security-awareness-3-tips-for-ncsam/</loc>
		<lastmod>2020-10-21T11:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/honeypot-network-forensics-2/</loc>
		<lastmod>2020-10-21T12:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/surprise-phishing-tests-using-file-attachments-have-highest-rate-of-failure/</loc>
		<lastmod>2020-10-21T11:55:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/1touch-io-inventa-tames-pii-data-discovery-and-classification-with-supervised-ai/</loc>
		<lastmod>2020-10-21T12:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/keeping-hr-data-secure-in-a-time-of-data-breaches/</loc>
		<lastmod>2020-10-22T07:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Age-Of-Collaboration.jpg</image:loc>
			<image:title><![CDATA[Age-Of-Collaboration]]></image:title>
			<image:caption><![CDATA[HR data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/from-google-cloud-blog-improving-security-compliance-and-governance-with-cloud-based-dlp-data/</loc>
		<lastmod>2020-10-21T12:13:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/talking-online-safety-with-kids-avast/</loc>
		<lastmod>2020-10-21T12:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/honeypot-network-forensics/</loc>
		<lastmod>2020-10-21T12:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/84-of-security-and-development-professionals-believe-security-champions-programs-can-improve-relationship-between-security-and-devops-teams/</loc>
		<lastmod>2020-10-21T13:04:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/enhancing-visibility-with-bitglass-and-splunk/</loc>
		<lastmod>2020-10-21T13:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/brand-impersonation-attacks-targeting-smb-organizations/</loc>
		<lastmod>2020-10-21T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-use-the-nice-cybersecurity-workforce-framework-to-plan-career-progression-a-practitioners-guide/</loc>
		<lastmod>2020-10-21T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/2020-verizon-data-breach-investigations-report-summary-and-key-findings-for-security-professionals/</loc>
		<lastmod>2020-10-21T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-spin-up-a-robust-byod-security-strategy-for-your-growing-remote-workforce/</loc>
		<lastmod>2020-10-21T14:25:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/discord-squashes-critical-electron-bugs-open-source-attacks-continue-to-grow/</loc>
		<lastmod>2020-10-21T14:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/montreal-public-transport-agency-discloses-ransomware-attack/</loc>
		<lastmod>2020-10-21T14:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/akamai-named-gartner-magic-quadrant-leader-for-fourth-consecutive-year/</loc>
		<lastmod>2020-10-21T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/sophisticated-phishing/</loc>
		<lastmod>2020-10-21T15:31:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/empower-through-design-making-technology-inherently-safer/</loc>
		<lastmod>2020-10-21T15:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/4-approaches-to-securing-containerized-applications/</loc>
		<lastmod>2020-10-21T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-mo-alis-amy-abernethys-fireside-chat/</loc>
		<lastmod>2020-10-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/imperva-a-seven-time-magic-quadrant-leader-and-named-highest-for-completeness-of-vision-for-waf/</loc>
		<lastmod>2020-10-21T16:10:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-joy-of-tech-battered-birds/</loc>
		<lastmod>2020-10-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-katie-doroschaks-porcupine-rapid-robust-tagging-with-dna/</loc>
		<lastmod>2020-10-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/iam-101-series-what-are-directory-services/</loc>
		<lastmod>2020-10-21T18:02:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cyber-risk-management-protecting-data-infrastructure-and-people/</loc>
		<lastmod>2020-10-21T18:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/digital-identity-its-just-business-as-usual-3/</loc>
		<lastmod>2020-10-21T18:31:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/appsec-decoded-the-security-dilemma-of-iot-devices/</loc>
		<lastmod>2020-10-21T18:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-big-lie-in-threat-hunting/</loc>
		<lastmod>2020-10-21T19:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/signal-sciences-recognized-as-a-visionary-in-gartner-magic-quadrant-for-web-application-firewalls-two-years-in-a-row/</loc>
		<lastmod>2020-10-21T20:05:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/managedmethods-recognized-as-the-education-cloud-based-solution-gold-winner-in-the-2020-golden-bridge-awards/</loc>
		<lastmod>2020-10-21T20:09:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/delphix-partner-spotlight-on-orasi/</loc>
		<lastmod>2020-10-21T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/25-cves-that-nsa-want-you-to-patch-right-now/</loc>
		<lastmod>2020-10-22T01:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-quick-glance-at-cross-origin-resource-sharing-security-headers/</loc>
		<lastmod>2020-10-22T02:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/proud-boys-emails-are-bogus/</loc>
		<lastmod>2020-10-22T04:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-5-best-ways-to-handle-sensitive-data/</loc>
		<lastmod>2020-10-22T06:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/problem-solving-lessons-from-teaching-cybersecurity-week-4/</loc>
		<lastmod>2020-10-22T06:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/leveraging-fortisiem-6-1-with-ueba-analytics-to-monitor-remote-endpoints/</loc>
		<lastmod>2020-10-22T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hottest-11-cybersecurity-certifications/</loc>
		<lastmod>2020-10-22T07:34:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/get-a-security-boost-from-cybersecurity-awareness-month/</loc>
		<lastmod>2020-10-22T08:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/lets-build-a-high-performance-fuzzer-with-gpus/</loc>
		<lastmod>2020-10-22T10:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/trickbot-botnet-update-avast/</loc>
		<lastmod>2020-10-22T10:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/four-ways-to-provide-better-faster-and-safer-digital-healthcare-2/</loc>
		<lastmod>2020-10-22T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/getting-started-with-a-k-12-nist-cybersecurity-framework/</loc>
		<lastmod>2020-10-22T11:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/over-one-million-wordpress-sites-receive-forced-update-to-security-plugin-after-severe-vulnerability-discovered/</loc>
		<lastmod>2020-10-22T11:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/doj-says-iran-targeted-american-voters-with-threatening-emails/</loc>
		<lastmod>2020-10-22T11:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/financial-crimes-investigation-survey-shows-analysts-hobbled-by-own-firms/</loc>
		<lastmod>2020-10-22T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/four-ways-to-provide-better-faster-and-safer-digital-healthcare/</loc>
		<lastmod>2020-10-22T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/wordpress-debug-how-to-enable-it-debugging-options/</loc>
		<lastmod>2020-10-22T12:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/10-network-tools-every-it-admin-needs/</loc>
		<lastmod>2020-10-22T12:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cve-2020-13166-mylittleadmin-preauth-rce/</loc>
		<lastmod>2020-10-22T13:25:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/managing-adc-licenses-in-the-age-of-the-cloud/</loc>
		<lastmod>2020-10-22T12:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-the-hr-system-enabled-my-promotion-to-ceo/</loc>
		<lastmod>2020-10-22T12:29:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/keyfactor-virtual-summit-day-1-recap/</loc>
		<lastmod>2020-10-22T12:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/crimeops-of-the-kashmirblack-botnet-part-i/</loc>
		<lastmod>2020-10-22T13:07:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/typo-1-vulnhub-ctf-walkthrough-part-2/</loc>
		<lastmod>2020-10-22T13:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/reactive-vs-proactive-security-three-benefits-of-a-proactive-cybersecurity-strategy/</loc>
		<lastmod>2020-10-22T13:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/axis-security-names-new-channel-leader/</loc>
		<lastmod>2020-10-27T12:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-the-cloud-could-improve-vendor-access-management/</loc>
		<lastmod>2020-10-23T07:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Software-Defined-Perimeter.jpg</image:loc>
			<image:caption><![CDATA[vendor access management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/dig-into-application-data-with-thundra-queries/</loc>
		<lastmod>2020-10-22T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/five-attack-scenarios-that-could-alter-the-u-s-election/</loc>
		<lastmod>2020-10-22T14:37:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/multi-factor-authentication-is-multi-faceted/</loc>
		<lastmod>2020-10-22T14:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/5-ways-to-protect-online-learning-environments/</loc>
		<lastmod>2020-10-23T06:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/onlinelearning.jpg</image:loc>
			<image:title><![CDATA[onlinelearning]]></image:title>
			<image:caption><![CDATA[online learning]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/lnkr-continues-attacks-into-the-holiday-season/</loc>
		<lastmod>2020-10-22T15:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-michelle-holkos-digital-health-tech-in-nih-all-of-us-research-program/</loc>
		<lastmod>2020-10-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/25-cves-that-nsa-wants-you-to-patch-right-now/</loc>
		<lastmod>2020-10-22T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-big-lie-in-threat-hunting-2/</loc>
		<lastmod>2020-10-22T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/patch-tuesday-update-october-2020-2/</loc>
		<lastmod>2020-10-22T16:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/security-awareness-training-how-often-should-your-employees-get-retrained-2/</loc>
		<lastmod>2020-10-22T16:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/employee-spotlight-ramith-padaki-machine-learning-engineer-2/</loc>
		<lastmod>2020-10-22T16:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-national-security-agencys-central-security-services-warning-chinese-state-sponsored-malicious-cyber-actors-exploiting-25-cves/</loc>
		<lastmod>2020-10-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/venafi-research-machine-identity-attack-surface-growing-exponentially/</loc>
		<lastmod>2020-10-22T17:07:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/heres-whats-driving-the-rise-in-cloud-workload-cyber-threats/</loc>
		<lastmod>2020-10-22T17:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pfizer-suffers-huge-data-breach-on-unsecured-cloud-storage/</loc>
		<lastmod>2020-10-22T17:30:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-khatuna-mshvidobadzes-russian-cyber-threats-in-pandemic-era/</loc>
		<lastmod>2020-10-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/digicert-secure-software-manager-modernizes-pki-automation-to-enable-frictionless-secure-code-signing-private-key-management/</loc>
		<lastmod>2020-10-22T18:24:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/using-splunk-enterprise-security-to-look-for-zerologon-exploit-attempts/</loc>
		<lastmod>2020-10-22T18:46:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/crimeops-of-the-kashmirblack-botnet-part-ii/</loc>
		<lastmod>2020-10-22T18:55:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/stuck-inside-the-world-turns-to-online-gaming/</loc>
		<lastmod>2020-10-22T20:02:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ramp-up-container-security-with-red-hat-openshift-and-cyberark/</loc>
		<lastmod>2020-10-22T20:20:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/metrics-that-matter-measuring-streaming-performance/</loc>
		<lastmod>2020-10-22T20:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hacker-valley-studio-100th-episode/</loc>
