<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2018/06/hack-of-us-navy-contractor-nets-china-614-gigabytes-of-classified-information/</loc>
		<lastmod>2018-06-11T14:23:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bad-men-at-work-please-dont-click/</loc>
		<lastmod>2018-06-11T14:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/why-u-s-navy-operations-department-lead-edward-brown-earned-his-ceh-with-infosec-institute/</loc>
		<lastmod>2018-06-11T14:46:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/securing-the-modernization-of-it-for-state-and-local-governments/</loc>
		<lastmod>2018-06-11T16:34:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/report-on-bsides-orlando-2018/</loc>
		<lastmod>2018-06-11T17:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-rising-threat-of-healthcare-identity-fraud/</loc>
		<lastmod>2018-06-11T17:09:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/a-week-in-security-june-4-june-10/</loc>
		<lastmod>2018-06-11T17:23:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-brent-white-and-tim-roberts-skills-for-a-red-teamer/</loc>
		<lastmod>2018-06-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/dell-ibm-intel-and-microsoft-join-300-sensing-technology-providers-at-2018-sensors-expo-conference/</loc>
		<lastmod>2018-06-11T18:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tens-of-thousands-of-android-devices-are-leaving-their-debug-port-exposed/</loc>
		<lastmod>2018-06-11T18:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/virtual-forge-announces-updates-to-its-virtual-forge-security-cloud-based-sap-security-and-quality-offering/</loc>
		<lastmod>2018-06-11T19:39:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/xkcd-presidential-succession/</loc>
		<lastmod>2018-06-11T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/74-mostly-nigerians-arrested-in-business-email-compromise-action/</loc>
		<lastmod>2018-06-11T21:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/keeping-your-family-safe-online-avast/</loc>
		<lastmod>2018-06-11T21:41:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/blockchain-needed-as-cybercrime-goes-corporate/</loc>
		<lastmod>2018-06-11T21:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-cybercriminals-monetize-e-commerce-fraud/</loc>
		<lastmod>2018-06-12T00:28:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/eavesdropping-with-amazon-alexa-2/</loc>
		<lastmod>2018-06-12T00:52:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/beware-the-silent-threat-of-insecure-configurations-to-your-sap-systems/</loc>
		<lastmod>2018-06-12T01:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/april-2018-oracle-critical-patch-update-oracle-patches-254-vulnerabilities-176-specific-to-financials-2/</loc>
		<lastmod>2018-06-12T01:04:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-use-open-web-application-security-project-owasp-for-iso-27001-2/</loc>
		<lastmod>2018-06-12T01:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/federal-agencies-digital-security-programs-need-work-risk-assessments-reveal/</loc>
		<lastmod>2018-06-12T03:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/women-in-information-security-avi/</loc>
		<lastmod>2018-06-12T03:41:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bitcoin-drops-10-after-hack-of-south-korean-exchange-service/</loc>
		<lastmod>2018-06-12T06:45:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/leopard-spots-and-zebra-stripes-big-data-and-identity-management/</loc>
		<lastmod>2018-06-12T07:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/could-it-be-so-data-breaches-decline-in-2018/</loc>
		<lastmod>2018-06-12T07:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-fast-is-acunetix-v12/</loc>
		<lastmod>2018-06-12T08:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/can-i-alter-the-scan-or-target-settings-during-a-scan/</loc>
		<lastmod>2018-06-12T08:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/are-scans-for-the-target-stopped-or-paused-during-excluded-hours/</loc>
		<lastmod>2018-06-12T08:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-long-can-a-scan-remain-in-a-paused-state/</loc>
		<lastmod>2018-06-12T08:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/can-i-restart-my-machine-when-a-scan-is-paused/</loc>
		<lastmod>2018-06-12T08:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/can-i-pause-a-scan/</loc>
		<lastmod>2018-06-12T08:04:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/why-this-paper-or-mysteries-of-testing-security/</loc>
		<lastmod>2018-06-12T09:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cybersecurity-customer-experience-embrace-technology-and-change-to-earn-a-customers-loyalty/</loc>
		<lastmod>2018-06-12T10:40:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/new-iphone-os-may-include-device-unlocking-security/</loc>
		<lastmod>2018-06-12T11:23:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/french-company-incurs-e250k-fine-for-data-leak/</loc>
		<lastmod>2018-06-12T11:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/operation-wire-wire-the-south-florida-cases-part-1/</loc>
		<lastmod>2018-06-12T11:36:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ics-scada-smart-scanning-discover-and-assess-it-based-systems-in-converged-it-ot-environments/</loc>
		<lastmod>2018-06-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-core-phases-of-incident-response-remediation/</loc>
		<lastmod>2018-06-12T12:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/infosec-institute-announces-50000-cybersecurity-scholarship-program/</loc>
		<lastmod>2018-06-12T13:16:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/state-of-the-internet-summer-2018-attack-spotlight-what-you-need-to-know/</loc>
		<lastmod>2018-06-12T13:33:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/get-the-best-deals-on-hotels-avast/</loc>
		<lastmod>2018-06-12T13:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/artificial-intelligence-the-facial-recognition-debacle/</loc>
		<lastmod>2018-06-12T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/casb-what-is-it-why-do-i-need-it-what-has-it-done-for-me-lately/</loc>
		<lastmod>2018-06-12T14:23:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-is-aws-pci-compliance/</loc>
		<lastmod>2018-06-12T14:39:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/you-cant-protect-what-you-cant-see-gaining-visibility-in-endpoint-security/</loc>
		<lastmod>2018-06-12T14:40:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/pyromineiot-nsa-exploit-moneroxmr-miner-iot-device-scanner/</loc>
		<lastmod>2018-06-12T14:40:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/untangle-releases-ng-firewall-14-0-with-enhanced-support-for-secure-sd-wan/</loc>
		<lastmod>2018-06-12T15:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/10-best-vpns-for-wi-fi-security-in-2018-a-guide-to-wireless-security/</loc>
		<lastmod>2018-06-12T15:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cybersecurity-framework-1-1-adoption-experiences-and-opportunities/</loc>
		<lastmod>2018-06-12T16:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/sap-cyber-threat-intelligence-report-june-2018/</loc>
		<lastmod>2018-06-12T16:32:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/furthering-our-support-for-cisco-firepower-migration/</loc>
		<lastmod>2018-06-12T17:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-konstantinos-karagiannis-hacking-smart-contracts-a-methodology/</loc>
		<lastmod>2018-06-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/double-kill-a-prodigy-of-zero-days-and-what-we-can-learn-from-it/</loc>
		<lastmod>2018-06-12T18:16:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/will-the-rise-of-devops-lead-to-a-decline-in-machine-identity-protection/</loc>
		<lastmod>2018-06-12T18:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/june-patch-tuesday-new-speculative-store-bypass-fixes-adobe-vulns/</loc>
		<lastmod>2018-06-12T18:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/internet-safety-month-how-to-protect-your-childs-privacy-online/</loc>
		<lastmod>2018-06-12T19:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-every-nonprofit-needs-to-know-about-threats-to-saas-data/</loc>
		<lastmod>2018-06-12T19:17:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/sap-security-notes-june-18-what-to-do-with-critical-re-released-notes-2/</loc>
		<lastmod>2018-06-12T19:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-improve-website-resilience-for-ddos-attacks-part-i/</loc>
		<lastmod>2018-06-12T20:16:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/video-times-up-gdpr-is-here-now-what/</loc>
		<lastmod>2018-06-12T20:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/luke-kingma-lou-patrick-mackays-iron-lung/</loc>
		<lastmod>2018-06-12T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/microsoft-patch-tuesday-june-2018-edition/</loc>
		<lastmod>2018-06-12T21:04:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/vert-threat-alert-june-2018-patch-tuesday-analysis/</loc>
		<lastmod>2018-06-12T21:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/operation-wire-wire-the-south-florida-cases-part-2/</loc>
		<lastmod>2018-06-12T21:38:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/monitoring-for-suspicious-network-activity/</loc>
		<lastmod>2018-06-12T21:40:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/clustering-app-attacks-with-machine-learning-part-2-calculating-distance/</loc>
		<lastmod>2018-06-12T22:06:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cryptoharlem-teaching-encryption/</loc>
		<lastmod>2018-06-12T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/washington-states-net-neutrality-statue-in-effect/</loc>
		<lastmod>2018-06-12T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/exploit-kits-spring-2018-review/</loc>
		<lastmod>2018-06-12T23:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-is-integrity-management/</loc>
		<lastmod>2018-06-13T03:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/record-fine-for-french-optical-center-after-leak-of-334000-personal-records/</loc>
		<lastmod>2018-06-13T09:16:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/rsa-labs-staying-secure-means-staying-relevant/</loc>
		<lastmod>2018-06-13T10:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/rsas-cto-bullish-on-security-bearish-on-blockchain/</loc>
		<lastmod>2018-06-13T10:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/new-data-privacy-regulations/</loc>
		<lastmod>2018-06-13T10:51:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-ransomware-is-changing-cybersecurity-and-what-to-do-about-it/</loc>
		<lastmod>2018-06-13T11:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/electronics-retailer-confirms-breach-attempt-of-5-9m-payment-cards/</loc>
		<lastmod>2018-06-13T11:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/dixons-carphone-data-breach-millions-put-at-risk-of-fraud/</loc>
		<lastmod>2018-06-13T11:44:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/is-there-an-easy-way-to-exclude-paths-from-being-scanned/</loc>
		<lastmod>2018-06-13T11:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-import-targets-into-acunetix/</loc>
		<lastmod>2018-06-13T11:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/russian-censorship-of-telegram/</loc>
		<lastmod>2018-06-13T11:55:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/remote-working-is-on-the-rise-avast/</loc>
		<lastmod>2018-06-13T13:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/powershell-for-pentesters-part-1-introduction-to-powershell-and-cmdlets/</loc>
		<lastmod>2018-06-13T13:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/threat-information-sharing-goes-far-beyond-simply-protecting-businesses/</loc>
		<lastmod>2018-06-13T13:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/two-options-for-evolving-your-ips-solution/</loc>
		<lastmod>2018-06-13T13:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/operation-wire-wire-the-south-florida-cases-part-3/</loc>
		<lastmod>2018-06-13T13:57:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-i-became-leonardo-on-the-blockchain/</loc>
		<lastmod>2018-06-13T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-change-security-behaviors-mobile-security/</loc>
		<lastmod>2018-06-13T14:11:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/after-google-how-program-manager-bill-poplawski-earned-his-cism-launched-consulting-firm-after-retiring/</loc>
		<lastmod>2018-06-13T14:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-impacting-humans-fingerprinting-vs-captcha/</loc>
		<lastmod>2018-06-13T14:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/4-questions-to-ask-before-using-wildcard-certificates/</loc>
		<lastmod>2018-06-13T15:19:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/week-23-cyberattack-digest-2018-myheritage-bitfinex-booking-com-and-others/</loc>
		<lastmod>2018-06-13T15:49:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/report-on-hackmiamicon6/</loc>
		<lastmod>2018-06-13T17:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/vpnfilter-malware-still-making-waves/</loc>
		<lastmod>2018-06-13T17:16:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tufin-debuts-tufin-orca-at-devopscon-berlin/</loc>
		<lastmod>2018-06-13T17:16:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-andrew-hay-and-mikhail-sudakovs-fighting-child-exploitation-with-oculum/</loc>
		<lastmod>2018-06-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/announcing-the-ga-release-of-sourceclear-custom-policies/</loc>
		<lastmod>2018-06-13T18:37:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-infosec-institute-alum-val-vask-stays-current-on-pentesting-scada-standards/</loc>
		<lastmod>2018-06-13T18:40:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/fbi-arrests-74-in-global-takedown-of-business-email-compromise-scammers/</loc>
		<lastmod>2018-06-13T19:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/pci-dss-3-2-1-faqs/</loc>
		<lastmod>2018-06-13T19:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/librarian-sues-equifax-over-2017-data-breach-wins-600/</loc>
		<lastmod>2018-06-13T20:14:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/xkcd-sun-and-earth/</loc>
		<lastmod>2018-06-13T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-viral-threat-doctors-dont-learn-about-in-med-school/</loc>
		<lastmod>2018-06-13T21:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/mobile-security-advances-to-stopping-device-exploits-not-just-detecting-malicious-apps/</loc>
		<lastmod>2018-06-13T22:05:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/apple-code-signing-flaw-developers-beware/</loc>
		<lastmod>2018-06-13T23:54:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/2-strategies-to-tighten-your-cloud-security/</loc>
		<lastmod>2018-06-14T03:34:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cybersecurity-protecting-all-the-endpoints/</loc>
		<lastmod>2018-06-14T03:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/new-build-adds-detection-for-oracle-weblogic-phpunit-edge-side-include-injection-and-more/</loc>
		<lastmod>2018-06-14T08:10:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-much-ransomware-can-cost-your-city-and-your-business/</loc>