		<lastmod>2020-10-22T20:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-now-defunct-firms-behind-8chan-qanon/</loc>
		<lastmod>2020-10-22T21:48:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-its-like-to-completely-change-careers-midway/</loc>
		<lastmod>2020-10-23T00:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/why-more-cybersecurity-threats-since-wfh/</loc>
		<lastmod>2020-10-23T00:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/eating-our-own-cooking-at-contrast-securing-and-protecting-teamserver/</loc>
		<lastmod>2020-10-23T02:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/r_evil-wordpress-hacktool-malicious-javascript-injections/</loc>
		<lastmod>2020-10-23T03:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fortinet-ensures-secure-cloud-migration-for-european-real-estate-company/</loc>
		<lastmod>2020-10-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cve-2020-10714-wildfly-elytron-session-fixation-when-using-form-authentication/</loc>
		<lastmod>2020-10-23T08:27:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/efficient-audits-with-machine-learning-and-slither-simil/</loc>
		<lastmod>2020-10-23T11:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/uptime-monitoring-a-boon-for-your-business/</loc>
		<lastmod>2020-10-23T12:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/confluera-xdr-2-0-revolutionizes-detection-and-response-for-cloud-workloads/</loc>
		<lastmod>2020-10-23T12:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/is-black-friday-a-thing-of-the-past-not-for-mobile/</loc>
		<lastmod>2020-10-23T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/atomicorp-estatespace-join-forces-with-runsafe-security-to-supercharge-cyber-defenses/</loc>
		<lastmod>2020-10-27T13:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-report-on-police-decryption-capabilities/</loc>
		<lastmod>2020-10-23T13:47:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-5-step-process-for-nearly-anything/</loc>
		<lastmod>2020-10-23T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/nsa-top-secret-history-of-computer-security/</loc>
		<lastmod>2020-10-23T14:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mission-accepted-respond-software-joins-splunk-in-quest-to-deliver-the-modern-soc/</loc>
		<lastmod>2020-10-23T15:21:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-anthony-difrancos-hacking-the-insulin-supply-chain/</loc>
		<lastmod>2020-10-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-attackiq-solution-integrates-with-microsoft-azure-sentinel-to-strengthen-cyber-threat-detection-and-investigation-for-security-customers/</loc>
		<lastmod>2020-10-27T12:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-worst-ladder/</loc>
		<lastmod>2020-10-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/edtech-magazine-best-practices-for-securing-your-online-classrooms/</loc>
		<lastmod>2020-10-23T17:12:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/winning-the-battle-against-blended-threats/</loc>
		<lastmod>2020-10-23T17:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/planetary-reef-cybercriminal-hosting-and-phishing-as-a-service-threat-actor/</loc>
		<lastmod>2020-10-23T17:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-dena-medelsohns-jen-goldsacks-redefining-patient-safety/</loc>
		<lastmod>2020-10-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/weekly-news-roundup-october-19-23-2020/</loc>
		<lastmod>2020-10-23T18:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fake-news-trumps-twitter-twice-hacked/</loc>
		<lastmod>2020-10-23T18:36:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/fake-news-matt-johnson-cc-by-Copy.jpg</image:loc>
			<image:title><![CDATA[fake-news--matt-johnson--cc-by - Copy]]></image:title>
			<image:caption><![CDATA[hacked]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/f5-networks-extends-aws-alliance-to-address-cdn-security/</loc>
		<lastmod>2020-10-23T18:49:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Netography-Leverages-Software.jpg</image:loc>
			<image:title><![CDATA[Netography-Leverages-Software]]></image:title>
			<image:caption><![CDATA[f5]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/F5Diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/seis-pasos-para-implementar-una-solucion-de-seguridad-informatica-efectiva-en-una-startup/</loc>
		<lastmod>2020-10-23T19:06:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-key-to-securing-your-post-pandemic-network/</loc>
		<lastmod>2020-10-23T19:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-a-hospital-ransomware-attack-created-a-global-cyber-alliance/</loc>
		<lastmod>2020-10-23T19:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/detecting-ransomware-three-research-based-recommendations/</loc>
		<lastmod>2020-10-23T19:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/building-cyber-citizens-in-a-remote-workforce/</loc>
		<lastmod>2020-10-23T19:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-ironlens-october-cyoc-report/</loc>
		<lastmod>2020-10-23T19:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-call-for-unity-in-cybersecurity/</loc>
		<lastmod>2020-10-23T19:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/cybersecurity-awareness-month/</loc>
		<lastmod>2020-10-23T19:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/managing-third-party-service-provider-risk/</loc>
		<lastmod>2020-10-23T19:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-are-living-off-the-land-attacks/</loc>
		<lastmod>2020-10-23T19:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/what-september-11th-2001-teaches-us-about-today/</loc>
		<lastmod>2020-10-23T19:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/keyfactor-virtual-summit-day-2-recap/</loc>
		<lastmod>2020-10-23T20:03:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/five-worthy-reads-preparing-an-incident-response-plan-for-the-pandemic-and-beyond/</loc>
		<lastmod>2020-10-23T20:05:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/considerations-for-starting-a-nist-csf-assessment/</loc>
		<lastmod>2020-10-23T20:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/gadsden-county-public-schools-secures-google-workspace-for-education-with-managedmethods/</loc>
		<lastmod>2020-10-23T20:30:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/casos-de-uso-de-seguridad-informatica-para-mejorar-la-gestion-de-la-fuerza-de-trabajo-remota/</loc>
		<lastmod>2020-10-23T20:40:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/women-in-business-during-covid-19-avast/</loc>
		<lastmod>2020-10-23T21:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/qanons-path-from-fringe-to-mainstream-avast/</loc>
		<lastmod>2020-10-23T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hackers-target-distance-learning-systems-avast/</loc>
		<lastmod>2020-10-23T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/shared-principles-between-real-world-viruses-and-cyber-viruses-avast/</loc>
		<lastmod>2020-10-23T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybercrime-its-not-about-how-but-why/</loc>
		<lastmod>2020-10-23T22:01:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/centralize-and-automate-your-appsec-or-risk-being-buried-alive/</loc>
		<lastmod>2020-10-24T01:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/manage-your-palo-alto-network-ngfw-policies-with-app-id-content-id-user-id-and-more-with-tufin/</loc>
		<lastmod>2020-10-24T02:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/googles-certificate-authority-as-a-service-x-appviewx-a-future-fit-solution-for-the-enterprise/</loc>
		<lastmod>2020-10-24T05:56:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-meg-doerrs-cybersecurity-informed-consent-4-medical-devices/</loc>
		<lastmod>2020-10-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-joy-of-tech-google-needs-apple/</loc>
		<lastmod>2020-10-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-sarah-blossoms-institutional-review-board-for-biohackers/</loc>
		<lastmod>2020-10-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/end-that-zoom-call-and-take-a-step-back/</loc>
		<lastmod>2020-10-25T03:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-vulnerable-is-critical-infrastructure-to-a-cyberattack/</loc>
		<lastmod>2020-10-25T11:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-veronica-schmitts-medical-tech-how-do-we-unfck-things/</loc>
		<lastmod>2020-10-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/robert-m-lees-jeff-haas-little-bobby-comics-week-300/</loc>
		<lastmod>2020-10-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-lucia-c-savages-whats-up-with-proposed-privacy-legislation/</loc>
		<lastmod>2020-10-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/state-and-local-cybersecurity-defending-our-communities-from-cyber-threats-amid-covid-19/</loc>
		<lastmod>2020-10-25T18:56:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/inside-the-dojs-indictments-for-cyber-meddling/</loc>
		<lastmod>2020-10-26T06:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Dumb-Privacy-Rules.jpg</image:loc>
			<image:caption><![CDATA[GRU]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/beware-of-zerologon-vulnerabilities-in-windows-server/</loc>
		<lastmod>2020-10-26T07:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Fileless-Malware-RSAC.jpg</image:loc>
			<image:caption><![CDATA[Zerologon]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-25-at-7.38.50-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/why-biden-principle-over-party/</loc>
		<lastmod>2020-10-26T01:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/imsi-catchers-from-canada/</loc>
		<lastmod>2020-10-26T11:53:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/10-women-in-cybersecurity-you-should-follow/</loc>
		<lastmod>2020-10-26T04:34:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/voter-privacy-and-the-us-election/</loc>
		<lastmod>2020-10-26T04:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hipaa-breach-notification-what-you-need-to-know/</loc>
		<lastmod>2020-10-26T05:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/australia-proposes-security-law-to-protect-critical-infrastructure-against-cyber-attacks/</loc>
		<lastmod>2020-10-26T05:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-importance-of-good-cyber-hygiene-now-more-than-ever/</loc>
		<lastmod>2020-10-26T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/remote-recruitment-7-strategies-for-getting-it-right/</loc>
		<lastmod>2020-10-26T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/partnering-with-itdrc-to-support-disaster-relief-efforts/</loc>
		<lastmod>2020-10-26T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/hiring-tips-for-cisos-looking-to-fill-critical-cybersecurity-roles/</loc>
		<lastmod>2020-10-26T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/more-details-on-the-nist-sp800-53-revision-5-finalized-security-and-privacy-framework/</loc>
		<lastmod>2020-10-26T07:12:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cve-2020-2241-cross-site-request-forgery-csrf-vulnerability-in-jenkins-database-plugin-1-6/</loc>
		<lastmod>2020-10-26T08:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/law-firms-risk-of-emotet-malware-infection/</loc>
		<lastmod>2020-10-26T12:33:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cyberattacks-evolve-as-the-hospitality-and-travel-industry-adapts/</loc>
		<lastmod>2020-10-26T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xm-cyber-and-cyber-guards-work-together-to-deliver-unparalleled-cyber-security-assessments-risk-management-and-incident-response/</loc>
		<lastmod>2020-10-26T13:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-nlp-is-transforming-cyber-risk-and-compliance/</loc>
		<lastmod>2020-10-26T13:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cyber-awareness-training-a-must-for-third-party-contractors/</loc>
		<lastmod>2020-10-27T06:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Rules-of-Engagement.jpg</image:loc>
			<image:caption><![CDATA[contractors]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/defense-contractors-and-cmmc-compliance-14-important-questions-and-answers/</loc>
		<lastmod>2020-10-26T14:06:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ransomwares-next-target-backup-data/</loc>
		<lastmod>2020-10-27T07:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/ransomware.jpg</image:loc>
			<image:title><![CDATA[ransomware]]></image:title>
			<image:caption><![CDATA[ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/are-your-corporate-devices-browsing-tiktok-just-asq-armis/</loc>
		<lastmod>2020-10-26T14:33:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/are-your-corporate-devices-connecting-to-tiktok-just-asq-armis/</loc>
		<lastmod>2020-10-26T14:33:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/vulnerability-management-the-keystone-of-cybersecurity-infrastructure-by-frost-sullivan/</loc>
		<lastmod>2020-10-26T14:47:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-future-often-looks-silly/</loc>
		<lastmod>2020-10-26T14:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/accelerating-security-and-the-cloud-with-bitglass-and-aws-global-accelerator/</loc>
		<lastmod>2020-10-26T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-bryson-borts-medics/</loc>
		<lastmod>2020-10-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/increases-in-complexity-and-rates-of-change-driving-costs-risk-for-enterprise-network-security-infrastructure-aberdeen-group-research-reveals/</loc>
		<lastmod>2020-10-26T16:23:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-data-foundation-you-need-for-open-banking-compliance/</loc>
		<lastmod>2020-10-26T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/web-application-security-testing-in-an-agile-software-development-life-cycle-a-technical-case-study/</loc>
		<lastmod>2020-10-26T16:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-curbside/</loc>
		<lastmod>2020-10-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/4-tips-for-a-great-ciam-rfp/</loc>
		<lastmod>2020-10-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/veracode-state-of-software-security-half-of-application-security-flaws-remain-open-six-months-after-discovery-apps-with-technical-debt-take-two-times-as-long-to-fix/</loc>
		<lastmod>2020-10-27T12:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-malware-apps-on-google-play-avast/</loc>
		<lastmod>2020-10-26T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-mitchell-parker-panel-advancing-medical-device-security/</loc>
		<lastmod>2020-10-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/open-source-security-foundation-announces-education-courses-and-participation-initiatives-to-advance-its-commitment-to-securing-the-worlds-software-infrastructure/</loc>
		<lastmod>2020-10-29T15:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-future-of-connected-devices/</loc>
		<lastmod>2020-10-26T19:07:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-4-strategic-goals-behind-recent-iranian-cyber-attacks/</loc>
		<lastmod>2020-10-26T19:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/russian-cyber-attack-campaigns-and-actors/</loc>
		<lastmod>2020-10-26T19:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/password-security-password-managers/</loc>
		<lastmod>2020-10-26T19:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/do-your-part-becybersmart/</loc>
		<lastmod>2020-10-26T20:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/block-youtube-on-school-devices-avast/</loc>
		<lastmod>2020-10-26T21:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/myth-4-real-time-visibility-is-impossible/</loc>
		<lastmod>2020-10-26T21:47:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pen-test-discount/</loc>
		<lastmod>2020-10-26T22:45:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/google-mending-another-crack-in-widevine/</loc>
		<lastmod>2020-10-26T23:54:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/p-a-s-fork-v-1-0-a-web-shell-revival/</loc>
		<lastmod>2020-10-27T00:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-tech-companies-need-to-know-about-the-safe-data-act/</loc>
		<lastmod>2020-10-27T01:52:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/sonrai-security-raises-20m-to-uncover-and-map-cloud-platform-security-risks/</loc>
		<lastmod>2020-10-27T02:02:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/public-cloud-security-company-sonrai-security-raises-20-million/</loc>
		<lastmod>2020-10-27T02:13:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cloud-security-start-up-with-irish-co-founder-bags-20m-funding/</loc>
		<lastmod>2020-10-27T02:21:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whats-new-in-gartners-hype-cycle-for-cloud-security-2020-2/</loc>
		<lastmod>2020-10-27T02:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/targeted-attacks-part-3-the-exploit/</loc>
		<lastmod>2020-10-27T04:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/old-story-leaked-voter-records/</loc>
		<lastmod>2020-10-27T06:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fortinet-announces-new-secure-sd-wan-appliance-for-large-complex-wan-deployments/</loc>
		<lastmod>2020-10-27T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/improving-on-the-typical-siem-model/</loc>
		<lastmod>2020-10-27T07:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-best-secure-the-industrial-network-for-emea-organizations/</loc>
		<lastmod>2020-10-27T08:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pci-pal-achieves-mitel-developer-partner-certification/</loc>
		<lastmod>2020-10-27T09:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/acunetix-named-an-october-2020-gartner-peer-insights-customers-choice-for-application-security-testing/</loc>
		<lastmod>2020-10-27T10:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/5g-security-iot-asavie-and-akamai/</loc>
		<lastmod>2020-10-27T12:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/forgerock-remarks-on-the-court-of-justice-of-the-european-unions-ruling-on-transfers-of-personal-data/</loc>
		<lastmod>2020-10-27T11:25:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cve-2020-11984-apache-http-server-2-4-32-to-2-4-44-mod_proxy_uwsgi-info-disclosure-and-possible-rce/</loc>
		<lastmod>2020-10-27T12:31:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/osint-gathering-key-to-keeping-up-with-financial-crime/</loc>
		<lastmod>2020-10-27T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/introducing-vantage-our-new-saas-product-for-ot-iot-security/</loc>
		<lastmod>2020-10-27T12:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/2020-us-election-security-is-paramount/</loc>
		<lastmod>2020-10-27T12:07:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/7-common-data-misconfigurations-for-google-cloud-platform/</loc>
		<lastmod>2020-10-27T12:48:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/amazon-discloses-security-incident-involving-customers-email-addresses/</loc>
		<lastmod>2020-10-27T12:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/akamai-edge-cloud-scaling-iot-part-1/</loc>
		<lastmod>2020-10-27T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/sooty-a-soc-analysts-tool-part-i/</loc>
		<lastmod>2020-10-27T13:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/rangeforce-and-7-eagle-group-join-forces-to-boost-veterans-hands-on-cybersecurity-skills/</loc>
		<lastmod>2020-10-27T13:41:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/va-high-court-license-plate-database-not-personal-data/</loc>
		<lastmod>2020-10-28T06:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/licenseplates.jpg</image:loc>
			<image:title><![CDATA[licenseplates]]></image:title>
			<image:caption><![CDATA[personal data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pci-compliance-numbers-drop-as-security-breaches-increase/</loc>
		<lastmod>2020-10-27T13:55:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/adopting-observability-to-pull-yourself-out-of-the-pits-of-serverless-anti-patterns/</loc>
		<lastmod>2020-10-27T13:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-the-past-6-months-have-shaped-ics-risk/</loc>
		<lastmod>2020-10-28T07:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Digital-Transformation-Security.jpg</image:loc>
			<image:title><![CDATA[Digital-Transformation-Security]]></image:title>
			<image:caption><![CDATA[ICS Risk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/are-we-approaching-an-american-political-stress-revolution/</loc>
		<lastmod>2020-10-27T14:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-design-with-humans-in-mind-adding-automation-and-color-coding-to-the-it-workflow/</loc>
		<lastmod>2020-10-27T14:48:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/whats-inside-tufin-r20-2-enhanced-ngfw-support-azure-visibility-and-doubled-risk-analysis/</loc>
		<lastmod>2020-10-27T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/heres-why-we-need-to-stay-safe-in-the-new-contactless-economy/</loc>
		<lastmod>2020-10-27T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/not-so-random-using-ld_preload-to-hijack-the-rand-function/</loc>
		<lastmod>2020-10-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/refactoring-a-live-saas-environment/</loc>
		<lastmod>2020-10-27T15:17:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-guide-for-multi-cloud-ssh-key-management-keyfactor/</loc>
		<lastmod>2020-10-27T15:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/announcing-the-11th-volume-of-our-state-of-software-security-report/</loc>
		<lastmod>2020-10-27T15:33:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/connectivity-counts-why-smaller-fsis-worry-about-secure-remote-access/</loc>
		<lastmod>2020-10-27T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/introducing-axios-most-popular-free-assessment-tools/</loc>
		<lastmod>2020-10-27T15:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-awareness-month-week-4-day-in-the-life-software-developer/</loc>
		<lastmod>2020-10-27T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-diabetes-panel/</loc>
		<lastmod>2020-10-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/akamai-edge-cloud-scaling-iot-part-2/</loc>
		<lastmod>2020-10-27T16:06:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/2020-ddos-extortion-campaign-a-sequel-more-thrilling-than-the-original/</loc>
		<lastmod>2020-10-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-era-of-digital-transformation-building-a-privacy-and-security-practice-in-the-ever-changing-landscape/</loc>
		<lastmod>2020-10-27T16:19:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/shine-theory-devops-community/</loc>
		<lastmod>2020-10-27T16:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/red-canary-enters-cloud-workload-protection-space-launches-red-canary-cloud-workload-protection/</loc>
		<lastmod>2020-10-27T16:45:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/nozomi-networks-pioneers-saas-security-and-visibility-solution-for-dynamic-iot-and-ot-networks/</loc>
		<lastmod>2020-10-27T16:46:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/data-exfiltration-via-ipv6-avast/</loc>
		<lastmod>2020-10-27T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-joy-of-tech-meds-for-surviving-the-us-election/</loc>
		<lastmod>2020-10-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/polarproxy-in-podman-2/</loc>
		<lastmod>2020-10-27T18:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/su-lista-de-verificacion-de-seguridad-informatica-para-volver-a-la-oficina/</loc>
		<lastmod>2020-10-27T17:46:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/top-7-online-courses-for-a-successful-career-in-cybersecurity/</loc>
		<lastmod>2020-10-27T17:52:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-yong-bee-lims-understanding-diybio-and-community-labs/</loc>
		<lastmod>2020-10-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/polarproxy-in-podman/</loc>
		<lastmod>2020-10-27T18:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/therapy-center-hacked-40000-patients-sent-ransom-demands/</loc>
		<lastmod>2020-10-27T18:37:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/ville-tapio-vastaamo.jpg</image:loc>
			<image:title><![CDATA[ville-tapio--vastaamo]]></image:title>
			<image:caption><![CDATA[hacked]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-cmmc-measures-up-to-other-compliance-frameworks/</loc>
		<lastmod>2020-10-27T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/top-10-cyber-threats-to-private-5g-lte-networks/</loc>