		<lastmod>2018-06-14T08:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/guest-essay-3-key-ingredients-to-stress-free-compliance-with-data-handling-regulations/</loc>
		<lastmod>2018-06-14T08:46:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/automated-sql-injection-testing-of-serverless-functions-on-a-shoestring-budget-and-some-good-music/</loc>
		<lastmod>2018-06-14T08:46:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/fbi-arrests-74-alleged-scammers-in-international-financial-fraud-operation/</loc>
		<lastmod>2018-06-14T10:37:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/apple-confirms-its-closing-security-loophole-that-police-were-using-to-crack-iphones/</loc>
		<lastmod>2018-06-14T10:46:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ransomware-attackers-demand-120000-from-dorset-business/</loc>
		<lastmod>2018-06-14T11:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/devsecops-vs-secdevops-vs-devopssec-is-there-really-a-difference-in-these-secure-devops-terms/</loc>
		<lastmod>2018-06-14T13:41:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-rise-of-destructive-botnets/</loc>
		<lastmod>2018-06-14T13:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cupertino-code-signing-the-next-generation-maybe-itll-work/</loc>
		<lastmod>2018-06-14T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/platypuses-and-policies-akamais-approach-to-the-gdpr-and-information-security/</loc>
		<lastmod>2018-06-14T14:32:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/vermont-librarian-scores-symbolic-600-win-against-equifax-in-small-claims-lawsuit/</loc>
		<lastmod>2018-06-14T14:46:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/why-big-companies-ignore-sap-security-patches-and-how-thats-about-to-bite-them-big-time/</loc>
		<lastmod>2018-06-14T15:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/deal-no-deal-the-state-of-u-k-cybersecurity-post-brexit/</loc>
		<lastmod>2018-06-14T15:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/checking-under-the-bed/</loc>
		<lastmod>2018-06-14T15:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/monitoring-data-data-access-to-support-ongoing-gdpr-compliance-part-iii-tools/</loc>
		<lastmod>2018-06-14T15:38:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/gaining-shell-access-via-uart-interface-part-1/</loc>
		<lastmod>2018-06-14T15:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-global-wannacry-cyberattack-increased-windows-10-adoption/</loc>
		<lastmod>2018-06-14T15:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/healthcare-security-in-crisis/</loc>
		<lastmod>2018-06-14T17:07:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/mechanics-behind-ransomware-as-a-service/</loc>
		<lastmod>2018-06-14T17:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/gaining-shell-access-via-uart-interface-part-2/</loc>
		<lastmod>2018-06-14T17:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-is-an-idm-and-how-to-discover-if-you-need-one/</loc>
		<lastmod>2018-06-14T17:10:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/diversity-with-a-side-of-caffeine/</loc>
		<lastmod>2018-06-14T17:22:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-do-you-sell-risk/</loc>
		<lastmod>2018-06-14T17:22:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/microsoft-windows-remote-kernel-crash-vulnerability/</loc>
		<lastmod>2018-06-14T17:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/router-vulnerability-and-the-vpnfilter-botnet/</loc>
		<lastmod>2018-06-14T17:58:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-joshua-tannehills-how-to-tell-cajun-doctors-they-have-bad-cyber-hygiene-and-live/</loc>
		<lastmod>2018-06-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/z-shave-iot-exploit-latest-example-of-why-you-need-machine-identity-protection/</loc>
		<lastmod>2018-06-14T18:32:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/gaining-shell-access-via-uart-interface-part-3/</loc>
		<lastmod>2018-06-14T18:34:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-decline-of-ransomware-and-the-rise-of-cryptocurrency-mining-malware/</loc>
		<lastmod>2018-06-14T18:34:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/chrome-to-mark-http-as-not-secure/</loc>
		<lastmod>2018-06-14T20:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/e-mail-vulnerabilities-and-disclosure/</loc>
		<lastmod>2018-06-14T20:17:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-importance-of-website-backups/</loc>
		<lastmod>2018-06-14T20:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-joy-of-tech-ios-12-protest/</loc>
		<lastmod>2018-06-14T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-the-pageup-hack-is-highlighting-hrs-data-protection-problems/</loc>
		<lastmod>2018-06-14T22:46:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/join-the-incredible-avast-cyber-adventure-this-saturday-avast/</loc>
		<lastmod>2018-06-14T23:10:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-fight-sophisticated-cybercrime-avast/</loc>
		<lastmod>2018-06-14T23:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/siem-alternatives-what-are-they-do-they-exist/</loc>
		<lastmod>2018-06-14T23:11:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-does-consent-to-tracking-really-mean/</loc>
		<lastmod>2018-06-15T00:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/8-steps-for-a-successful-devops-transition/</loc>
		<lastmod>2018-06-15T03:04:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/remote-code-execution-vulnerability-exposes-drupal-to-potential-attacks-2/</loc>
		<lastmod>2018-06-15T05:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cybersecurity-technologies-not-all-it-security-tools-are-created-equal-2/</loc>
		<lastmod>2018-06-15T05:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ssh-worming-cryptominer-targets-vulnerable-weblogic-instances-2/</loc>
		<lastmod>2018-06-15T05:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/insight-into-how-attackers-leverage-docker-security-against-you-2/</loc>
		<lastmod>2018-06-15T05:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/alert-logic-customers-share-their-thoughts-on-cloud-workload-protection-2/</loc>
		<lastmod>2018-06-15T06:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-you-should-know-about-gdpr-compliance-2/</loc>
		<lastmod>2018-06-15T06:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/php-vulnerabilities-old-and-new-part-2-2/</loc>
		<lastmod>2018-06-15T06:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/mdr-a-better-solution-to-preventing-cybercrime/</loc>
		<lastmod>2018-06-15T06:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-security-benefits-behind-the-software-defined-network/</loc>
		<lastmod>2018-06-15T07:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/apple-to-terminate-developers-who-collect-sell-user-data-without-consent/</loc>
		<lastmod>2018-06-15T11:26:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ai-doesnt-eliminate-jobs-it-creates-them/</loc>
		<lastmod>2018-06-15T13:46:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tlds-the-most-abused/</loc>
		<lastmod>2018-06-15T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cissp-cat-exam-deep-dive-study-tips-from-infosec-institute-alum-joe-wauson/</loc>
		<lastmod>2018-06-15T14:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/fake-malware-pop-up-example/</loc>
		<lastmod>2018-06-15T14:47:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/june-vulnerability-of-the-month-electron-vulnerability-out-hyped-by-efail/</loc>
		<lastmod>2018-06-15T15:04:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-use-threat-stack-to-reduce-mean-time-to-know/</loc>
		<lastmod>2018-06-15T15:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/securityiq-update-adds-cdn-capabilities-training-link-generator-and-47-new-modules/</loc>
		<lastmod>2018-06-15T15:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/top-threats-to-online-voting-from-a-cybersecurity-perspective/</loc>
		<lastmod>2018-06-15T15:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/have-you-heard-about-instant-debit-and-credit-card-issuance/</loc>
		<lastmod>2018-06-15T16:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/webinar-qa-delta-risk-experts-define-a-cloud-ready-mssp-and-explain-the-value-of-mdr/</loc>
		<lastmod>2018-06-15T16:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/nist-releases-v1-1-of-the-cybersecurity-framework/</loc>
		<lastmod>2018-06-15T17:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-damon-j-smalls-what-infosec-in-oil-gas-can-teach-us-about-infosec-in-healthcare/</loc>
		<lastmod>2018-06-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/highlights-from-verizon-dbir-2018/</loc>
		<lastmod>2018-06-15T18:48:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/and-again-about-storing-passwords/</loc>
		<lastmod>2018-06-15T20:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-top-15-must-have-books-in-infosec/</loc>
		<lastmod>2018-06-15T20:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/personally-identifiable-information-and-distributed-ledgers/</loc>
		<lastmod>2018-06-15T20:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/federal-agencies-are-at-high-information-security-risk/</loc>
		<lastmod>2018-06-15T20:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/uk-law-enforcement-an-uphill-struggle-to-fight-hackers/</loc>
		<lastmod>2018-06-15T20:46:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/major-microsoft-fixes-and-risky-android-devices-avast/</loc>
		<lastmod>2018-06-15T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/luke-kingma-lou-patrick-mackays-threat-modeling/</loc>
		<lastmod>2018-06-15T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/451-research-explains-preempt-identity-behavior-and-risk/</loc>
		<lastmod>2018-06-15T21:22:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/identity-governance-and-administration-iga-in-it-infrastructure-of-today/</loc>
		<lastmod>2018-06-15T21:46:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-eu-plans-to-adopt-a-cybersecurity-certification-framework/</loc>
		<lastmod>2018-06-15T21:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/avoiding-accidents-on-the-cyber-highway-avast/</loc>
		<lastmod>2018-06-16T13:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/june-16th-update/</loc>
		<lastmod>2018-06-16T13:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-first-cyberattack/</loc>
		<lastmod>2018-06-16T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/black-hills-information-securitys-attack-tactics-part-one/</loc>
		<lastmod>2018-06-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/toolsmith-133-anomaly-detection-threat-hunting-with-anomalize/</loc>
		<lastmod>2018-06-16T18:02:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/xkcd-customer-rewards/</loc>
		<lastmod>2018-06-16T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/notes-on-the-president-is-missing/</loc>
		<lastmod>2018-06-17T05:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cycon-2018-thomas-dulliens-security-moores-law-and-the-anomaly-of-cheap-complexity/</loc>
		<lastmod>2018-06-17T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/black-hills-information-security-attack-tactics-part-two/</loc>
		<lastmod>2018-06-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/robert-m-lee-and-jeff-hass-little-bobby-in-free-services/</loc>
		<lastmod>2018-06-17T22:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-shared-security-weekly-blaze-ultrasonic-hard-drive-attacks-dangerous-usb-devices-email-fraudsters-arrested/</loc>
		<lastmod>2018-06-18T04:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-deep-learning-is-making-computers-better-at-guessing-your-passwords/</loc>
		<lastmod>2018-06-18T04:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/5-mobile-enterprise-data-concerns-to-prepare-for-now/</loc>
		<lastmod>2018-06-18T04:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ransomware-corporate-extortion-key-concerns-for-cios-in-2018-survey-finds/</loc>
		<lastmod>2018-06-18T07:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/banco-de-chile-admits-losing-10-million-in-disk-wiping-malware-attack/</loc>
		<lastmod>2018-06-18T07:54:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/is-ai-for-or-against-cybersecurity/</loc>
		<lastmod>2018-06-18T10:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/us-government-warns-of-more-north-korean-malware-attacks/</loc>
		<lastmod>2018-06-18T10:47:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/banco-de-chile-says-virus-infiltrated-its-computer-systems-stole-10m/</loc>
		<lastmod>2018-06-18T11:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/extortionists-demand-millions-from-liberty-threaten-to-release-sensitive-data-of-top-clients/</loc>
		<lastmod>2018-06-18T11:44:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/six-years-and-counting-inside-the-complex-zacinlo-ad-fraud-operation/</loc>
		<lastmod>2018-06-18T11:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/vasco-rebrands-as-onespan-makes-acquisition-to-support-emerging-mobile-banking-services/</loc>
		<lastmod>2018-06-18T12:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/week-24-cyberattack-digest-2018-banco-de-chile-dixons-carphone-liberty-holdings-and-others/</loc>
		<lastmod>2018-06-18T12:59:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/monday-june-11-dtex-insider-threat-in-the-news-doj-makes-21m-bec-bust-insider-error-caused-3-of-7-breaches-reported-in-california-last-week/</loc>
		<lastmod>2018-06-18T13:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-edward-snowden-made-us-think-about-and-forget-the-insider-threat/</loc>
		<lastmod>2018-06-18T13:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/monday-june-4-dtex-in-the-news-got-vulnerable-people-facebook-has-2-billion-dtex-provides-dark-reading-advice-on-how-to-protect-them/</loc>
		<lastmod>2018-06-18T13:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tuesday-may-29-dtex-ceo-talks-gdpr-on-nbc-coke-insider-breach-nothing-to-smile-about-ransom-is-new-ransom/</loc>
		<lastmod>2018-06-18T13:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/monday-may-21-dtex-itir-headlines-fbis-9-billion-budget-request-highlights-insider-threats/</loc>
		<lastmod>2018-06-18T13:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/vulnerability-the-human-element-insights-from-the-2018-insider-threat-intelligence-report/</loc>
		<lastmod>2018-06-18T13:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/monday-may-14-a-look-at-the-insider-threat-and-dtex-in-the-news/</loc>
		<lastmod>2018-06-18T13:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/news-roundup-week-ending-5-4-18-dtex-insider-threat-in-the-news-smithsonian-computer-network-used-in-insider-attack/</loc>
		<lastmod>2018-06-18T13:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/stf-consulting-celebrates-18-years-in-business-credits-managed-workplace-for-smart-growth-avast-business/</loc>
		<lastmod>2018-06-18T13:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/defending-against-an-automated-attack-chain-are-you-ready/</loc>
		<lastmod>2018-06-18T13:10:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/remote-access-in-a-software-defined-world/</loc>
		<lastmod>2018-06-18T13:27:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/3-reasons-why-you-need-an-incident-response-plan/</loc>
		<lastmod>2018-06-18T13:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-automation-hoaxified/</loc>
		<lastmod>2018-06-18T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/google-to-fix-location-data-leak-in-google-home-chromecast/</loc>
		<lastmod>2018-06-18T14:04:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-does-software-defined-perimeter-mean-to-you/</loc>
		<lastmod>2018-06-18T15:10:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/googles-newest-feature-find-my-home/</loc>
		<lastmod>2018-06-18T15:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/staying-relevant-in-a-technology-world-editorial/</loc>
		<lastmod>2018-06-18T16:09:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/hipaa-gdpr-and-the-dreaded-second-hop-security-problem/</loc>
		<lastmod>2018-06-18T16:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/a-week-in-security-june-11-june-17/</loc>
		<lastmod>2018-06-18T17:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-chris-silvers-and-taylor-banks-on-the-hunt-hacking-the-hunt-group/</loc>
		<lastmod>2018-06-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ethics-of-ethical-hacking/</loc>
		<lastmod>2018-06-19T18:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/4-new-uses-for-blockchain-beyond-cryptocurrency/</loc>
		<lastmod>2018-06-18T19:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/dont-forget-to-reboot-your-router-avast/</loc>
		<lastmod>2018-06-18T19:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/luke-kingma-lou-patrick-mackays-provenance/</loc>
		<lastmod>2018-06-18T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/monday-june-18-dtex-insider-threats-in-the-news-elon-musk-says-insider-sabotaged-tesla-us-inspector-general-says-insider-risk-is-putting-critical-infrastructure-in-jeopardy-cio-australia-reports/</loc>
		<lastmod>2018-06-19T00:35:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ics-security-in-a-nutshell-common-challenges-and-how-tripwire-can-help-overcome-them/</loc>
		<lastmod>2018-06-19T03:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/gartner-security-risk-management-summit-2018-trip-report/</loc>
		<lastmod>2018-06-19T07:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/dixons-carphone-hack-compromises-5-9-million-cards-draws-400m-fine/</loc>
		<lastmod>2018-06-19T07:34:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/saudi-led-coalition-forces-advance-on-al-hudaydah-in-yemen/</loc>
		<lastmod>2018-06-19T08:33:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/leadership-first-security-second/</loc>
		<lastmod>2018-06-19T10:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/french-authorities-take-down-black-hand-dark-web-forum-selling-narcotics-weapons-stolen-banking-data/</loc>
		<lastmod>2018-06-19T10:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-devcentral-chronicles-june-edition-16/</loc>
		<lastmod>2018-06-19T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tesla-saboteur-caused-extensive-damage-and-leaked-highly-sensitive-data-claims-elon-musk/</loc>
		<lastmod>2018-06-19T11:41:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cancer-center-fined-4-3m-for-hipaa-violations-involving-data-breaches/</loc>
		<lastmod>2018-06-19T11:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/adidas-fans-hit-by-phishing-scam/</loc>
		<lastmod>2018-06-19T11:51:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/gain-greater-insight-into-operational-technology-environments/</loc>
		<lastmod>2018-06-19T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/appthority-discovers-thousands-of-apps-with-firebase-vulnerability-exposing-sensitive-data__trashed/</loc>
		<lastmod>2018-06-19T12:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/gdpr-case-studies-and-practical-examples-how-did-companies-start-data-protection/</loc>
		<lastmod>2018-06-19T12:24:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/infosec-institute-guarantees-it-certification-with-infosec-flex-courses/</loc>
		<lastmod>2018-06-19T12:46:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/5-statistics-that-prove-why-your-security-posture-cant-be-purely-reactive/</loc>
		<lastmod>2018-06-19T13:08:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/going-beyond-compliance/</loc>
		<lastmod>2018-06-19T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-changing-face-of-malware-malware-being-used-as-cryptocurrency-miners/</loc>
		<lastmod>2018-06-19T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/facebookery-playtime-in-palo-alto/</loc>
		<lastmod>2018-06-19T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/when-prince-harry-met-access-management/</loc>
		<lastmod>2018-06-19T14:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-change-security-behaviors-social-media/</loc>
		<lastmod>2018-06-19T14:35:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/sciencelogic-sl1-eclipses-demand-with-100-percent-oversubscription-pre-general-availability/</loc>
		<lastmod>2018-06-19T15:21:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/five-easy-ways-to-recognize-and-dispose-of-malicious-emails/</loc>
		<lastmod>2018-06-19T15:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/mirai-botnet-evolution-since-its-source-code-is-available-online/</loc>
		<lastmod>2018-06-19T15:34:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/hospitality-cybersecurity-in-digital-transformation/</loc>
		<lastmod>2018-06-19T15:51:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/indonesian-hacker-group-cashes-in-on-blockbuster-movie-titles/</loc>
		<lastmod>2018-06-19T16:02:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/employees-remain-obstacle-to-security/</loc>
		<lastmod>2018-06-19T16:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/samsam-ransomware-controlled-distribution-for-an-elusive-malware/</loc>
		<lastmod>2018-06-19T16:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/managed-workplace-patch-changes-the-patching-game-avast-business/</loc>
		<lastmod>2018-06-19T16:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/7-things-you-didnt-know-about-avast/</loc>
		<lastmod>2018-06-19T16:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/together-fortinet-and-aws-secure-the-government/</loc>
		<lastmod>2018-06-19T17:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/securithings-unveils-two-click-deployment-to-protect-ip-cameras-against-growing-hacker-threats/</loc>
		<lastmod>2018-06-19T17:51:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-fuzzynop-and-noncetonics-your-mac-defenestrated-post-osxploitation-elevated/</loc>
		<lastmod>2018-06-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/verizon-to-stop-sharing-customer-location-data-with-third-parties/</loc>
		<lastmod>2018-06-19T18:03:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/semperis-is-a-finalist-for-the-2018-red-herring-top-100-north-america-award/</loc>
		<lastmod>2018-06-19T19:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/were-1-and-2-5-and-6-in-gartner-top-10-security-projects/</loc>
		<lastmod>2018-06-19T20:22:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/magento-credit-card-stealer-reinfector/</loc>
		<lastmod>2018-06-19T20:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-joy-of-tech-its-social-medias-fault/</loc>
		<lastmod>2018-06-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/clustering-app-attacks-with-machine-learning-part-3-algorithm-results/</loc>
		<lastmod>2018-06-19T22:41:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tesla-ceo-elon-musk-accuses-employee-of-extensive-and-damaging-sabotage/</loc>
		<lastmod>2018-06-19T23:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/conversations-with-the-inventor-of-wild-card-certificates-part-2-beware-of-the-easy-button/</loc>
		<lastmod>2018-06-20T01:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/thrip-atp-attack-update/</loc>
		<lastmod>2018-06-20T03:46:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/organizational-cybersecurity-at-the-crossroads-of-culture-gdpr/</loc>
		<lastmod>2018-06-20T04:22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/women-in-information-security-susan-ballestero/</loc>
		<lastmod>2018-06-20T04:22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/agencies-step-up-to-data-security-challenge/</loc>
		<lastmod>2018-06-20T07:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/employers-should-reward-staffers-who-dodge-online-scams-thwart-ransomware-study-shows/</loc>
		<lastmod>2018-06-20T08:46:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/will-cryptocurrency-mining-soon-saturate-aws-microsoft-azure-and-google-cloud/</loc>
		<lastmod>2018-06-20T08:47:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/multi-factor-authentication-makes-digital-workspaces-more-secure/</loc>
		<lastmod>2018-06-20T09:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/perverse-vulnerability-from-interaction-between-2-factor-authentication-and-ios-autofill/</loc>
		<lastmod>2018-06-20T11:51:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/mark-your-summer-calendar-for-these-it-and-channel-events-avast-business/</loc>
		<lastmod>2018-06-20T13:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/south-korean-cryptocurrency-exchange-loses-32m-in-heist/</loc>
		<lastmod>2018-06-20T13:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/liongard-raises-1-25m-in-seed-funding-to-bring-unparalleled-automation-to-the-it-managed-service-provider-industry/</loc>
		<lastmod>2018-06-20T13:27:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/usmc-grounds-cots-uavs-security-concerns/</loc>
		<lastmod>2018-06-20T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/protecting-your-serverless-functions-from-event-data-injection-attacks-in-less-than-2-minutes/</loc>
		<lastmod>2018-06-20T14:10:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/training-to-combat-modern-cyber-threats-at-the-nse-emea-xperts-academy/</loc>
		<lastmod>2018-06-20T14:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/why-an-infrastructure-transition-is-the-perfect-time-to-invest-in-security/</loc>
		<lastmod>2018-06-20T14:38:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-executive-guide-to-demystify-cybersecurity/</loc>
		<lastmod>2018-06-20T15:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/boot-camp-no-pain-no-gain/</loc>
		<lastmod>2018-06-20T16:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/psa-recruitment-portals-and-job-sites-at-risk/</loc>
		<lastmod>2018-06-20T17:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-playbook-in-azure-security-center/</loc>
		<lastmod>2018-06-20T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-gartner-ciso-playbook-leveraging-effective-control-in-the-cloud/</loc>
		<lastmod>2018-06-20T17:48:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-stephen-heaths-we-are-the-enemy-of-the-good/</loc>
		<lastmod>2018-06-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/4-ways-machine-identities-will-challenge-you/</loc>
		<lastmod>2018-06-20T19:13:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/fake-fortnite-for-android-links-found-on-youtube/</loc>
		<lastmod>2018-06-20T19:46:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/router-malware-worse-than-experts-realize/</loc>
		<lastmod>2018-06-20T20:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/june-20th-android-ios-news/</loc>
		<lastmod>2018-06-20T20:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/brookhaven-rhic/</loc>
		<lastmod>2018-06-20T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/beginners-guide-to-pentesting-iot-architecture-network-and-setting-up-iot-pentesting-lab-part-1/</loc>
		<lastmod>2018-06-21T00:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cybersecurity-in-the-digital-business-transformation-era/</loc>
		<lastmod>2018-06-21T03:10:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/free-societies-are-at-a-disadvantage-in-national-cybersecurity/</loc>
		<lastmod>2018-06-21T03:11:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/beginners-guide-to-pentesting-iot-architecture-network-and-setting-up-iot-pentesting-lab-part-2/</loc>
		<lastmod>2018-06-21T03:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/infosecurity-europe-survey-security-professionals-gearing-up-for-rise-in-nation-state-attacks/</loc>
		<lastmod>2018-06-21T03:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tripwirebookclub-serious-cryptography/</loc>
		<lastmod>2018-06-21T03:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/attention-all-businesses-data-security-is-the-way-to-your-customers-hearts-and-wallets/</loc>
		<lastmod>2018-06-21T07:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tesla-sabotage-highlights-danger-of-insider-threat/</loc>
		<lastmod>2018-06-21T08:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/guest-essay-heres-why-tesla-has-been-sabotaged-twice-in-two-years-lax-network-security/</loc>
		<lastmod>2018-06-21T09:05:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/take-the-avast-quiz/</loc>
		<lastmod>2018-06-21T10:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/new-samsam-ransomware-version-involves-direct-attacker-involvement/</loc>
		<lastmod>2018-06-21T11:10:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-fbis-10-most-wanted-black-hat-hackers-2/</loc>
		<lastmod>2018-06-21T11:10:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/black-river-medical-center-employee-falls-for-phishing-scam-breach-ensues/</loc>
		<lastmod>2018-06-21T11:21:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/sumeru-solutions-netsparker-case-study/</loc>
		<lastmod>2018-06-21T12:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/101-aws-security-tips-quotes-part-1-essential-security-practices/</loc>
		<lastmod>2018-06-21T13:26:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/usv-2017-part-1-ctf-walkthrough/</loc>
		<lastmod>2018-06-21T13:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/phishing-around-the-world-how-attack-volume-grew-in-the-last-year/</loc>
		<lastmod>2018-06-21T13:54:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/thievery-in-the-usa-uk-the-self-checkout-first-world-miscreant/</loc>
		<lastmod>2018-06-21T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/med-associates-breach-leaves-270000-patient-records-at-risk/</loc>
		<lastmod>2018-06-21T14:11:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/resolving-the-challenges-of-it-ot-convergence/</loc>
		<lastmod>2018-06-21T14:22:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/machine-learning-algorithms-for-zero-time-to-mitigation/</loc>
		<lastmod>2018-06-21T14:34:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/data-breaches-how-can-they-be-prevented/</loc>
		<lastmod>2018-06-21T14:51:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/whats-causing-the-cybersecurity-skills-gap/</loc>
		<lastmod>2018-06-21T15:35:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/hold-on-for-your-life-gdpr-has-landed-and-is-making-its-impact-felt-quickly/</loc>
		<lastmod>2018-06-21T16:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/four-ways-security-teams-sabotage-their-own-efforts/</loc>