		<lastmod>2020-10-27T20:15:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/avast-earns-best-consumer-anti-malware-award-avast/</loc>
		<lastmod>2020-10-27T20:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/guide-your-digital-native-children-with-tech-avast/</loc>
		<lastmod>2020-10-27T20:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/getting-started-with-bot-management/</loc>
		<lastmod>2020-10-27T21:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/black-friday-and-cyber-monday-scams-are-calling-let-it-ring/</loc>
		<lastmod>2020-10-27T22:19:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/newsbites-drilldown-for-the-week-ending-23-october-2020/</loc>
		<lastmod>2020-10-28T03:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/05/get-hands-on-with-tech-tuesday-workshops/</loc>
		<lastmod>2020-10-28T03:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-containers-support-the-it-ot-convergence/</loc>
		<lastmod>2020-10-28T06:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/4-considerations-for-a-secure-cloud-environment/</loc>
		<lastmod>2020-10-28T06:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fortinet-secures-the-intelligent-enterprise-running-sap/</loc>
		<lastmod>2020-10-28T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/assessing-dynamic-business-environments-with-remote-cyber-threat-assessments/</loc>
		<lastmod>2020-10-28T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/building-blocks-of-appsec-testing-exploring-sast-dast-and-iast-rasp/</loc>
		<lastmod>2020-10-28T07:37:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/new-research-report-connected-medical-device-security-shows-health-networks-still-exposed-to-significant-risk-of-attack-and-disruption/</loc>
		<lastmod>2020-10-28T09:20:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-xdr-perspective-rsas-view-on-extended-detection-and-response-2/</loc>
		<lastmod>2020-10-28T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/introducing-the-ermetic-advisory-board-travis-mcpeak-of-netflix/</loc>
		<lastmod>2020-10-28T11:33:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-xdr-perspective-rsas-view-on-extended-detection-and-response/</loc>
		<lastmod>2020-10-28T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/3-phenomena-emerging-from-the-pandemic/</loc>
		<lastmod>2020-10-28T12:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/is-it-worth-it-to-defend-your-service-from-video-piracy/</loc>
		<lastmod>2020-10-28T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-potion-for-pci-compliance/</loc>
		<lastmod>2020-10-28T13:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/update-on-dods-cloud-based-internet-isolation/</loc>
		<lastmod>2020-10-28T13:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cve-2019-0230-apache-struts-2-0-0-to-2-5-20-possible-rce-due-to-forced-double-ognl-evaluation/</loc>
		<lastmod>2020-10-28T14:33:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/enso-previews-application-security-posture-management-platform/</loc>
		<lastmod>2020-10-28T14:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42381372.jpg</image:loc>
			<image:title><![CDATA[security platform]]></image:title>
			<image:caption><![CDATA[Enso]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/Enso-dashboard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersecurity-horror-stories-dont-have-to-keep-you-up-at-night/</loc>
		<lastmod>2020-10-28T14:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-nsa-is-refusing-to-disclose-its-policy-on-backdooring-commercial-products/</loc>
		<lastmod>2020-10-28T14:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-jack-twiddys-how-to-grow-a-brain-in-a-jar/</loc>
		<lastmod>2020-10-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/attackiq-launches-new-informed-defenders-executive-council-to-share-expertise-and-improve-cybersecurity-effectiveness/</loc>
		<lastmod>2020-10-28T16:52:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/security-blueprints-of-many-companies-leaked-in-hack-of-swedish-firm-gunnebo/</loc>
		<lastmod>2020-10-28T16:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-iphone-12/</loc>
		<lastmod>2020-10-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/google-drive-trash-retention-reduced-by-10000-years/</loc>
		<lastmod>2020-10-28T17:15:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-the-cloud-could-improve-vendor-access-management-2/</loc>
		<lastmod>2020-10-28T17:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/5-places-where-youd-never-expect-to-get-hacked/</loc>
		<lastmod>2020-10-28T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-vidya-murthys-the-underestimated-threat-vector-homogeneity/</loc>
		<lastmod>2020-10-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/egregor-sekhmets-cousin/</loc>
		<lastmod>2020-10-29T06:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Breach-Incidents-2019.jpg</image:loc>
			<image:title><![CDATA[ransomware]]></image:title>
			<image:caption><![CDATA[Egregor]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/egregor-ransom-demanding-message.png</image:loc>
			<image:caption><![CDATA[egregor ransom demanding message]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/egregor-encrypted-files.png</image:loc>
			<image:caption><![CDATA[egregor encrypted files]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/egregor-tor-website.png</image:loc>
			<image:caption><![CDATA[Egregor Tor website]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-return-to-logs-to-unjam-the-security-deficit/</loc>
		<lastmod>2020-10-29T07:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/logs.jpg</image:loc>
			<image:title><![CDATA[logs]]></image:title>
			<image:caption><![CDATA[logs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/protect-yourself-against-election-data-brokers-avast/</loc>
		<lastmod>2020-10-28T19:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/president-trumps-campaign-website-defaced-by-cryptocurrency-scammers/</loc>
		<lastmod>2020-10-28T19:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/guide-to-cloud-network-security-basics/</loc>
		<lastmod>2020-10-28T19:35:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/nitro-data-breach-could-spell-trouble-for-google-apple-microsoft-and-others/</loc>
		<lastmod>2020-10-28T19:39:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/phishing-email-examples-the-best-worst/</loc>
		<lastmod>2020-10-28T19:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-url-tracking-systems-are-abused-for-phishing/</loc>
		<lastmod>2020-10-28T20:22:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/your-splunk-guide-for-smooth-sailing-with-cef-field-extractions/</loc>
		<lastmod>2020-10-28T20:34:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-cyber-security-put-the-sec-in-devops-with-intelligent-orchestration/</loc>
		<lastmod>2020-10-28T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cyrc-analysis-circumventing-wpa-authentication-in-wireless-routers-with-defensics-fuzz-testing/</loc>
		<lastmod>2020-10-28T20:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/sans-cloud-security-curriculum/</loc>
		<lastmod>2020-10-28T21:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/for-national-cybersecurity-awareness-month-a-better-way-to-secure-your-distributed-workforce/</loc>
		<lastmod>2020-10-28T21:42:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/latest-trends-in-the-ransomware-market/</loc>
		<lastmod>2020-10-28T22:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/data-access-requests-under-gdpr-and-ccpa/</loc>
		<lastmod>2020-10-28T23:23:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-appease-the-gods-of-compliance-without-a-human-sacrifice/</loc>
		<lastmod>2020-10-28T23:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-top-iot-vulnerabilities-in-your-devices-keyfactor/</loc>
		<lastmod>2020-10-28T23:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fbi-dhs-hhs-warn-of-imminent-credible-ransomware-threat-against-u-s-hospitals/</loc>
		<lastmod>2020-10-29T00:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/final-elections-update-avast/</loc>
		<lastmod>2020-10-29T00:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/u-s-indictment-of-sandworm-highlights-the-importance-of-protecting-active-directory/</loc>
		<lastmod>2020-10-29T05:53:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pivoting-to-help-our-cyber-community-stay-strong-in-times-of-uncertainty/</loc>
		<lastmod>2020-10-29T06:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/public-agencies-look-to-fortinets-fabric-management-center-to-simplify-operations-and-ensure-compliance/</loc>
		<lastmod>2020-10-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/5-essential-steps-to-improve-cybersecurity-maturity/</loc>
		<lastmod>2020-10-29T07:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/getting-iast-results-from-dast-testing/</loc>
		<lastmod>2020-10-29T07:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-case-against-using-a-frankenstein-cybersecurity-platform/</loc>
		<lastmod>2020-10-29T07:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-soar-makes-threat-detection-and-remediation-more-effective/</loc>
		<lastmod>2020-10-29T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/are-you-afraid-of-the-unintentional-insider-threat/</loc>
		<lastmod>2020-10-29T08:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/scanning-a-graphql-api-for-vulnerabilities/</loc>
		<lastmod>2020-10-29T08:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/protecting-the-healthcare-industry-from-cyber-threats/</loc>
		<lastmod>2020-10-29T09:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/nist-cybersecurity-identify-function-for-k-12/</loc>
		<lastmod>2020-10-29T11:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/u-s-sanctions-russia-for-cyberattacks-critical-infrastructure-at-risk/</loc>
		<lastmod>2020-10-29T12:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/beachhead-solutions-adds-to-cloud-managed-device-encryption-platform-with-new-capabilities-built-to-secure-business-increasingly-remote-workforces/</loc>
		<lastmod>2020-10-29T12:21:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/identity-management-for-developers-why-its-required-more-than-ever/</loc>
		<lastmod>2020-10-29T12:42:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-the-crypto-challenge-as-action-helped-a-major-airline-reduce-false-positives-while-protecting-the-customer-experience/</loc>
		<lastmod>2020-10-29T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/maze-ransomware-gang-to-shut-down-operations/</loc>
		<lastmod>2020-10-29T13:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/to-pay-or-not-to-pay-its-about-the-provider/</loc>
		<lastmod>2020-10-29T13:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/exabeam-extends-security-management-platform-with-aws-google-cloud-platform-and-microsoft-azure-cloud-storage-monitoring/</loc>
		<lastmod>2020-10-29T13:36:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-hacker-mind-podcast-hacking-voting-systems-2/</loc>
		<lastmod>2020-10-29T14:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/protect-your-employees-from-business-email-compromise-attacks/</loc>
		<lastmod>2020-10-29T13:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/untangle-sd-wan-router-wins-gold-in-2020-golden-bridge-business-and-innovation-awards-2/</loc>
		<lastmod>2020-10-29T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/adapting-to-evolving-security-and-regulatory-challenges-a-conversation-with-patrick-heim/</loc>
		<lastmod>2020-10-29T14:03:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/announcement-loginradius-launches-passwordless-login-with-magic-link-or-otp-keeps-barriers-low-during-registration-and-login/</loc>
		<lastmod>2020-10-29T14:10:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/best-practices-for-protecting-your-organizations-dynamic-cloud-infrastructure/</loc>
		<lastmod>2020-10-29T14:25:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/untangle-sd-wan-router-wins-gold-in-2020-golden-bridge-business-and-innovation-awards/</loc>
		<lastmod>2020-10-29T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/now-you-know-qa-about-bricata-with-ceo-john-trauth/</loc>
		<lastmod>2020-10-29T15:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-world-has-moved-online-has-your-business-adapted/</loc>
		<lastmod>2020-10-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/why-wordpress-admin-notices-matter-and-how-to-manage-them-effectively/</loc>
		<lastmod>2020-10-29T15:26:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cve-2020-4589-ibm-websphere-application-server-7-0-8-0-8-5-and-9-0-rce-vulnerability/</loc>
		<lastmod>2020-10-29T16:35:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-threat-of-ddos-attacks-creates-a-recipe-for-election-chaos/</loc>
		<lastmod>2020-10-29T15:47:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-sam-cervantess-open-ventilator-remote-monitoring-project/</loc>
		<lastmod>2020-10-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/how-to-make-the-future-iot-more-secure/</loc>
		<lastmod>2020-10-29T16:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/approaches-to-deploying-post-quantum-cryptography-keyfactor/</loc>
		<lastmod>2020-10-29T16:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/robert-m-lees-jeff-haas-little-bobby-comics-week-130-from-the-archive-published-july-23-2017/</loc>
		<lastmod>2020-10-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/a-software-security-checklist-based-on-the-most-effective-appsec-programs/</loc>
		<lastmod>2020-10-29T17:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/two-security-metrics-that-speak-to-your-stakeholders/</loc>
		<lastmod>2020-10-29T17:24:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/is-it-security-under-attack/</loc>
		<lastmod>2020-10-29T17:25:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ransomwares-malevolent-heyday/</loc>
		<lastmod>2020-10-29T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-is-proactive-cyber-defense/</loc>
		<lastmod>2020-10-29T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/pci-dss-compliance-flagged-as-major-concern-in-verizon-business-report/</loc>
		<lastmod>2020-10-29T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-helen-negres-matthew-mcmahons-securing-a-medical-device-on-a-shoestring-budget/</loc>
		<lastmod>2020-10-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/securing-the-future-of-connected-devices-avast/</loc>
		<lastmod>2020-10-29T18:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mcafee-advances-sase-solution-with-first-of-its-kind-integrated-remote-browser-isolation-at-mpower-digital-2020/</loc>
		<lastmod>2020-10-29T18:58:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/erez-yalon-a-security-leader-in-the-api-economy/</loc>
		<lastmod>2020-10-29T18:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/mcafee-introduces-mvision-xdr-the-industry-first-proactive-data-aware-and-open-extended-detection-and-response-platform/</loc>
		<lastmod>2020-10-29T18:59:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/sansmic-schedule/</loc>
		<lastmod>2020-10-29T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-hacker-mind-podcast-hacking-voting-systems/</loc>
		<lastmod>2020-10-29T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/fbi-hhs-cisa-warn-ryuk-ransomware-attacks-on-healthcare/</loc>
		<lastmod>2020-10-29T20:27:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/heading-to-the-polls-get-the-info-on-disinformation/</loc>
		<lastmod>2020-10-29T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ryuk-ransomware-targeting-healthcare/</loc>
		<lastmod>2020-10-29T20:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/october-device-threat-report/</loc>
		<lastmod>2020-10-29T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/enterprise-vpns-need-securing-as-attackers-capitalize-on-wfh-trend/</loc>
		<lastmod>2020-10-29T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/ms-teams-the-gateway-drug-to-security-chaos/</loc>
		<lastmod>2020-10-30T07:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/MS-Teams.jpg</image:loc>
			<image:title><![CDATA[MS Teams]]></image:title>
			<image:caption><![CDATA[MS teams]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/recent-threats-highlight-the-importance-of-cybersecurity-in-healthcare/</loc>
		<lastmod>2020-10-29T22:27:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/decision-making-between-jaeger-and-zipkin/</loc>
		<lastmod>2020-10-29T22:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/why-predator-is-the-ultimate-ciso-movie/</loc>
		<lastmod>2020-10-29T23:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/what-not-to-do-in-your-first-90-days-as-a-ciso/</loc>
		<lastmod>2020-10-30T02:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/lessons-from-teaching-cybersecurity-week-5/</loc>
		<lastmod>2020-10-30T04:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cve-2020-24621-openmrs-remote-code-execution-rce-vulnerability-on-htmlformentry-aka-html-form-entry-module/</loc>
		<lastmod>2020-10-30T07:37:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/can-good-cybersecurity-policies-improve-our-quality-of-life/</loc>
		<lastmod>2020-10-30T09:46:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/managing-risk-amid-spike-in-ransomware-attacks-on-critical-infrastructure-2/</loc>
		<lastmod>2020-10-30T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/seczetta-and-securepoint-announce-partnership-to-strengthen-third-party-identity-lifecycle-and-risk-management-in-africa/</loc>
		<lastmod>2020-10-30T11:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/managing-risk-amid-spike-in-ransomware-attacks-on-critical-infrastructure/</loc>
		<lastmod>2020-10-30T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/from-sandworm-to-a-safer-tomorrow-lessons-from-hybrid-identity-protection-2020/</loc>
		<lastmod>2020-10-30T13:24:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/5-biggest-cyber-attacks-of-2020-so-far/</loc>
		<lastmod>2020-10-30T13:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/three-steps-to-manage-third-party-vendor-risk/</loc>
		<lastmod>2020-10-30T14:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cybersecurity-horror-stories-that-make-us-scream-with-fright/</loc>
		<lastmod>2020-10-30T14:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/leverage-ai-and-predictive-analysis-to-cut-costs-and-eliminate-downtime/</loc>
		<lastmod>2020-10-30T15:30:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-mix%e5%bd%95-laufers-making-next-generation-drugs-at-home/</loc>
		<lastmod>2020-10-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/xkcd-fall-back/</loc>
		<lastmod>2020-10-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/good-idea-bad-design-how-the-diamond-standard-falls-short/</loc>
		<lastmod>2020-10-30T17:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-andrea-downings-infodemic-threat-models/</loc>
		<lastmod>2020-10-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/2-3m-stolen-from-wisconsin-gop-via-bec-attack/</loc>
		<lastmod>2020-10-30T19:09:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/firewall-security-is-a-secure-firewall-less-network-possible-perhaps-but-why-would-you-2/</loc>
		<lastmod>2020-10-30T20:12:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/aproveite-analises-avancadas-para-proteger-seus-dispositivos-de-endpoint/</loc>
		<lastmod>2020-10-30T19:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/bitglass-named-a-leader-in-gartners-2020-magic-quadrant-for-casb/</loc>
		<lastmod>2020-10-30T19:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/firewall-security-is-a-secure-firewall-less-network-possible-perhaps-but-why-would-you/</loc>
		<lastmod>2020-10-30T20:25:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/reflected-xss-in-wordpress-v5-5-1-and-lower/</loc>
		<lastmod>2020-10-30T20:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/bridging-the-gap-between-application-and-network-security-with-cleanbrowsing/</loc>
		<lastmod>2020-10-30T20:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/why-cyber-risk-and-compliance-needs-to-be-the-foundation-for-healthcare-digital-transformation-initiatives/</loc>
		<lastmod>2020-10-30T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/top-3-risks-facing-manufacturers-in-the-age-of-digital-transformation-and-how-you-can-mitigate-them/</loc>
		<lastmod>2020-10-30T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/safely-celebrate-halloween-online-avast/</loc>
		<lastmod>2020-10-31T00:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/zoom-begins-using-end-to-end-encryption-avast/</loc>
		<lastmod>2020-10-31T00:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/talk-to-kids-about-removing-photos/</loc>
		<lastmod>2020-10-31T00:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/four-days-to-the-election-dont-fall-for-these-phishing-scams/</loc>
		<lastmod>2020-10-31T01:33:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/weekly-news-roundup-october-26-30-2020/</loc>
		<lastmod>2020-10-31T07:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/bens-book-of-the-month-review-of-build-your-own-cybersecurity-testing-lab-low-cost-solutions-for-testing-in-virtual-and-cloud-based-environments/</loc>
		<lastmod>2020-10-31T07:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-bill-hagestads-chinese-military-lab-mission-covid-19/</loc>
		<lastmod>2020-10-31T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/the-joy-of-tech-no-halloween-this-year/</loc>
		<lastmod>2020-10-31T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-biohacking-village-quaddis-replicants-how-covid19-changed-cyber-disaster-medicine/</loc>
		<lastmod>2020-10-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/def-con-28-safe-mode-ics-village-austin-scotts-5-quick-wins-for-improving-ics-cybersecurity-posture/</loc>
		<lastmod>2020-10-31T21:05:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/introducing-the-ermetic-advisory-board-adrian-ludwig-of-atlassian/</loc>
		<lastmod>2020-11-01T06:33:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/ancient-taboo-custom-credited-with-avoiding-covid19/</loc>
		<lastmod>2020-11-01T10:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-biohacking-village-patrick-currys-william-doughertys-includes-no-dirt-threat-modeling/</loc>
		<lastmod>2020-11-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/robert-m-lees-jeff-haas-little-bobby-comics-week-301/</loc>
		<lastmod>2020-11-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-biohacking-village-panel-how-independent-researchers-work-with-mdms/</loc>
		<lastmod>2020-11-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/election-security-2020-the-final-weeks-news-roundup/</loc>
		<lastmod>2020-11-01T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/remote-insider-data-theft-worries-financial-industry/</loc>
		<lastmod>2020-11-02T07:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/IT-Information-Security-2.jpg</image:loc>
			<image:title><![CDATA[IT-Information-Security-2]]></image:title>
			<image:caption><![CDATA[insider theft]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/behavioral-biometrics-zero-trust-thats-people-friendly/</loc>
		<lastmod>2020-11-02T08:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/Security-Staff-Turnover.jpg</image:loc>
			<image:caption><![CDATA[behavioral biometrics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/government-rumor-control-us-hospital-ransomware-threat-russian-hackers-charged/</loc>
		<lastmod>2020-11-02T05:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/discrepancy-in-security-beliefs-vs-security-practice/</loc>
		<lastmod>2020-11-02T07:14:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/ordell-robbie-tripwire-and-security-configuration-management/</loc>
		<lastmod>2020-11-02T07:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/5-lessons-learnt-from-bjj-that-are-applicable-to-cybersecurity/</loc>
		<lastmod>2020-11-02T07:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/malware-ransomware-and-everything-in-between-what-happens-when-you-click-on-the-malicious-files-in-your-inbox/</loc>
		<lastmod>2020-11-02T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/a-snapshot-into-the-current-threat-landscape/</loc>
		<lastmod>2020-11-02T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/cybersecurity-lessons-from-the-pandemic-avoidance/</loc>