		<lastmod>2018-06-21T16:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/60000-android-devices-hit-by-battery-saving-app-attack/</loc>
		<lastmod>2018-06-21T16:22:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/interview-pitfalls-of-bsa-aml-research-on-the-web/</loc>
		<lastmod>2018-06-21T17:08:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/kioptrix-vms-challenge-walkthrough/</loc>
		<lastmod>2018-06-21T17:46:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/mergers-acquisitions-and-malware/</loc>
		<lastmod>2018-06-21T17:48:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-nathan-wallace-and-luke-heberts-taking-out-the-power-grids-middleman/</loc>
		<lastmod>2018-06-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/my-take-knowing-these-5-concepts-will-protect-you-from-illicit-cryptocurrency-mining/</loc>
		<lastmod>2018-06-21T19:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-is-a-chain-certificate-for-ev-multi-domain-certificates/</loc>
		<lastmod>2018-06-21T20:04:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-strengthen-your-cyber-security-dna/</loc>
		<lastmod>2018-06-21T20:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/does-the-gdpr-threaten-the-development-of-blockchain/</loc>
		<lastmod>2018-06-21T20:10:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/why-you-should-care-about-website-security-on-your-small-site/</loc>
		<lastmod>2018-06-21T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/luke-kingma-lou-patrick-mackays-modern-mining/</loc>
		<lastmod>2018-06-21T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/getting-paid-for-breaking-things-the-fundamentals-of-bug-bounty/</loc>
		<lastmod>2018-06-21T21:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-develop-a-mature-security-awareness-program/</loc>
		<lastmod>2018-06-21T21:34:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/is-security-just-too-damn-hard-is-productservice-the-future/</loc>
		<lastmod>2018-06-21T22:25:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-protect-your-privacy-on-the-web/</loc>
		<lastmod>2018-06-22T02:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/celebrating-international-women-in-engineering-day-meet-lucy/</loc>
		<lastmod>2018-06-22T07:34:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/amplified-ddos-attacks-are-here-to-stay-experts-say/</loc>
		<lastmod>2018-06-22T07:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cisco-patches-critical-flaws-in-many-of-its-switches-and-security-appliances/</loc>
		<lastmod>2018-06-22T09:16:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bevx-conference-challenge-hitb/</loc>
		<lastmod>2018-06-22T12:10:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/state-officials-request-more-federal-money-for-election-security/</loc>
		<lastmod>2018-06-22T12:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/is-it-a-phish-june-22-edition/</loc>
		<lastmod>2018-06-22T13:49:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/three-options-for-managing-secure-wireless-access/</loc>
		<lastmod>2018-06-22T13:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/webauthn-passwordless-authentication/</loc>
		<lastmod>2018-06-22T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/three-new-threats-at-large-and-one-thrown-behind-bars-avast/</loc>
		<lastmod>2018-06-22T14:10:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/3-things-to-know-about-kubernetes-security/</loc>
		<lastmod>2018-06-22T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/scaling-network-security-the-new-network-security-requirements/</loc>
		<lastmod>2018-06-22T15:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-does-compliance-with-owasp-really-mean-for-financial-institutions/</loc>
		<lastmod>2018-06-22T17:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-effects-of-irans-telegram-ban/</loc>
		<lastmod>2018-06-22T17:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-stellas-privacy-for-safety-how-can-we-help-vulnerable-groups-with-privacy/</loc>
		<lastmod>2018-06-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/5-ways-to-leverage-secure-messaging-to-engage-with-your-patients-and-improve-health-outcomes/</loc>
		<lastmod>2018-06-22T18:56:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-energy-industry-under-attack-secure-communications-a-must/</loc>
		<lastmod>2018-06-22T18:56:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/its-time-for-organizations-to-embrace-secure-messaging/</loc>
		<lastmod>2018-06-22T18:56:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/secure-messaging-in-incident-response-and-business-continuity/</loc>
		<lastmod>2018-06-22T18:56:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/responding-to-international-events-communication-at-all-levels/</loc>
		<lastmod>2018-06-22T18:56:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cyber-phishing/</loc>
		<lastmod>2018-06-22T18:56:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/public-health-emergencies-addressing-the-communication-challenges/</loc>
		<lastmod>2018-06-22T18:56:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/facebook-scandal-a-call-to-be-more-vigilant-about-your-privacy/</loc>
		<lastmod>2018-06-22T18:56:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/five-less-commonly-discussed-facts-about-ransomware-everyone-should-know/</loc>
		<lastmod>2018-06-22T18:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/supreme-court-police-need-warrant-for-mobile-location-data/</loc>
		<lastmod>2018-06-22T20:30:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/android-anti-spoofing/</loc>
		<lastmod>2018-06-22T20:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-leverage-data-access-analytics-for-effective-breach-detection/</loc>
		<lastmod>2018-06-22T20:36:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/xkcd-hertzsprung-russell-diagram/</loc>
		<lastmod>2018-06-22T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ccna-certification-requirements-how-to-become-ccna-certified/</loc>
		<lastmod>2018-06-22T23:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/creative-hiring-from-non-traditional-places/</loc>
		<lastmod>2018-06-23T01:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/quantum-of-saturday/</loc>
		<lastmod>2018-06-23T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-will-caputs-cash-in-the-aisles-how-gift-aards-are-easily-exploited/</loc>
		<lastmod>2018-06-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/daniel-storis-math-class-2018/</loc>
		<lastmod>2018-06-23T21:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/robert-m-lee-and-jeff-hass-resource-allocation/</loc>
		<lastmod>2018-06-24T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/5-fundamental-incident-response-checklists/</loc>
		<lastmod>2018-06-24T12:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/remember-gdpr-wait-till-you-experience-article-13/</loc>
		<lastmod>2018-06-24T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-todd-carrs-mind-games-exploring-mental-health-through-games/</loc>
		<lastmod>2018-06-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/smb-version-detection-in-masscan/</loc>
		<lastmod>2018-06-24T23:39:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/four-cyber-security-risks-and-how-to-address-them/</loc>
		<lastmod>2018-06-25T03:10:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/securing-the-build-environment-a-critical-component-of-container-security/</loc>
		<lastmod>2018-06-25T03:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-shared-security-weekly-blaze-mylobot-malware-updates-on-third-party-location-data-sharing-fortnite-scam-websites/</loc>
		<lastmod>2018-06-25T04:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/beware-malicious-software-updates-for-legitimate-apps/</loc>
		<lastmod>2018-06-25T07:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/weaponizing-gdpr-when-right-to-be-forgotten-gets-ugly-2/</loc>
		<lastmod>2018-06-25T10:38:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-gdpr-improves-the-user-experience/</loc>
		<lastmod>2018-06-25T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/oaic-told-to-investigate-healthengines-sharing-client-data-with-lawyers/</loc>
		<lastmod>2018-06-25T12:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-supremes-warrants-required/</loc>
		<lastmod>2018-06-25T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-why-and-how-of-advanced-email-security/</loc>
		<lastmod>2018-06-25T14:34:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/no-more-atms-running-windows-xp-shouts-reserve-bank-of-india/</loc>
		<lastmod>2018-06-25T14:36:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/can-devsecops-boost-your-bottom-line/</loc>
		<lastmod>2018-06-25T14:39:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/beyond-the-looking-glass-the-ott-evolution-in-india/</loc>
		<lastmod>2018-06-25T15:30:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/visualizing-detection-remediation-in-the-cloud-with-graylog-webinar-recap/</loc>
		<lastmod>2018-06-25T15:37:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-internet-of-things-and-machine-identity-protection-the-lack-of-security/</loc>
		<lastmod>2018-06-25T16:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/pci-and-file-integrity-monitoring-for-businesses/</loc>
		<lastmod>2018-06-25T16:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/did-my-comment-on-your-blog-get-lost/</loc>
		<lastmod>2018-06-25T17:34:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/a-week-in-security-june-18-june-24/</loc>
		<lastmod>2018-06-25T17:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/does-your-security-solution-protect-against-gdpr-non-compliance/</loc>
		<lastmod>2018-06-25T17:42:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-nancy-snokes-phoenix-snokes-jump-into-iot-hacking-with-damn-vulnerable-habit-helper-iot-device/</loc>
		<lastmod>2018-06-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-is-good-governance-in-the-age-of-office-365/</loc>
		<lastmod>2018-06-25T18:07:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/luke-kingma-lou-patrick-mackays-instagram-or-non-instagram/</loc>
		<lastmod>2018-06-25T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/monday-june-25-dtex-insider-threat-in-the-news-dtex-ceo-christy-wyatt-speaks-to-dark-reading-about-tesla-insider-attack-nbc-about-privacy-and-scotus-cell-phone-decision-techs-mega-playe/</loc>
		<lastmod>2018-06-25T21:25:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/organizing-video-clips-for-an-online-course/</loc>
		<lastmod>2018-06-25T22:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/federal-agencies-fell-short-in-assessments-of-cybersecurity-employees-finds-report/</loc>
		<lastmod>2018-06-26T03:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/making-continuous-hipaa-compliance-easy-with-expertops/</loc>
		<lastmod>2018-06-26T03:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/five-predictions-for-gdpr/</loc>
		<lastmod>2018-06-26T07:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/positive-com-ico-projects-contain-five-security-vulnerabilities-on-average/</loc>
		<lastmod>2018-06-26T07:09:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-blockchain-can-improve-internet-of-things-security/</loc>
		<lastmod>2018-06-26T07:46:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cloud-migration-strategies-for-smbs/</loc>
		<lastmod>2018-06-26T08:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/three-ways-instant-issuance-transforms-the-customer-experience/</loc>
		<lastmod>2018-06-26T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/apple-will-soon-require-certificate-transparency-for-all-public-ssl-tls-certificates/</loc>
		<lastmod>2018-06-26T10:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/whats-the-difference-between-se-labs-and-a-cyber-criminal/</loc>
		<lastmod>2018-06-26T11:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cisco-asa-exploited-in-the-wild-fxos-nx-os-get-high-priority-patches/</loc>
		<lastmod>2018-06-26T12:24:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/house-passes-bill-designed-to-help-protect-industrial-control-systems/</loc>
		<lastmod>2018-06-26T12:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/visit-us-at-owasp-appsec-eu-2018/</loc>
		<lastmod>2018-06-26T12:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/integrating-acunetix-in-your-web-applications-jenkins-pipeline/</loc>
		<lastmod>2018-06-26T12:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/new-build-adds-detection-of-vulnerabilities-in-wordpress-django-multiple-spring-framework-and-atlassian-products/</loc>
		<lastmod>2018-06-26T12:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/deserialization-vulnerabilities-attacking-deserialization-in-js/</loc>
		<lastmod>2018-06-26T12:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-social-media-threatens-personal-and-corporate-security/</loc>
		<lastmod>2018-06-26T13:03:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/101-aws-security-tips-quotes-part-2-securing-your-aws-environment/</loc>
		<lastmod>2018-06-26T13:13:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/confidential-computing-a-silver-bullet-for-the-cloud/</loc>
		<lastmod>2018-06-26T13:14:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/for-financial-services-encryption-is-essential-but-so-is-performance/</loc>
		<lastmod>2018-06-26T13:22:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/stay-a-step-ahead-of-todays-bigger-badder-cyberthreats-avast/</loc>
		<lastmod>2018-06-26T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tenable-research-may-vulnerability-disclosure-roundup/</loc>
		<lastmod>2018-06-26T13:59:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/webapp-security-my-experience-leading-a-purple-team/</loc>
		<lastmod>2018-06-26T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/battling-cyber-risks-with-intelligent-automation/</loc>
		<lastmod>2018-06-26T14:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/if-you-still-use-pgp-read-this-now/</loc>
		<lastmod>2018-06-26T14:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bypassing-passcodes-in-ios/</loc>
		<lastmod>2018-06-26T14:38:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/powershell-for-pentesters-part-2-the-essentials-of-powershell/</loc>
		<lastmod>2018-06-26T15:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-vulnerabilities-of-cryptocurrency-exchanges/</loc>
		<lastmod>2018-06-26T16:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/reflecting-on-uptycs-series-a-milestone/</loc>
		<lastmod>2018-06-26T16:45:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/osquery-in-action-where-and-when-to-apply-threat-intel/</loc>
		<lastmod>2018-06-26T16:45:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/securing-containers-using-osquery-to-solve-new-challenges-posed-by-hosted-orchestration-services/</loc>
		<lastmod>2018-06-26T16:45:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/does-osquery-violate-gdpr-rules-around-personally-identifiable-data-pii/</loc>
		<lastmod>2018-06-26T16:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cloud-workloads-not-the-same-ol-endpoints/</loc>
		<lastmod>2018-06-26T16:46:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/osquery-security-solutions-build-or-buy/</loc>
		<lastmod>2018-06-26T16:46:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/open-source-hasnt-disrupted-security-yet/</loc>
		<lastmod>2018-06-26T16:46:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/is-your-mac-fleet-secure-tackling-the-myth-of-inherent-mac-security/</loc>
		<lastmod>2018-06-26T16:46:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/sql-introduction-for-osquery/</loc>
		<lastmod>2018-06-26T16:46:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/infrastructure-management-has-evolved-has-your-continuous-monitoring/</loc>
		<lastmod>2018-06-26T16:46:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/this-isnt-a-tech-thriller-iot-attacks-are-real/</loc>
		<lastmod>2018-06-26T17:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/qa-series-with-rsac-apj-ambassador-magda-chelly/</loc>
		<lastmod>2018-06-26T17:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/a-closer-look-at-the-ca-veracode-sourceclear-solution/</loc>
		<lastmod>2018-06-26T17:33:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/semperis-chosen-as-a-2018-red-herring-top-100-north-america-winner/</loc>
		<lastmod>2018-06-26T17:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-avoid-card-skimmers-at-the-pump/</loc>
		<lastmod>2018-06-26T17:59:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-imani-palmer-s-the-future-of-digital-forensics/</loc>
		<lastmod>2018-06-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/privacy-and-your-ancestry-the-implications-of-sharing-data/</loc>
		<lastmod>2018-06-26T18:16:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-secure-application-development-and-deployment-concepts/</loc>
		<lastmod>2018-06-26T20:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-implementing-secure-systems-design/</loc>
		<lastmod>2018-06-26T20:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-implementing-secure-network-architecture-concepts/</loc>
		<lastmod>2018-06-26T20:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-domain-3-architecture-and-design/</loc>
		<lastmod>2018-06-26T20:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/8-concrete-benefits-that-come-from-achieving-pci-dss-compliance/</loc>
		<lastmod>2018-06-26T20:36:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-joy-of-tech-perfection/</loc>
		<lastmod>2018-06-26T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-are-website-backdoors/</loc>
		<lastmod>2018-06-26T21:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-technologies-and-tools-load-balancer/</loc>
		<lastmod>2018-06-26T21:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-technologies-and-tools-proxy/</loc>
		<lastmod>2018-06-26T21:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-are-hardware-security-modules-and-why-are-they-important-to-your-organization/</loc>
		<lastmod>2018-06-26T21:55:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/can-you-do-a-siem-less-soc/</loc>
		<lastmod>2018-06-26T23:24:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-cited-as-the-top-reason-why-organizations-use-web-filtering-at-the-workplace-survey-finds/</loc>
		<lastmod>2018-06-27T04:04:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/malicious-android-app/</loc>
		<lastmod>2018-06-27T05:34:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-strategies-that-federal-agencies-can-employ-to-enable-digital-transformation/</loc>
		<lastmod>2018-06-27T07:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/entrust-datacard-supports-the-london-protocol/</loc>
		<lastmod>2018-06-27T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bitdefender-named-a-leader-by-forrester-research-in-q2-2018-forrester-wave-evaluation-of-endpoint-security-suites/</loc>
		<lastmod>2018-06-27T09:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/twitter-gets-physical-with-support-for-hardware-security-keys/</loc>
		<lastmod>2018-06-27T10:49:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/announcing-the-trail-of-bits-osquery-support-group/</loc>
		<lastmod>2018-06-27T11:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/japanese-hotel-chain-notifies-125k-guests-of-software-provider-breach/</loc>
		<lastmod>2018-06-27T11:52:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/is-your-devops-secure/</loc>
		<lastmod>2018-06-27T12:23:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/webinar-bug-hunting-as-a-second-income-july-11-2018/</loc>
		<lastmod>2018-06-27T12:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/state-of-serverless-security-survey-2018-results/</loc>
		<lastmod>2018-06-27T13:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/serverless-security-forensic-data-analysis-with-puresec/</loc>
		<lastmod>2018-06-27T13:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-partners-can-mitigate-cyber-risk-for-smb-customers/</loc>
		<lastmod>2018-06-27T13:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-exploitations-of-password-managers-web-tracker-edition/</loc>
		<lastmod>2018-06-27T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/weve-raised-27-5-million-how-preempts-funding-validates-identity-and-access-threat-prevention/</loc>
		<lastmod>2018-06-27T14:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/consistently-high-piracy-levels-off-nigeria-likely-to-lead-to-increased-shipping-costs/</loc>
		<lastmod>2018-06-27T14:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/personal-security-hygiene/</loc>
		<lastmod>2018-06-27T14:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-temporal-sharding-helps-to-ease-the-challenge-of-growing-ct-log-scale/</loc>
		<lastmod>2018-06-27T15:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cipher-distinguished-as-a-top-15-american-based-gdpr-advisor/</loc>
		<lastmod>2018-06-27T15:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/harris-poll-shows-how-to-gain-employee-support-for-monitoring-programs-and-avoid-privacy-invasions/</loc>
		<lastmod>2018-06-27T16:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/weirdaal-aws-attack-library-basics-from-the-authors/</loc>
		<lastmod>2018-06-27T16:22:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-is-secops-a-definition-benefits-best-practices-and-more/</loc>
		<lastmod>2018-06-27T16:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/keeping-kids-safe-online/</loc>
		<lastmod>2018-06-27T17:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-paul-w-brager-jr-s-changing-the-game-the-impact-of-trisis-triton-on-defending-ics-scada-iiot/</loc>
		<lastmod>2018-06-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tufin-takes-over-barcelona-at-tufinnovate-emea/</loc>
		<lastmod>2018-06-27T18:47:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/world-cup-2018-malware-attacks-gunning-for-goal/</loc>
		<lastmod>2018-06-27T19:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/5-helpful-incident-response-checklists/</loc>
		<lastmod>2018-06-27T19:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/lessons-from-npetya-one-year-later/</loc>
		<lastmod>2018-06-27T19:49:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ticketmaster-warns-of-data-breach-customer-payment-details-potentially-exposed/</loc>
		<lastmod>2018-06-27T20:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/xkcd-newtons-trajectories/</loc>
		<lastmod>2018-06-27T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-the-ca-veracode-verified-continuous-tier-looks-like/</loc>
		<lastmod>2018-06-27T21:38:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/red-hen-website-suffers-seo-spam-compromise/</loc>
		<lastmod>2018-06-27T21:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-cloud-and-virtualization-concepts/</loc>
		<lastmod>2018-06-27T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-security-implications-of-embedded-systems/</loc>
		<lastmod>2018-06-27T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-deploying-mobile-devices-securely-5-top-tips/</loc>
		<lastmod>2018-06-27T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-technologies-and-tools-siem/</loc>
		<lastmod>2018-06-27T21:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-technologies-and-tools-access-point/</loc>
		<lastmod>2018-06-27T21:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-how-to-identify-indicators-of-compromise-and-differentiate-different-types-of-malware/</loc>
		<lastmod>2018-06-27T21:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-a-guide-to-ramifications-associated-with-different-vulnerabilities/</loc>
		<lastmod>2018-06-27T21:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-how-to-explain-threat-actor-types-and-attributes/</loc>
		<lastmod>2018-06-27T21:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-much-malware-can-you-stuff-into-an-attack/</loc>
		<lastmod>2018-06-27T22:10:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-risk-management-processes-and-concepts/</loc>
		<lastmod>2018-06-27T23:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-business-impact-analysis-concepts/</loc>
		<lastmod>2018-06-27T23:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-domain-5-risk-management/</loc>
		<lastmod>2018-06-27T23:22:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-differentiating-common-account-management-practices/</loc>
		<lastmod>2018-06-27T23:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-how-resiliency-and-automation-strategies-reduce-risk/</loc>
		<lastmod>2018-06-27T23:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/will-dropping-serialization-from-java-remove-the-vulnerabilities/</loc>
		<lastmod>2018-06-28T00:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/hydroelectric-dams-and-ics-security/</loc>
		<lastmod>2018-06-28T04:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/visibility-an-essential-component-of-industrial-cyber-security/</loc>
		<lastmod>2018-06-28T04:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/enterprise-saas-and-threats-to-your-data/</loc>
		<lastmod>2018-06-28T07:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/manipulative-social-media-practices/</loc>
		<lastmod>2018-06-28T11:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ticketmaster-breached-for-months-personal-data-stolen-by-hackers/</loc>
		<lastmod>2018-06-28T13:39:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ferruh-mavituna-is-interviewed-about-web-app-security/</loc>
		<lastmod>2018-06-28T14:03:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/as-2-factor-authentication-falls-short-adaptive-multi-factor-authentication-goes-mainstream/</loc>
		<lastmod>2018-06-28T15:02:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/european-commission-official-says-gdpr-should-apply-to-old-major-breaches/</loc>
		<lastmod>2018-06-28T15:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-will-it-take-to-accelerate-connected-car-security/</loc>
		<lastmod>2018-06-28T15:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/inner-circle-podcast-episode-009-scott-scheferman-explains-predictive-advantage/</loc>
		<lastmod>2018-06-28T15:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/first-state-of-serverless-security-survey-results-released-by-puresec/</loc>
		<lastmod>2018-06-28T15:21:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/ueba-and-evolved-siem-foundations-of-the-intelligent-soc/</loc>
		<lastmod>2018-06-28T15:23:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/hitherto-unknown-marketing-firm-exposed-hundreds-of-millions-of-americans-data/</loc>
		<lastmod>2018-06-28T15:23:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/restaurant-chain-struck-by-payment-card-data-breach/</loc>
		<lastmod>2018-06-28T15:23:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/recent-security-research-news/</loc>
		<lastmod>2018-06-28T15:23:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-have-a-safe-cyber-summer/</loc>
		<lastmod>2018-06-28T15:23:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/it-only-takes-6000-smart-phones-to-take-down-our-public-emergency-response-system/</loc>
		<lastmod>2018-06-28T15:34:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/tor-mozilla-cozy-up/</loc>
		<lastmod>2018-06-28T15:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/celebrating-30-years-of-avast-avast/</loc>
		<lastmod>2018-06-28T15:46:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/a-history-of-freedom-avast/</loc>
		<lastmod>2018-06-28T15:46:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/starttls-everywhere-properly-configuring-machine-identities-for-tls-encryption-on-email-servers/</loc>
		<lastmod>2018-06-28T15:52:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/from-top-to-bottom-state-of-cyber-security-in-healthcare-is-a-national-concern/</loc>
		<lastmod>2018-06-28T16:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-incident-response-procedures/</loc>
		<lastmod>2018-06-28T16:47:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/internet-safety-month-how-to-manage-your-childs-online-presence/</loc>
		<lastmod>2018-06-28T16:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/want-machine-identity-intelligence-across-mobile-devices-check-out-venafi-enterprise-mobility-protect/</loc>
		<lastmod>2018-06-28T17:22:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/plant-your-flag-mark-your-territory/</loc>
		<lastmod>2018-06-28T17:50:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-to-change-security-behaviors-information-security/</loc>
		<lastmod>2018-06-28T17:50:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-esteban-rodriguez-s-ducky-in-the-middle-injecting-keystrokes-into-plaintext-protocols/</loc>
		<lastmod>2018-06-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/security-disaster-recovery-security/</loc>
		<lastmod>2018-06-28T18:10:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/an-analysis-of-the-use-after-free-bug-in-the-microsoft-edge-chakra-engine-cve-2018-0946/</loc>
		<lastmod>2018-06-28T18:10:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cybersecurity-career-path-a-fresh-perspective/</loc>
		<lastmod>2018-06-28T18:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/luke-kingma-lou-patrick-mackays-door-to-door-data-miners/</loc>
		<lastmod>2018-06-28T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/rallying-the-troops-for-gdpr/</loc>
		<lastmod>2018-06-28T21:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-starbucks-combats-account-takeover-ato/</loc>
		<lastmod>2018-06-28T22:01:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/my-take-these-7-nation-state-backed-hacks-have-put-us-on-the-brink-of-a-global-cyber-war/</loc>
		<lastmod>2018-06-29T00:51:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-shared-security-podcast-episode-77-personal-risk-assessments-stingray-surveillance-devices/</loc>
		<lastmod>2018-06-29T04:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/organizations-prioritize-regulatory-compliance-over-risk-assessment-study-says/</loc>
		<lastmod>2018-06-29T08:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/internal-breaches-the-threat-thats-too-close-to-home-2/</loc>
		<lastmod>2018-06-29T09:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/trail-of-bits-donates-100000-to-support-young-researchers-through-summercon/</loc>