		<lastmod>2020-11-02T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/need-a-killer-strategy-for-modernizing-iam-in-a-hybrid-world/</loc>
		<lastmod>2020-11-02T11:33:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/what-is-the-r-u-d-y-attack/</loc>
		<lastmod>2020-11-02T11:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/tackling-your-network-security-challenges-using-manageengine-itom-solutions/</loc>
		<lastmod>2020-11-02T12:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/honorably-serving-our-veterans-wherever-the-mission-goes/</loc>
		<lastmod>2020-11-02T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/bug-hunting-for-a-quick-buck-using-weblogic-vulnerability-cve-2020-14882/</loc>
		<lastmod>2020-11-02T15:47:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/a-weblogic-vulnerability-highlights-the-path-based-authorization-dilemma/</loc>
		<lastmod>2020-11-02T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/phishers-using-google-drive-to-trick-people-into-visiting-malicious-websites/</loc>
		<lastmod>2020-11-02T15:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/google-irresponsibly-discloses-windows-zero-day/</loc>
		<lastmod>2020-11-02T16:48:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/bsod-edouard-bourguignon-cc-by-sa.jpg</image:loc>
			<image:title><![CDATA[bsod--edouard-bourguignon--cc-by-sa]]></image:title>
			<image:caption><![CDATA[Google]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/protect-your-users-from-friendly-fire-in-the-war-on-bots/</loc>
		<lastmod>2020-11-02T16:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-biohacking-village-nina-allis-keynote/</loc>
		<lastmod>2020-11-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/proofpoint-patches-url-sandbox-bypass-bug/</loc>
		<lastmod>2020-11-02T17:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/cisco-advances-effort-to-simplify-security/</loc>
		<lastmod>2020-11-02T17:48:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/WordPress-Cybersecurity-Threats.jpg</image:loc>
			<image:title><![CDATA[security threat]]></image:title>
			<image:caption><![CDATA[Linux]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/xkcd-probability-comparisons/</loc>
		<lastmod>2020-11-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/u-s-health-care-under-attack/</loc>
		<lastmod>2020-11-03T07:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/ransomware-1.jpg</image:loc>
			<image:title><![CDATA[ransomware]]></image:title>
			<image:caption><![CDATA[ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/new-survey-shows-integrating-application-security-testing-gaining-traction-in-devops/</loc>
		<lastmod>2020-11-02T18:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/behind-the-evidence-board/</loc>
		<lastmod>2020-11-02T18:37:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/cryptocurrency-fact-vs-fiction/</loc>
		<lastmod>2020-11-02T18:38:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Cryptojacking-Over.jpg</image:loc>
			<image:caption><![CDATA[cryptocurrency]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-ben-gardiners-powerline-truck-hacking-2tools4plc4trucks/</loc>
		<lastmod>2020-11-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/alert-aa20-302a-federal-agencies-warn-about-ransomware-attacks-targeting-hospitals/</loc>
		<lastmod>2020-11-02T19:20:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/css-js-steganography-in-fake-flash-player-update-malware/</loc>
		<lastmod>2020-11-02T19:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/how-does-https-work/</loc>
		<lastmod>2020-11-02T20:09:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/trick-or-treat-that-twilio-npm-package-is-brandjacking-malware-in-disguise/</loc>
		<lastmod>2020-11-02T20:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/mitigating-compliance-team-turnover-costs/</loc>
		<lastmod>2020-11-02T20:54:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/why-efficiency-and-security-are-more-important-than-ever-for-vendor-access-management/</loc>
		<lastmod>2020-11-02T21:48:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/n-day-vulnerabilities-how-they-threaten-your-ics-systems-security/</loc>
		<lastmod>2020-11-03T05:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/automation-in-soar-goes-further-with-devsecops/</loc>
		<lastmod>2020-11-03T06:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-critical-need-for-increased-agility-in-business-continuity-plans/</loc>
		<lastmod>2020-11-03T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/identity-management-in-healthcare-analyzing-the-industry-needs/</loc>
		<lastmod>2020-11-03T10:28:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/an-8-point-checklist-to-get-cisco-management-right/</loc>
		<lastmod>2020-11-03T12:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/three-things-hospitals-and-healthcare-providers-should-do-right-now-to-prepare-for-expected-wave-of-ransomware-attacks/</loc>
		<lastmod>2020-11-03T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/pci-pal-supports-south-staffordshire-council-with-telephone-payment-security-for-new-garden-waste-collection-service/</loc>
		<lastmod>2020-11-03T14:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/client-side-protection-is-key-to-web-application-security/</loc>
		<lastmod>2020-11-03T14:19:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-danny-ocean-of-social-engineers/</loc>
		<lastmod>2020-11-03T14:20:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/understanding-your-serverless-systems-architecture-with-thundra/</loc>
		<lastmod>2020-11-03T14:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/radware-threat-researchers-live-bots-botnets-gaming/</loc>
		<lastmod>2020-11-03T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/tripwire-patch-priority-index-for-october-2020/</loc>
		<lastmod>2020-11-03T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/if-you-want-security-lie-to-me/</loc>
		<lastmod>2020-11-03T14:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-top-10-things-to-know-about-cmmc/</loc>
		<lastmod>2020-11-03T14:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/your-ast-guide-for-the-disenchanted-part-6-2/</loc>
		<lastmod>2020-11-03T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/09/integrating-the-respond-analyst-an-xdr-engine-with-servicenow-security-operations/</loc>
		<lastmod>2020-11-03T15:12:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/reign-in-your-rogue-admins-how-to-manage-ssl-certificates-keyfactor/</loc>
		<lastmod>2020-11-03T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/four-reasons-to-strengthen-identity-security-with-sso/</loc>
		<lastmod>2020-11-03T16:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/securing-vpn-authentication-with-radius-mfa/</loc>
		<lastmod>2020-11-03T16:55:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-chris-krebs-keynote/</loc>
		<lastmod>2020-11-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/tips-for-managing-npm-dependencies/</loc>
		<lastmod>2020-11-03T17:01:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-joy-of-tech-emergency-stockpile/</loc>
		<lastmod>2020-11-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/ransomware-vs-healthcare-a-dangerous-liaison/</loc>
		<lastmod>2020-11-03T18:09:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/managing-bot-based-attacks-with-threat-detection/</loc>
		<lastmod>2020-11-03T18:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/two-charged-in-sim-swapping-vishing-scams/</loc>
		<lastmod>2020-11-03T18:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/turkish-banking-agency-mandates-better-software-supply-chain-hygiene/</loc>
		<lastmod>2020-11-03T18:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-korotin-motspans-on-the-insecure-nature-of-turbine-control-systems/</loc>
		<lastmod>2020-11-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/on-threat-detection-uncertainty/</loc>
		<lastmod>2020-11-03T19:24:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/polobear-malicious-c2-server-targeting-vulnerable-cms/</loc>
		<lastmod>2020-11-03T19:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/operational-resilience-digital-transformation-the-pandemic-and-survival/</loc>
		<lastmod>2020-11-03T19:53:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/msft-x-github-cruft-thereof/</loc>
		<lastmod>2020-11-03T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/5-reasons-why-mobile-application-security-fails/</loc>
		<lastmod>2020-11-04T08:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Password-Security-Fears.jpg</image:loc>
			<image:title><![CDATA[Password-Security-Fears]]></image:title>
			<image:caption><![CDATA[mobile application security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/what-is-vlan-steering-2/</loc>
		<lastmod>2020-11-03T22:33:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/5-mistakes-cisos-make-in-their-board-presentations/</loc>
		<lastmod>2020-11-03T23:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/successfully-and-securely-working-from-anywhere-avast/</loc>
		<lastmod>2020-11-03T23:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/6-reasons-to-increase-your-compliance-budget-in-2021/</loc>
		<lastmod>2020-11-04T01:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/customer-story-keeping-a-city-of-8-5m-running-with-self-serviceable-adc-automation-2/</loc>
		<lastmod>2020-11-04T05:21:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/creating-and-deploying-pki-certificates-in-bulk/</loc>
		<lastmod>2020-11-04T06:51:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/kids-online-sharing-and-covid-avast/</loc>
		<lastmod>2020-11-04T07:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/fortinet-nse-training-qualifies-for-isc2-credit/</loc>
		<lastmod>2020-11-04T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/three-ways-cdr-will-alter-the-australian-open-banking-landscape/</loc>
		<lastmod>2020-11-04T10:50:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-cisos-dilemma-balancing-security-productivity-with-a-housebound-workforce/</loc>
		<lastmod>2020-11-04T11:50:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/dilemma.jpg</image:loc>
			<image:title><![CDATA[dilemma]]></image:title>
			<image:caption><![CDATA[CISO]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/3-steps-to-building-a-resilient-incident-response-plan/</loc>
		<lastmod>2020-11-04T11:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/endpoints-are-our-new-perimeters/</loc>
		<lastmod>2020-11-04T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/endpoints-are-our-new-perimeters-2/</loc>
		<lastmod>2020-11-04T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/ermetic-introduces-full-stack-identity-governance-for-cloud-infrastructures/</loc>
		<lastmod>2020-11-04T12:02:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/customer-story-keeping-a-city-of-8-5m-running-with-self-serviceable-adc-automation/</loc>
		<lastmod>2020-11-04T13:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/dicom-file-security-how-malware-can-hide-behind-hipaa-protected-images/</loc>
		<lastmod>2020-11-04T13:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/corporate-office-and-kitchen-table-securing-the-future-of-work-part-1/</loc>
		<lastmod>2020-11-04T14:12:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/windows-virtual-desktop-vs-citrix/</loc>
		<lastmod>2020-11-04T14:31:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/ransomware-demands-continue-to-rise-as-data-exfiltration-becomes-common-and-maze-subdues/</loc>
		<lastmod>2020-11-04T14:36:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/telefonicas-ceo-of-cyber-tech-discusses-rapid-cloud-migration/</loc>
		<lastmod>2020-11-04T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/cybercriminals-shift-tactics-against-ot-networks/</loc>
		<lastmod>2020-11-04T15:22:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Holes.jpg</image:loc>
			<image:title><![CDATA[Holes]]></image:title>
			<image:caption><![CDATA[OT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/how-to-remove-a-root-certificate/</loc>
		<lastmod>2020-11-04T15:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/determining-what-video-conference-participants-are-typing-from-watching-shoulder-movements/</loc>
		<lastmod>2020-11-04T16:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/microsoft-teams-y-opmanager-el-equipo-perfecto-para-la-administracion-remota-de-ti/</loc>
		<lastmod>2020-11-04T16:57:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-nadav-erez-journey-of-ics-project-files-visibility-and-forensics/</loc>
		<lastmod>2020-11-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/your-ast-guide-for-the-disenchanted-part-6/</loc>
		<lastmod>2020-11-04T17:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/blueliv-threat-exchange-network/</loc>
		<lastmod>2020-11-04T17:53:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/xkcd-election-impact-score-sheet/</loc>
		<lastmod>2020-11-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/revil-ransomware-gang-acquire-source-code-for-kpot-2-0-infostealer/</loc>
		<lastmod>2020-11-04T18:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/tales-from-the-front-lines-how-third-party-apis-simplify-enumeration-attacks/</loc>
		<lastmod>2020-11-04T18:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/hacknotice-to-democratize-threat-intelligence/</loc>
		<lastmod>2020-11-05T15:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Sandbox-Proof-Concept.jpg</image:loc>
			<image:title><![CDATA[software asset management]]></image:title>
			<image:caption><![CDATA[threat intelligence]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/HackNotice.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/making-cybersecurity-dollars-count/</loc>
		<lastmod>2020-11-04T18:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-dor-yardenis-mike-lemleys-vulnerability-discovery-tips-for-surviving/</loc>
		<lastmod>2020-11-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/network-security-why-visibility-isnt-enough/</loc>
		<lastmod>2020-11-05T08:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Ops-DevSecOps.jpg</image:loc>
			<image:title><![CDATA[Ops-DevSecOps]]></image:title>
			<image:caption><![CDATA[network security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/iam-a-critical-element-of-corporate-risk-literacy/</loc>
		<lastmod>2020-11-04T19:10:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/women-in-cyber-podcast-series-the-evolution-of-cybersecurity-by-lysa-myers/</loc>
		<lastmod>2020-11-04T19:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/5-steps-to-security-validation-by-tracey-moon/</loc>
		<lastmod>2020-11-04T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/08/measuring-security-effectiveness-infiltrations-and-ransomware-by/</loc>
		<lastmod>2020-11-04T19:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/backend-development-technical-lead/</loc>
		<lastmod>2020-11-04T19:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/senior-devops-engineer/</loc>
		<lastmod>2020-11-04T19:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/frontend-development-technical-lead/</loc>
		<lastmod>2020-11-04T19:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/backend-development-technical-lead-2/</loc>
		<lastmod>2020-11-04T19:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/sr-field-marketing-manager/</loc>
		<lastmod>2020-11-04T19:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/why-paying-to-delete-stolen-data-is-bonkers/</loc>
		<lastmod>2020-11-04T19:32:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/how-safe-is-your-vote/</loc>
		<lastmod>2020-11-04T20:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/problems-facing-it-departments/</loc>
		<lastmod>2020-11-04T21:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/10/cyber-security-roundup-for-october-2020/</loc>
		<lastmod>2020-11-04T22:36:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/cyber-security-roundup-for-november-2020/</loc>
		<lastmod>2020-11-04T23:56:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/advancing-cloud-dlp-through-smarter-policies/</loc>
		<lastmod>2020-11-05T00:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/core-frameworks-to-streamline-financial-services-cybersecurity-compliance/</loc>
		<lastmod>2020-11-05T01:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/5-ways-to-prevent-data-loss-mitigate-ransomware-attacks/</loc>
		<lastmod>2020-11-05T02:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/customer-story-fortune-500-health-insurance-provider-makes-f5-adc-infrastructure-agile-with-adc/</loc>
		<lastmod>2020-11-05T05:27:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/legacy-mauthtoken-malware-continues-to-redirect-mobile-users/</loc>
		<lastmod>2020-11-05T05:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/customer-story-a-multinational-bfsi-company-provisions-more-than-600-devices-with-appviewx/</loc>
		<lastmod>2020-11-05T06:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/american-media-conglomerate-reduces-tco-total-cost-of-ownership-of-f5-adc-devices-by-55-with-adc/</loc>
		<lastmod>2020-11-05T06:27:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/building-a-security-alliance-with-your-cloud-partners/</loc>
		<lastmod>2020-11-05T06:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/new-massachusetts-law-requires-vehicle-data-be-made-accessible/</loc>
		<lastmod>2020-11-05T07:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/understanding-the-owasp-top-10-web-application-risks/</loc>
		<lastmod>2020-11-05T07:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/understanding-the-impact-of-covid-19-on-iot-security/</loc>
		<lastmod>2020-11-05T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/understanding-cross-site-scripting-attacks-avast/</loc>
		<lastmod>2020-11-05T08:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/threat-intelligence-vs-the-rise-in-sophisticated-ransomware/</loc>
		<lastmod>2020-11-05T09:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/remote-working-taking-secure-payments-from-home/</loc>
		<lastmod>2020-11-05T09:56:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/introduction-to-the-architect-framework/</loc>
		<lastmod>2020-11-05T09:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/nist-cybersecurity-protect-function-for-k-12/</loc>
		<lastmod>2020-11-05T11:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/organizations-must-develop-zero-trust-to-defend-against-ddos-attacks-heres-why-2/</loc>
		<lastmod>2020-11-05T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/organizations-must-develop-zero-trust-to-defend-against-ddos-attacks-heres-why/</loc>
		<lastmod>2020-11-05T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/port-scanner-101-what-it-is-and-why-should-you-use-it/</loc>
		<lastmod>2020-11-05T12:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/password-blacklists-applying-the-goldilocks-principle/</loc>
		<lastmod>2020-11-05T12:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/email-attacks-using-fear-of-election-interference-to-spread-qbot/</loc>
		<lastmod>2020-11-05T12:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/capcom-hacked-resident-evil-game-developer-discloses-cyber-attack/</loc>
		<lastmod>2020-11-05T12:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/los-consumidores-mexicanos-esperan-con-entusiasmo-la-proteccion-de-la-ciberseguridad-basada-en-la-red/</loc>
		<lastmod>2020-11-05T12:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/would-the-real-iast-please-stand-up/</loc>
		<lastmod>2020-11-05T13:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/better-intelligence-better-anti-money-laundering-compliance/</loc>
		<lastmod>2020-11-05T14:39:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/o-novo-normal-do-monitoramento-da-infraestrutura/</loc>
		<lastmod>2020-11-05T14:40:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/mcafee-sees-covid-19-themed-threats-and-powershell-malware-surge-in-q2-2020/</loc>
		<lastmod>2020-11-05T14:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-ironnet-november-threat-intelligence-brief/</loc>
		<lastmod>2020-11-05T14:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/attacking-kubernetes-clusters-through-your-network-plumbing-part-1/</loc>
		<lastmod>2020-11-05T15:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/optimize-video-streaming-performance-to-reduce-viewer-churn/</loc>
		<lastmod>2020-11-05T15:05:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/detecting-phishing-emails/</loc>
		<lastmod>2020-11-06T12:28:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/como-proteger-sua-infraestrutura-de-ti-de-uma-ataque-maze-ransomware/</loc>
		<lastmod>2020-11-05T16:08:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/how-a-rapid-shift-to-remote-work-impacted-it-infrastructure/</loc>
		<lastmod>2020-11-05T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-fernandez-gomez-industrial-cybersecurity-in-mexico/</loc>
		<lastmod>2020-11-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/cyber-security-assurance-levels-in-the-automotive-supply-chain/</loc>
		<lastmod>2020-11-05T17:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/checkmarx-solutions-now-available-for-purchase-on-aws-marketplace/</loc>
		<lastmod>2020-11-05T17:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/xkcd-the-true-name-of-the-bear/</loc>
		<lastmod>2020-11-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/23-of-windows-in-use-is-old-insecure-win7-or-xp/</loc>
		<lastmod>2020-11-05T18:27:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/v-cristianosabbatini-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[v--cristianosabbatini--cc-by-nd]]></image:title>
			<image:caption><![CDATA[Windows]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/westcon-signs-distribution-agreement-with-breach-attack-simulation-leader-attackiq/</loc>
		<lastmod>2020-11-05T18:31:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/ssl-vs-tls-certificates/</loc>
		<lastmod>2020-11-05T18:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/how-vendors-capitalize-on-siems-fundamental-flaws/</loc>
		<lastmod>2020-11-05T18:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-marina-krotofis-confessions-of-an-offensive-ics-researcher/</loc>
		<lastmod>2020-11-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/splunking-with-sysmon-part-3-detecting-psexec-in-your-environment/</loc>
		<lastmod>2020-11-05T19:21:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/building-high-performing-and-diverse-cybersecurity-units/</loc>
		<lastmod>2020-11-05T19:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/selling-it-crypto-edition/</loc>
		<lastmod>2020-11-05T19:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/agent-tesla-a-day-in-a-life-of-ir/</loc>
		<lastmod>2020-11-05T20:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/whats-in-todays-cybercriminals-toolbox-lets-open-it/</loc>
		<lastmod>2020-11-05T21:42:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/balancing-autonomy-and-control-in-api-security-with-token-swapping/</loc>
		<lastmod>2020-11-05T22:46:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-most-secure-radius-vpn-authentication-method/</loc>
		<lastmod>2020-11-06T00:07:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/06/understand-ssl-and-how-it-works-keyfactor/</loc>
		<lastmod>2020-11-06T00:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/an-introduction-to-kubernetes-network-policies-for-security-people/</loc>
		<lastmod>2020-11-06T03:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-complex-new-normal-of-network-access/</loc>
		<lastmod>2020-11-06T04:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/choosing-the-right-sd-wan-solution-is-critical-for-partners/</loc>
		<lastmod>2020-11-06T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/iot-attacks-intensified-by-covid-19-avast/</loc>
		<lastmod>2020-11-06T08:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/62-of-financial-services-firms-in-the-uk-have-suffered-a-cyber-attack-in-the-last-12-months/</loc>
		<lastmod>2020-11-06T09:48:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/opmanager-helps-uk-food-retailer-troubleshoot-network-issues-faster/</loc>
		<lastmod>2020-11-06T12:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-health-of-security/</loc>