		<lastmod>2018-06-29T11:50:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cis-adapts-critical-security-controls-to-industrial-control-systems/</loc>
		<lastmod>2018-06-29T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/adidas-alerts-customers-of-possible-data-security-incident/</loc>
		<lastmod>2018-06-29T12:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/data-breaches-fortnite-flim-flam-and-a-whammy-of-a-cyberattack-avast/</loc>
		<lastmod>2018-06-29T13:34:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/wpa3-what-you-need-to-know/</loc>
		<lastmod>2018-06-29T13:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/california-gdpr/</loc>
		<lastmod>2018-06-29T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-instrumental-role-that-ftc-plays-in-data-privacy-policy-and-enforcement/</loc>
		<lastmod>2018-06-29T15:31:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/staying-ahead-of-the-threat-landscape/</loc>
		<lastmod>2018-06-29T16:34:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/video-tutorial-paraben-e3-platform-and-mobile-phone-pentesting/</loc>
		<lastmod>2018-06-29T16:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cgeit-domain-1-framework-for-the-governance-of-enterprise-it/</loc>
		<lastmod>2018-06-29T16:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/qa-series-with-rsac-apj-ambassador-matt-alderman/</loc>
		<lastmod>2018-06-29T17:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/3-ways-to-attempt-byod-and-iot-security-2/</loc>
		<lastmod>2018-06-29T17:15:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-john-sonnenscheins-max-feldmans-gamifying-developer-education-with-ctfs/</loc>
		<lastmod>2018-06-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/major-data-breaches-at-adidas-ticketmaster-pummel-web-users/</loc>
		<lastmod>2018-06-29T19:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-ca-veracodes-integrations-with-defect-tracking-systems-enable-devsecops/</loc>
		<lastmod>2018-06-29T20:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/analogue-password-management/</loc>
		<lastmod>2018-06-29T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/aftershocks-of-gdpr-making-sense-of-the-business-wide-effects-of-new-data-privacy-laws/</loc>
		<lastmod>2018-06-29T21:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/sucuri-enhances-security-by-disabling-tls-version-1-0-and-1-1/</loc>
		<lastmod>2018-06-29T21:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/hybrid-soc-scenarios/</loc>
		<lastmod>2018-06-29T21:54:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/a-cisos-perspective-solving-a-20-year-cyber-security-problem/</loc>
		<lastmod>2018-06-29T22:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/you-have-2-days-to-replace-tls-1-0-certificates-before-risking-pci-compliance-what-do-you-do/</loc>
		<lastmod>2018-06-30T02:17:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/mta-strict-transport-the-hardening/</loc>
		<lastmod>2018-06-30T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bens-book-of-the-month-review-of-a-data-driven-computer-security-defense-the-computer-security-defense-you-should-be-using/</loc>
		<lastmod>2018-06-30T16:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/bsides-nolacon-2018-sean-metcalfs-active-directory-security-the-journey/</loc>
		<lastmod>2018-06-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/connected-feedback-loops-in-application-security-understand-offense-to-inform-defense/</loc>
		<lastmod>2018-06-30T18:20:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/xkcd-thorough-analysis/</loc>
		<lastmod>2018-06-30T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/memphis-bec-scammers-arrested-and-at-large/</loc>
		<lastmod>2018-07-01T10:49:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-biggest-mistakes-to-avoid-with-incident-response/</loc>
		<lastmod>2018-07-01T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/docker-hub-the-backdoor/</loc>
		<lastmod>2018-07-01T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-psychology-of-talking-paper/</loc>
		<lastmod>2018-07-01T17:20:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bsides-nolacon-2018-brett-gravoiss-http2-and-you/</loc>
		<lastmod>2018-07-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/scaling-network-security-the-scaled-network-security-architecture/</loc>
		<lastmod>2018-07-01T18:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/robert-m-lee-and-jeff-hass-tradition/</loc>
		<lastmod>2018-07-01T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/book-review-the-mission-the-men-and-me/</loc>
		<lastmod>2018-07-01T21:24:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/harpoon-cannon-method-how-scammers-catch-bitcoin-whales/</loc>
		<lastmod>2018-07-02T03:22:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-scammers-use-google-for-business-email-compromise/</loc>
		<lastmod>2018-07-02T03:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/this-day-in-history-gettysburg-shoes/</loc>
		<lastmod>2018-07-02T03:28:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-shared-security-weekly-blaze-new-wpa3-wireless-standard-malicious-smartphone-batteries-exactis-data-leak/</loc>
		<lastmod>2018-07-02T04:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/notpetya-ransomware-still-costing-industries-millions-in-recovery/</loc>
		<lastmod>2018-07-02T07:22:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/it-all-starts-with-identity/</loc>
		<lastmod>2018-07-02T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-race-for-our-attention-what-do-we-really-want-to-do-in-our-lives/</loc>
		<lastmod>2018-07-02T09:51:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ai-bias-validated/</loc>
		<lastmod>2018-07-02T10:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/appsec-policies-get-with-the-times/</loc>
		<lastmod>2018-07-02T11:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/hack2win-extreme-warm-up/</loc>
		<lastmod>2018-07-02T11:34:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/freeing-pdf-data-to-account-for-the-unaccounted/</loc>
		<lastmod>2018-07-02T11:39:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/us-homeland-securitys-ice-demands-twitter-release-data-on-cryptic-flash-gordon-account/</loc>
		<lastmod>2018-07-02T12:53:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ssd-advisory-phpmyadmin-file-inclusion-and-remote-code-execution/</loc>
		<lastmod>2018-07-02T12:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/gcih-certification-overview/</loc>
		<lastmod>2018-07-02T13:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/identifying-security-priorities-to-address-new-healthcare-cyber-threats/</loc>
		<lastmod>2018-07-02T13:34:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/do-you-expect-more-from-your-browser-avast/</loc>
		<lastmod>2018-07-02T13:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/apple-targets-developer-abusers-of-contacts/</loc>
		<lastmod>2018-07-02T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-you-should-consider-access-management-part-1/</loc>
		<lastmod>2018-07-02T14:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/pentesters-guide-to-iot-penetration-testing/</loc>
		<lastmod>2018-07-02T14:46:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/inner-circle-podcast-episode-010-bill-mann-talks-devops-and-election-security/</loc>
		<lastmod>2018-07-02T15:10:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-california-consumer-privacy-act-of-2018-ab-375-what-you-need-to-know/</loc>
		<lastmod>2018-07-02T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/detecting-data-breaches-with-honeywords/</loc>
		<lastmod>2018-07-02T16:11:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/read-our-top-picks-for-2018s-biggest-cybersecurity-stories-so-far/</loc>
		<lastmod>2018-07-02T16:55:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/five-techniques-to-bypass-office-365-protections-used-in-real-phishing-campaigns/</loc>
		<lastmod>2018-07-02T17:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/comptia-pentest-a-new-certification-option/</loc>
		<lastmod>2018-07-02T17:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-you-need-mdr-to-combat-current-and-emerging-threats/</loc>
		<lastmod>2018-07-02T17:38:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/sans-webcast-larry-pesces-software-defined-radio-for-penetration-testing-and-analysis/</loc>
		<lastmod>2018-07-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/book-review-investigating-cryptocurrencies/</loc>
		<lastmod>2018-07-02T18:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-week-in-security-june-25-july-1/</loc>
		<lastmod>2018-07-02T18:34:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/devcentrals-featured-member-for-july-rhazi-youssef/</loc>
		<lastmod>2018-07-02T18:52:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tips-and-tricks-for-salesforce-admins-and-developers-what-you-never-knew-spanning-could-do/</loc>
		<lastmod>2018-07-02T19:09:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mac-malware-targets-cryptomining-users/</loc>
		<lastmod>2018-07-02T19:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/all-about-samsam-ransomware/</loc>
		<lastmod>2018-07-02T19:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/csslp-certification-an-overview/</loc>
		<lastmod>2018-07-02T19:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bromium-secure-platform-4-1-streamlines-virtualization-based-security/</loc>
		<lastmod>2018-07-02T20:27:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-joy-of-tech-becoming-self-aware/</loc>
		<lastmod>2018-07-02T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-arkansas-securities-department-created-a-culture-of-increased-security-awareness-with-securityiq/</loc>
		<lastmod>2018-07-02T21:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/monday-july-2-dtex-insider-threat-news-harris-poll-reveals-that-employees-support-monitoring-sc-magazines-women-in-security-2018-features-christy-wyatt-human/</loc>
		<lastmod>2018-07-02T22:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-macro-less-technique-to-distribute-malware/</loc>
		<lastmod>2018-07-02T23:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cybersecurity-is-everyones-job/</loc>
		<lastmod>2018-07-03T03:22:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/women-in-information-security-rebecca-herold/</loc>
		<lastmod>2018-07-03T03:22:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/phishing-campaign-uses-tls-certificates-to-impersonate-netflix-and-steal-users-account-credentials/</loc>
		<lastmod>2018-07-03T03:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-should-never-be-on-holiday/</loc>
		<lastmod>2018-07-03T07:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/healthcare-finally-embracing-cloud-in-real-numbers/</loc>
		<lastmod>2018-07-03T07:34:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/samsung-message-app-flawed-random-user-pics-leaked-to-contacts/</loc>
		<lastmod>2018-07-03T09:28:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/multi-factor-authentication-for-your-vpn-3-keys-to-getting-it-right-2/</loc>
		<lastmod>2018-07-03T11:10:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/caploader-1-7-released/</loc>
		<lastmod>2018-07-03T11:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-network-and-security-operations-centers-should-be-doing-more/</loc>
		<lastmod>2018-07-03T13:34:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-security-champion-in-the-developer-midst-may-just-solve-the-secure-code-conundrum/</loc>
		<lastmod>2018-07-03T13:42:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/city-of-tacoma-fined-300000-for-witholding-stingray-surveillance-data/</loc>
		<lastmod>2018-07-03T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/qa-with-idc-focused-on-erp-security-in-digital-transformation/</loc>
		<lastmod>2018-07-03T14:20:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/practice-makes-permanent-avoiding-the-training-forgetting-curve/</loc>
		<lastmod>2018-07-03T14:32:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/social-engineer-newsletter-vol-08-issue-106/</loc>
		<lastmod>2018-07-03T14:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/can-you-afford-to-be-scared-to-do-something-when-it-comes-to-cybersecurity/</loc>
		<lastmod>2018-07-03T14:58:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/considering-access-management-part-2/</loc>
		<lastmod>2018-07-03T15:06:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-do-you-know-about-tweedle-beetles/</loc>
		<lastmod>2018-07-03T15:06:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/obfuscated-coinhive-shortlink-reveals-larger-mining-operation/</loc>
		<lastmod>2018-07-03T15:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/when-brand-reputation-is-on-the-line-five-tips-for-crisis-communications/</loc>
		<lastmod>2018-07-03T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/partnering-in-governance-cybersecurity-tools-for-board-manager-interaction/</loc>
		<lastmod>2018-07-03T16:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/android-security-update-july-2018/</loc>
		<lastmod>2018-07-03T17:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/facebook-bug-temporarily-unblocked-users-from-800k-accounts/</loc>
		<lastmod>2018-07-03T17:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-5-0-2018-scot-terbans-espionage-in-the-modern-age-of-information-warfare/</loc>
		<lastmod>2018-07-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-london-protocol-aims-to-expose-the-misuse-of-machine-identities-in-phishing-attacks/</loc>
		<lastmod>2018-07-03T18:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/can-you-spot-the-phishing-scams-in-3-of-our-most-popular-templates/</loc>
		<lastmod>2018-07-03T19:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/101-aws-security-tips-quotes-part-3-best-practices-for-using-security-groups-in-aws/</loc>
		<lastmod>2018-07-03T19:19:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/babayaga-and-the-rise-of-malware-destroying-malware/</loc>
		<lastmod>2018-07-03T20:22:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bsides-vancouver-2018-walkthrough/</loc>
		<lastmod>2018-07-03T20:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/back-to-basics-lets-forget-about-the-gdpr-for-a-moment/</loc>
		<lastmod>2018-07-03T20:41:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/xkcd-rock/</loc>
		<lastmod>2018-07-03T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/generating-least-privileged-iam-roles-for-aws-lambda-functions-the-easy-way/</loc>
		<lastmod>2018-07-04T06:46:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/president-theodore-roosevelts-independence-day-speech-1903/</loc>
		<lastmod>2018-07-04T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/detecting-the-pony-trojan-with-regex-using-caploader/</loc>
		<lastmod>2018-07-04T07:39:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cisos-place-improved-threat-detection-while-boosting-performance-as-top-benefits-of-security-suites/</loc>
		<lastmod>2018-07-04T08:46:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/going-the-distance-with-burp/</loc>
		<lastmod>2018-07-04T10:25:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-choose-which-paths-to-scan-after-crawling-the-site/</loc>