		<lastmod>2020-11-06T12:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/e-commerce-security-5-ways-to-enhance-data-protection-during-the-shopping-season/</loc>
		<lastmod>2020-11-06T12:36:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/streaming-traffic-peaks-on-election-night/</loc>
		<lastmod>2020-11-06T12:46:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/soc-2-compliance-building-customer-trust/</loc>
		<lastmod>2020-11-06T14:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/why-our-furniture-will-face-the-tv-for-years-to-come/</loc>
		<lastmod>2020-11-06T14:25:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/limited-impact-of-phishing-site-blocklists-and-browser-warnings/</loc>
		<lastmod>2020-11-06T15:12:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/alfa-team-shell-v4-1-tesla-a-feature-update-analysis/</loc>
		<lastmod>2020-11-06T15:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/five-worthy-reads-has-the-pandemic-accelerated-digital-transformation/</loc>
		<lastmod>2020-11-06T15:30:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/preparing-for-holiday-traffic-during-covid-19/</loc>
		<lastmod>2020-11-06T16:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/corporate-office-and-kitchen-table-securing-the-future-of-work-part-2/</loc>
		<lastmod>2020-11-06T16:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-marie-otis-mitre-ics-attck/</loc>
		<lastmod>2020-11-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/court-greenlights-accenture-marriott-breach-suit/</loc>
		<lastmod>2020-11-06T17:28:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Micron-Intellectual-Property.jpg</image:loc>
			<image:title><![CDATA[cyberlaw]]></image:title>
			<image:caption><![CDATA[Accenture]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/weekly-news-roundup-november-2-6-2020/</loc>
		<lastmod>2020-11-06T17:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/too-late/</loc>
		<lastmod>2020-11-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/ransomware-gangs-not-honoring-ransom-payments-for-stolen-data/</loc>
		<lastmod>2020-11-06T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/using-cloud-costs-to-find-your-crown-jewels/</loc>
		<lastmod>2020-11-09T08:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/crownjewels.jpg</image:loc>
			<image:title><![CDATA[crownjewels]]></image:title>
			<image:caption><![CDATA[cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/ciphercloud-chronicles-6-tackling-fat-finger-errors/</loc>
		<lastmod>2020-11-06T18:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-can-kumaz-ics-secops-active-defense-concept-with-effective-incident-response/</loc>
		<lastmod>2020-11-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/3-takeaways-from-sandworm-hacker-groups-indictment/</loc>
		<lastmod>2020-11-09T07:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto33004903.jpg</image:loc>
			<image:title><![CDATA[GRU]]></image:title>
			<image:caption><![CDATA[Sandworm]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/Screen-Shot-2020-11-03-at-15.13.15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/hearing-from-cisos-at-google-cloud-and-beyond/</loc>
		<lastmod>2020-11-06T19:57:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/commandants-245th-marine-corps-birthday-message/</loc>
		<lastmod>2020-11-06T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/survey-sees-ai-automation-cast-shadow-over-security-careers/</loc>
		<lastmod>2020-11-06T20:14:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/China-Social-Credit.jpg</image:loc>
			<image:caption><![CDATA[survey security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-diverse-commitment-at-keyfactor-keyfactor/</loc>
		<lastmod>2020-11-06T20:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/apple-fixes-numerous-zero-day-ios-flaws/</loc>
		<lastmod>2020-11-07T01:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/why-manual-certificate-management-doesnt-scale/</loc>
		<lastmod>2020-11-07T05:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/text-scam-lies-about-u-s-stimulus-check-avast/</loc>
		<lastmod>2020-11-07T10:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/us-victims-of-indian-call-center-scams-send-cash-to-money-mules-across-the-country/</loc>
		<lastmod>2020-11-07T15:56:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-demirel-temels-playing-with-electricity/</loc>
		<lastmod>2020-11-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/boling-point/</loc>
		<lastmod>2020-11-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-chris-kubeckas-operationalizing-cyber-norms/</loc>
		<lastmod>2020-11-07T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/ai-and-ml-leads-the-trend-in-technologies-that-will-fill-the-cybersecurity-skills-gaps/</loc>
		<lastmod>2020-11-07T21:09:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/bitcoin-phishing-the-n1ghtm4r3-emails/</loc>
		<lastmod>2020-11-07T21:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/its-almost-over-much-damage-has-been-done-but-i-we-have-a-call-to-unexpected-action/</loc>
		<lastmod>2020-11-08T12:45:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-ac0rns-atlas-0f-d00ms-vivisecting-powerpc/</loc>
		<lastmod>2020-11-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/robert-m-lees-jeff-haas-little-bobby-comics-week-302/</loc>
		<lastmod>2020-11-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/gitpaste-12-a-dozen-exploits-that-silently-lived-on-github-attacked-linux-servers/</loc>
		<lastmod>2020-11-08T18:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-tim-yardleys-building-a-physical-testbed-for-blackstart-restoration/</loc>
		<lastmod>2020-11-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/body-found-in-canada-identified-as-neo-nazi-spam-king/</loc>
		<lastmod>2020-11-09T04:58:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/privacy-mindset-europe-vs-united-states/</loc>
		<lastmod>2020-11-09T05:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/creando-presupuestos-para-ciberseguridad-efectivos/</loc>
		<lastmod>2020-11-09T06:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/cisa-strategy-for-5g-security-and-resilience/</loc>
		<lastmod>2020-11-09T06:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-limitations-of-sase-and-zero-trust/</loc>
		<lastmod>2020-11-09T07:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/fortinet-named-a-visionary-in-the-2020-gartner-magic-quadrant-for-wired-and-wireless-lan-access-infrastructure/</loc>
		<lastmod>2020-11-09T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/pci-pal-to-discuss-the-evolution-of-digital-payments-at-the-call-and-contact-centre-expo-virtual-event/</loc>
		<lastmod>2020-11-09T09:50:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/5-reasons-why-web-security-is-important-to-avoid-ransomware/</loc>
		<lastmod>2020-11-09T09:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/my-take-why-companies-and-consumers-must-collaborate-to-stop-the-plundering-of-iot-systems/</loc>
		<lastmod>2020-11-09T11:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/our-new-bug-bounty-program-avast/</loc>
		<lastmod>2020-11-09T11:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/seczetta-and-levelup-announce-new-partnership-in-third-party-identity-and-risk-management/</loc>
		<lastmod>2020-11-09T11:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/cybersecasia-awards-2020-recognizes-manageengine-for-its-leadership-in-cybersecurity/</loc>
		<lastmod>2020-11-09T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/a-zero-trust-approach-to-protecting-cloud-identities-begins-with-least-privilege/</loc>
		<lastmod>2020-11-09T12:46:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/ermetic-named-winner-of-sierra-ventures-challenge/</loc>
		<lastmod>2020-11-09T13:46:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/highlights-from-global-action-week-at-forgerock/</loc>
		<lastmod>2020-11-09T14:26:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-origin-is-no-more/</loc>
		<lastmod>2020-11-09T14:30:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/securing-vpn-and-rdp-access-to-sensitive-resources-free-e-book-and-webinar/</loc>
		<lastmod>2020-11-09T16:26:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/us-signal-launches-vulnerability-scanning-and-management-for-proactive-detection-and-remediation-of-critical-it-security-threats/</loc>
		<lastmod>2020-11-10T14:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/how-irm-is-accelerating-digital-transformation-in-insurance/</loc>
		<lastmod>2020-11-09T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ics-village-joe-slowiks-mission-kill-process-targeting-in-ics-attacks/</loc>
		<lastmod>2020-11-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/shiftleft-engineering%e2%80%8a-%e2%80%8aintegrating-your-go-services-with-jira/</loc>
		<lastmod>2020-11-09T17:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/great-british-prank-company-name-contains-xss-hack/</loc>
		<lastmod>2020-11-09T17:37:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/union-flag-adrian-clark-cc-by-nd.jpg</image:loc>
			<image:title><![CDATA[union-flag--adrian-clark--cc-by-nd]]></image:title>
			<image:caption><![CDATA[XSS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/computer-manufacturing-company-compal-discloses-security-incident/</loc>
		<lastmod>2020-11-09T17:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/lessons-from-teaching-cybersecurity-week-6/</loc>
		<lastmod>2020-11-09T17:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/the-joy-of-tech-congrats-america/</loc>
		<lastmod>2020-11-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-ultimate-hacker-movies-list-for-2020/</loc>
		<lastmod>2020-11-09T18:15:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/three-devsecops-challenges-and-how-to-mitigate-them/</loc>
		<lastmod>2020-11-09T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/identity-verification-is-your-potential-employee-who-they-say-they-are/</loc>
		<lastmod>2020-11-10T07:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto8613464.jpg</image:loc>
			<image:title><![CDATA[canstockphoto8613464]]></image:title>
			<image:caption><![CDATA[identity verification]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/def-con-28-safe-mode-ham-radio-village-swissninjas-the-ostrwerk-initiative/</loc>
		<lastmod>2020-11-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/cybrary-offers-more-free-courses-to-offer-paths-to-employment-and-better-defense-against-increased-cyber-attacks/</loc>
		<lastmod>2020-11-10T14:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/ransomwares-brutal-second-wave/</loc>
		<lastmod>2020-11-10T08:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/ransomware-2.jpg</image:loc>
			<image:title><![CDATA[ransomware]]></image:title>
			<image:caption><![CDATA[ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/like-mustard-gas-psychological-warfare-and-its-poison-linger-on-for-years/</loc>
		<lastmod>2020-11-09T19:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/best-cyber-security-practices-for-msps/</loc>
		<lastmod>2020-11-09T19:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/malicious-file-transfer-what-you-need-to-know-about-an-attackers-methods-and-techniques-to-protect-your-organization-from-malware-by-ursula-cowan/</loc>
		<lastmod>2020-11-09T20:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/cybersecurity-in-a-post-covid-19-world/</loc>
		<lastmod>2020-11-09T21:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/2020-was-a-secure-election/</loc>
		<lastmod>2020-11-10T12:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/zeronorth-unveils-new-defect-density-dashboard-to-unite-security-and-devops-teams/</loc>
		<lastmod>2020-11-10T13:30:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/discord-dll-successor-to-npm-fallguys-malware-went-undetected-for-5-months/</loc>
		<lastmod>2020-11-09T22:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/can-i-replace-ldap-openldap-with-azure/</loc>
		<lastmod>2020-11-09T23:51:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/11/can-i-use-google-with-ldap/</loc>
		<lastmod>2020-11-09T23:55:34+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->