		<lastmod>2018-07-04T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-build-detects-an-unfixed-wordpress-file-deletion-vulnerability-vulnerabilities-in-wordpress-plugins-and-joomla-core/</loc>
		<lastmod>2018-07-04T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/dark-markets-weakness-cashing-out-the-bitcoin-to-usd/</loc>
		<lastmod>2018-07-04T17:23:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-privacy-laws-require-security-professionals-up-their-game/</loc>
		<lastmod>2018-07-04T18:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cyber-security-roundup-for-may-2018/</loc>
		<lastmod>2018-07-05T01:08:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tripwire-patch-priority-index-for-june-2018/</loc>
		<lastmod>2018-07-05T03:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/7-questions-for-evaluating-your-security-posture-against-insider-threats/</loc>
		<lastmod>2018-07-05T03:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/internet-crime-in-2017-dealt-1-4-billion-in-losses-fbi-says/</loc>
		<lastmod>2018-07-05T08:10:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cyber-security-roundup-for-june-2018/</loc>
		<lastmod>2018-07-05T08:39:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/travel-warnings-for-niger-highlight-enduring-kidnap-threat-to-foreign-nationals/</loc>
		<lastmod>2018-07-05T09:56:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/irish-retailer-reveals-it-was-affected-by-international-data-breach/</loc>
		<lastmod>2018-07-05T11:46:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/no-apps-left-behind-on-your-zero-trust-journey/</loc>
		<lastmod>2018-07-05T12:10:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-vsrisk-can-simplify-your-iso-27001-risk-assessment/</loc>
		<lastmod>2018-07-05T13:15:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-closer-look-at-securitys-role-in-a-devsecops-organization/</loc>
		<lastmod>2018-07-05T13:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-risks-mobile-payments-present-to-financial-services/</loc>
		<lastmod>2018-07-05T13:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/diameter-protocol-found-to-be-vulnerable-on-par-with-ss7-for-flaw-tally/</loc>
		<lastmod>2018-07-05T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-security-pros-will-get-out-of-our-summer-2018-virtual-summit/</loc>
		<lastmod>2018-07-05T15:16:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-york-msp-reinvests-in-avast-business-partnership-gains-cost-savings-and-efficiencies-avast-business/</loc>
		<lastmod>2018-07-05T15:34:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/gdpr-will-punish-lax-mobile-security-are-you-prepared/</loc>
		<lastmod>2018-07-05T15:40:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/android-and-ios/</loc>
		<lastmod>2018-07-05T16:23:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/qa-series-with-rsac-apj-ambassador-tracy-celaya/</loc>
		<lastmod>2018-07-05T16:46:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cloud-security-for-the-healthcare-industry-a-no-brainer/</loc>
		<lastmod>2018-07-05T17:51:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-5-0-2018-danny-akackis-the-never-ending-hack-mental-health-in-infosec-community/</loc>
		<lastmod>2018-07-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/announcing-new-ca-veracode-dynamic-analysis/</loc>
		<lastmod>2018-07-05T19:38:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/xkcd-jwst-delays/</loc>
		<lastmod>2018-07-05T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/2012-redux-what-is-application-security-monitoring/</loc>
		<lastmod>2018-07-05T22:39:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/its-2018-how-does-silicon-valley-think-about-a-series-b-these-days/</loc>
		<lastmod>2018-07-05T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-is-the-california-consumer-privacy-act-of-2018-different-from-gdpr/</loc>
		<lastmod>2018-07-06T00:33:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/coinimp-cryptominer-and-fully-qualified-domain-names/</loc>
		<lastmod>2018-07-06T02:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bsides-springfield-preview-how-to-devops-while-sneaking-in-security/</loc>
		<lastmod>2018-07-06T03:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/six-tips-for-security-leaders-looking-to-elevate-their-standing/</loc>
		<lastmod>2018-07-06T08:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/independence-day-greeting-campaign-delivers-emotet-2/</loc>
		<lastmod>2018-07-06T08:59:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/more-breaches-more-problems-the-cost-of-trust-in-third-party-apps/</loc>
		<lastmod>2018-07-06T10:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-road-to-security-hell-is-it-paved-with-good-intentions/</loc>
		<lastmod>2018-07-06T10:26:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/us-is-the-most-vulnerable-nation-to-attacks-white-house-working-on-executive-order-for-agency-cios/</loc>
		<lastmod>2018-07-06T10:47:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/optimizing-lifted-bitcode-with-dead-store-elimination/</loc>
		<lastmod>2018-07-06T11:50:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/wisconsin-county-reveals-phishing-attack-most-likely-to-blame-for-data-breach/</loc>
		<lastmod>2018-07-06T12:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/dfmt-latest-release-consultancy-access/</loc>
		<lastmod>2018-07-06T12:46:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-white-paper-spotlights-methods-to-avoid-cloud-misconfigurations/</loc>
		<lastmod>2018-07-06T12:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/executive-insights-the-global-security-risks-of-a-post-quantum-world/</loc>
		<lastmod>2018-07-06T13:10:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-new-malware-an-old-flaw-and-social-media-as-a-weapon-avast/</loc>
		<lastmod>2018-07-06T13:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/disgruntled-programmer-accused-of-trying-to-sell-his-firms-iphone-spyware-for-50-million/</loc>
		<lastmod>2018-07-06T13:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/modeling-threats-the-regalia-of-precision/</loc>
		<lastmod>2018-07-06T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/survey-identifies-three-types-of-consumer-attitudes-to-data-privacy/</loc>
		<lastmod>2018-07-06T14:17:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-spikeball-dropped-their-phishing-susceptibility-rate-by-30-in-6-months/</loc>
		<lastmod>2018-07-06T14:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/can-we-trust-our-online-project-management-tools/</loc>
		<lastmod>2018-07-06T15:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/exxonmobil-bungles-rewards-card-debut/</loc>
		<lastmod>2018-07-06T15:53:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-5-0-2018-eric-rands-lesley-caharts-the-network-night-watch/</loc>
		<lastmod>2018-07-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/visualizing-macos-app-usage-with-a-little-help-from-osqueryr-mactheknife/</loc>
		<lastmod>2018-07-06T18:34:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/xkcd-new-phone-thread/</loc>
		<lastmod>2018-07-06T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-benefits-of-paying-for-an-employees-professional-certification/</loc>
		<lastmod>2018-07-06T22:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-get-your-employer-to-pay-for-your-it-security-training-10-steps/</loc>
		<lastmod>2018-07-06T22:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-is-siem-or-can-we-have-a-cyber-defense-platform/</loc>
		<lastmod>2018-07-06T22:17:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/uk-financial-regulators-cracking-down-on-banks-it-failures/</loc>
		<lastmod>2018-07-06T23:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/facebookcambridgeanalytica-facebookery-at-its-finest/</loc>
		<lastmod>2018-07-07T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-internet-of-things-era-6-ways-to-stay-safe-avast/</loc>
		<lastmod>2018-07-07T14:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-5-0-2018-brian-baskins-held-for-ransom-with-a-toy-gun/</loc>
		<lastmod>2018-07-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/luke-kingma-lou-patrick-mackays-help-has-arrived/</loc>
		<lastmod>2018-07-07T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/use-redis-theres-a-good-chance-its-been-co-opted/</loc>
		<lastmod>2018-07-08T12:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mdr-absolutely-the-right-security-solution-for-you/</loc>
		<lastmod>2018-07-08T13:59:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cipher-ranked-as-1-pure-play-mssp-by-channel-futures/</loc>
		<lastmod>2018-07-08T15:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-polar-exposure/</loc>
		<lastmod>2018-07-08T17:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-5-0-2018-joe-grays-dear-blue-team-proactive-steps-to-supercharge-your-ir/</loc>
		<lastmod>2018-07-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/robert-m-lee-and-jeff-hass-little-bobby-comics-artificial-venture-capitalists/</loc>
		<lastmod>2018-07-08T22:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/6-steps-for-establishing-and-maintaining-digital-integrity/</loc>
		<lastmod>2018-07-09T03:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-ensure-safety-from-fraud-within-your-business/</loc>
		<lastmod>2018-07-09T03:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-shared-security-weekly-blaze-mobile-app-data-leaks-the-california-privacy-act-third-party-gmail-access/</loc>
		<lastmod>2018-07-09T04:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/hussarini-targeted-cyber-attack-in-the-philippines/</loc>
		<lastmod>2018-07-09T06:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tokenization-ready-for-prime-time/</loc>
		<lastmod>2018-07-09T07:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/serverless-computing-security-risks/</loc>
		<lastmod>2018-07-09T10:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/type-juggling-authentication-bypass-vulnerability-in-cms-made-simple/</loc>
		<lastmod>2018-07-09T11:42:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/timehop-confirms-data-breach-affected-21-million-users/</loc>
		<lastmod>2018-07-09T12:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/azure-ad-password-protection-the-cloud-security-service-your-active-directory-needs-now/</loc>
		<lastmod>2018-07-09T13:22:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/spam-vs-phishing-definitions-overview-examples/</loc>
		<lastmod>2018-07-09T13:34:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/who-should-pay-for-it-security-training-the-employer-vs-employee-debate/</loc>
		<lastmod>2018-07-09T13:34:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/acm-sigsac-dissertation-awards-2018-call-for-nominations/</loc>
		<lastmod>2018-07-09T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-maximize-your-roi-on-aadhaar-data-vault/</loc>
		<lastmod>2018-07-09T14:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/three-homegrown-secops-tools-used-by-the-threat-stack-team/</loc>
		<lastmod>2018-07-09T14:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/overcoming-multi-cloud-security-challenges-in-education/</loc>
		<lastmod>2018-07-09T14:34:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/gandcrab-v4-0-analysis-new-shell-same-old-menace/</loc>
		<lastmod>2018-07-09T14:34:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/easy-hosting-control-panel-sql-injection-multiple-xss-vulnerabilities/</loc>
		<lastmod>2018-07-09T14:34:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/everybody-and-their-mother-is-blocking-ads-so-why-arent-you/</loc>
		<lastmod>2018-07-09T15:46:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/attackers-misused-code-signing-certificates-of-taiwanese-companies-to-spread-plead-malware/</loc>
		<lastmod>2018-07-09T16:14:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cars-are-just-primitive-exoskeletons/</loc>
		<lastmod>2018-07-09T16:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/wordpress-arbitrary-file-deletion-vulnerability-plugged-with-patch-4-9-7/</loc>
		<lastmod>2018-07-09T16:35:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-uk-ncsc-guidelines-urge-use-of-multi-factor-authentication-and-single-sign-on-solutions/</loc>
		<lastmod>2018-07-09T16:37:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-5-0-2018-aaron-lintiles-ctf-tips-and-tricks/</loc>
		<lastmod>2018-07-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-week-in-security-july-2-july-8/</loc>
		<lastmod>2018-07-09T18:10:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/seamlessly-isolate-risky-clicks-with-bromium-secure-platform-4-1-demo-video-2/</loc>
		<lastmod>2018-07-09T19:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/monday-july-2-dtex-insider-threat-news-harris-poll-reveals-that-employees-support-monitoring-sc-magazines-women-in-security-2018-features-christy-wyatt-human-2/</loc>
		<lastmod>2018-07-09T20:23:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-joy-of-tech-gaming-disorder/</loc>
		<lastmod>2018-07-09T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/monday-july-9-dtex-insider-threat-privacy-news-california-passes-west-coast-gdpr-insider-threat-too-much-even-for-security-company-drones-law-enforcement-activity-monitoring-and-transparency/</loc>
		<lastmod>2018-07-09T21:03:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-gaming-industry-a-privileged-target-for-crooks-the-fortnite-case/</loc>
		<lastmod>2018-07-09T21:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/optimizing-a-monitoring-system-three-methods-for-effective-incident-management/</loc>
		<lastmod>2018-07-09T21:37:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/google-and-facebook-used-in-phishing-campaigns/</loc>
		<lastmod>2018-07-10T02:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/wordpress-update-4-9-7-security-maintenance-release/</loc>
		<lastmod>2018-07-10T02:42:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/women-in-information-security-roxy-dee/</loc>
		<lastmod>2018-07-10T04:22:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cybersecurity-is-a-crucial-objective-not-all-c-level-execs-know-that/</loc>
		<lastmod>2018-07-10T07:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/first-annual-long-island-ciso-roundtable/</loc>
		<lastmod>2018-07-10T08:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/2017-was-a-big-year-for-data-breaches-what-will-2018-be-like-as-gdpr-finally-kicks-in/</loc>
		<lastmod>2018-07-10T08:56:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/watch-the-privileged-watcher/</loc>
		<lastmod>2018-07-10T09:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-fbis-10-most-wanted-black-hat-hackers-1/</loc>
		<lastmod>2018-07-10T10:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/companies-collect-more-data-than-they-can-analyze/</loc>
		<lastmod>2018-07-10T11:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/recovering-keyboard-inputs-through-thermal-imaging/</loc>
		<lastmod>2018-07-10T11:18:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/credential-stuffing-list-containing-111-million-records-found-online/</loc>
		<lastmod>2018-07-10T12:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/data-on-21-million-users-compromised-in-timehop-hack/</loc>
		<lastmod>2018-07-10T12:40:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/if-an-infosec-policy-falls-in-the-forest/</loc>
		<lastmod>2018-07-10T13:37:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-ios-security-feature-can-be-defeated-by-a-39-adapter-sold-by-apple/</loc>
		<lastmod>2018-07-10T13:49:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/enclavedb-the-proposition/</loc>
		<lastmod>2018-07-10T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/considering-access-management-part-3/</loc>
		<lastmod>2018-07-10T14:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/winning-the-cyber-arms-race-with-machine-learning/</loc>
		<lastmod>2018-07-10T14:11:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/vengeful-hacker-exposes-domainfactory-customer-banking-data-and-passwords/</loc>
		<lastmod>2018-07-10T14:22:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/accessing-your-crypto-wallet-through-android-devices/</loc>
		<lastmod>2018-07-10T14:46:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/access-management-lessons-from-timehops-cloud-security-breach/</loc>
		<lastmod>2018-07-10T15:22:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/sap-cyber-threat-intelligence-report-july-2018/</loc>
		<lastmod>2018-07-10T15:26:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/alzheimers-association-and-spanning-backup-for-g-suite/</loc>
		<lastmod>2018-07-10T15:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/so-youve-been-asked-to-start-a-threat-intel-program/</loc>
		<lastmod>2018-07-10T15:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/chinese-arrest-20-in-major-crypto-currency-mining-scam/</loc>
		<lastmod>2018-07-10T16:15:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/using-reported-phish-to-hunt-threats/</loc>
		<lastmod>2018-07-10T16:18:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/blackhat-bsideslv-and-def-con-parties-2018/</loc>
		<lastmod>2018-07-10T16:21:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ambulatory-surgery-centers-and-secure-messaging-keeping-it-efficient/</loc>
		<lastmod>2018-07-10T16:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/women-in-cybersecurity-more-credentials-less-pay-even-fewer-opportunities/</loc>
		<lastmod>2018-07-10T16:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/develop-a-game-plan-to-protect-your-robots-identity/</loc>
		<lastmod>2018-07-11T06:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Robot-Game-Plan.jpg</image:loc>
			<image:title><![CDATA[Robot-Game-Plan]]></image:title>
			<image:caption><![CDATA[Protect Your Robot's Identity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-sound-track-to-rsac/</loc>
		<lastmod>2018-07-10T17:10:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/credential-phishing-easy-steps-to-stymie-hackers/</loc>
		<lastmod>2018-07-10T17:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-5-0-2018-wolfgang-goerlichs-zachary-sarakuns-classic-cons-in-cryptocurrency/</loc>
		<lastmod>2018-07-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-is-https-and-why-dont-more-businesses-use-it/</loc>
		<lastmod>2018-07-10T18:14:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/july-patch-tuesday-critical-browser-patches-lazy-fp-exchange-adobe-vulns/</loc>
		<lastmod>2018-07-10T18:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-prevent-browser-cryptojacking/</loc>
		<lastmod>2018-07-10T18:35:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-importance-of-penetration-testing-for-pci-dss-compliance/</loc>
		<lastmod>2018-07-10T19:20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/top-five-securityiq-phishing-templates-june-2018-edition/</loc>
		<lastmod>2018-07-10T20:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/luke-kingma-lou-patrick-mackays-heres-the-story/</loc>
		<lastmod>2018-07-10T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/vert-threat-alert-july-2018-patch-tuesday-analysis/</loc>
		<lastmod>2018-07-10T21:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/sap-security-notes-july-18-re-released-hot-news-and-the-rise-of-security-notes/</loc>
		<lastmod>2018-07-10T22:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/macys-bloomingdales-alert-online-customers-of-data-breach/</loc>
		<lastmod>2018-07-10T22:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/top-5-deliberately-vulnerable-web-applications-to-practice-your-skills-on/</loc>
		<lastmod>2018-07-11T00:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/patch-tuesday-july-2018-edition/</loc>
		<lastmod>2018-07-11T02:34:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-receive-a-clean-soc-2-report/</loc>
		<lastmod>2018-07-11T04:22:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/an-emerging-alliance-it-security-and-compliance/</loc>
		<lastmod>2018-07-11T08:47:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/trusting-in-technology-the-need-for-greater-assurance-in-connected-health/</loc>
		<lastmod>2018-07-11T10:07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/missouri-hospital-forced-to-divert-patients-after-ransomware-attack/</loc>
		<lastmod>2018-07-11T10:46:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/iot-and-your-digital-supply-chain/</loc>
		<lastmod>2018-07-11T10:56:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/department-of-commerce-report-on-the-botnet-threat/</loc>
		<lastmod>2018-07-11T11:08:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/facebook-fined-500000-by-ico-for-cambridge-analytica-data-scandal/</loc>
		<lastmod>2018-07-11T11:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-five-stages-of-vulnerability-management/</loc>
		<lastmod>2018-07-11T11:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/101-aws-security-tips-quotes-part-4-best-aws-security-practices/</loc>
		<lastmod>2018-07-11T12:53:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/building-tier-1-ip-transit-whats-involved-and-why-do-it/</loc>
		<lastmod>2018-07-11T12:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ios-usb-restricted-mode-the-default/</loc>
		<lastmod>2018-07-11T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/considering-access-management-part-4/</loc>
		<lastmod>2018-07-11T14:16:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/helping-facilitate-partner-success-with-nse-8-certification/</loc>
		<lastmod>2018-07-11T14:22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ng-firewall-replaces-watchguard-in-partners-network-security-portfolio/</loc>
		<lastmod>2018-07-11T14:40:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/week-27-cyberattack-digest-2018-adidas-facebook-timehop-and-others/</loc>
		<lastmod>2018-07-11T15:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/iot-domestic-abuse-what-can-we-do-to-stop-it/</loc>
		<lastmod>2018-07-11T15:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tackling-the-cyber-kill-chain-with-managed-security-services/</loc>
		<lastmod>2018-07-11T16:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/notorious-hijack-factory-shunned-from-web/</loc>
		<lastmod>2018-07-11T17:19:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-5-0-2018-derek-milroys-enterprise-vulnerability-management-assessing-implementing-and-maintaining/</loc>
		<lastmod>2018-07-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ask-sucuri-how-do-you-find-website-backdoors/</loc>
		<lastmod>2018-07-11T18:52:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/usb-restricted-mode-now-you-dont-see-it-now-you-do/</loc>
		<lastmod>2018-07-11T18:52:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/individual-action-and-regulation-need-to-go-hand-in-hand-when-it-comes-to-privacy/</loc>
		<lastmod>2018-07-11T19:52:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/dark-web-e-shops-now-distributing-code-signing-certificates-for-malware/</loc>
		<lastmod>2018-07-11T20:38:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/xkcd-oeis-submissions/</loc>
		<lastmod>2018-07-11T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/puresec-releases-aws-lambda-function-code-integrity-protection/</loc>
		<lastmod>2018-07-11T21:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-trickster-hackers-backdoor-obfuscation-and-evasion-techniques/</loc>
		<lastmod>2018-07-11T21:36:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/we-block-shady-ad-blockers/</loc>
		<lastmod>2018-07-11T22:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cups-local-privilege-escalation-and-sandbox-escapes/</loc>
		<lastmod>2018-07-11T23:25:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ease-the-squeeze-cyber-security-with-small-teams/</loc>
		<lastmod>2018-07-12T03:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cryptominers-and-stealers-malware-edition-2/</loc>
		<lastmod>2018-07-12T03:51:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/knock-knock-whos-there-iot-device-identification-data-integrity-is-no-joke/</loc>
		<lastmod>2018-07-12T07:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/update-your-business-strategy-with-instant-issuance/</loc>
		<lastmod>2018-07-12T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cio-roles-grow-more-strategic-as-cloud-migration-and-data-security-become-industry-standards/</loc>
		<lastmod>2018-07-12T08:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/does-an-organisations-size-matter-when-it-comes-to-data-breach-fines/</loc>
		<lastmod>2018-07-12T08:05:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/evolving-the-way-businesses-work-in-a-post-gdpr-world/</loc>
		<lastmod>2018-07-12T10:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/identity-access-managements-grc-siem-tackling-identity-risk-as-one/</loc>
		<lastmod>2018-07-12T10:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/wpa3/</loc>
		<lastmod>2018-07-12T11:11:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/server-side-template-injection-introduction-example/</loc>
		<lastmod>2018-07-12T11:17:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ico-to-fine-baby-club-140k-for-illegally-sharing-data-with-labour-party/</loc>
		<lastmod>2018-07-12T11:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/composing-defences-the-case-for-building-defence-in-height/</loc>
		<lastmod>2018-07-12T12:17:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/will-my-target-settings-and-scan-data-be-retained-when-upgrading-from-acunetix-v11-to-acunetix-v12/</loc>
		<lastmod>2018-07-12T12:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-many-targets-can-i-configure-in-acunetix/</loc>
		<lastmod>2018-07-12T12:40:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bitdefender-2018-mid-year-cybersecurity-review/</loc>
		<lastmod>2018-07-12T13:52:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/larry-seltzers-data-encryption-how-to-avoid-common-workarounds/</loc>
		<lastmod>2018-07-12T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/wafs-should-do-a-lot-more-against-current-threats-than-covering-owasp-top-10/</loc>
		<lastmod>2018-07-12T14:16:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/sextortion-scam-uses-recipients-hacked-passwords/</loc>
		<lastmod>2018-07-12T14:19:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ssl-review-may-and-june-2018/</loc>
		<lastmod>2018-07-12T14:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-wordpress-spambot-wants-you-to-bet-on-the-2018-fifa-world-cup/</loc>
		<lastmod>2018-07-12T14:42:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/untangle-announces-bit-as-a-strategic-value-added-distributor-in-europe/</loc>
		<lastmod>2018-07-12T15:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/average-cost-of-a-data-breach-exceeds-3-8-million-claims-report/</loc>
		<lastmod>2018-07-12T15:17:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/gdpr-2-0-comes-to-the-united-states/</loc>
		<lastmod>2018-07-12T15:40:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/free-gartner-report-designing-a-security-champion-program/</loc>
		<lastmod>2018-07-12T15:41:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/avast-secureline-boosts-speed-and-performance-avast/</loc>
		<lastmod>2018-07-12T16:41:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-uks-minimum-cyber-security-standard-what-you-need-to-know/</loc>
		<lastmod>2018-07-12T16:41:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-wildcard-certificates-arent-that-easy-to-manage-and-what-you-can-do-about-it/</loc>
		<lastmod>2018-07-12T16:55:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/block-all-or-nothing-to-prevent-ico-fraud/</loc>
		<lastmod>2018-07-12T17:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/when-three-isnt-a-crowd-man-in-the-middle-mitm-attacks-explained/</loc>
		<lastmod>2018-07-12T17:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ukrainian-law-enforcement-thwart-digital-attack-against-chlorine-station/</loc>
		<lastmod>2018-07-12T17:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circle-city-con-5-0-2018-luka-trbojevics-security-beyond-the-security-team-getting-everyone-involved/</loc>
		<lastmod>2018-07-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/building-an-effective-api-security-strategy-easy-if-you-have-the-right-tools/</loc>
		<lastmod>2018-07-12T18:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/an-opportunity-for-innovation-preventing-bank-fraud-in-the-face-of-swift-npp-and-evolving-technology/</loc>
		<lastmod>2018-07-12T18:57:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/watching-your-permissions/</loc>
		<lastmod>2018-07-12T20:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-joy-of-tech-salesmen-on-the-doorstep/</loc>
		<lastmod>2018-07-12T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/our-team-is-hiring-three-new-positions-open-north-america-and-europe/</loc>
		<lastmod>2018-07-12T22:23:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/8-reasons-mobile-apps-access-location-security-policies-to-consider/</loc>
		<lastmod>2018-07-12T22:37:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/your-iot-security-concerns-are-stupid/</loc>
		<lastmod>2018-07-12T23:41:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/guest-essay-theft-of-mq-9-reaper-docs-highlights-need-to-better-protect-high-value-assets/</loc>
		<lastmod>2018-07-13T00:21:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/create-a-cyber-protection-policy-for-your-small-business-using-our-free-template-avast-business/</loc>
		<lastmod>2018-07-13T00:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/gandcrab-v4-1-ransomware-and-the-speculated-smb-exploit-spreader/</loc>
		<lastmod>2018-07-13T03:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/communication-a-significant-cultural-change-for-embracing-devops/</loc>
		<lastmod>2018-07-13T03:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/roadmap-for-the-data-gold-rush-maintaining-qualitative-data-in-the-iot-environment/</loc>
		<lastmod>2018-07-13T07:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/five-reasons-enterprises-arent-getting-the-most-out-of-security-automation/</loc>
		<lastmod>2018-07-13T07:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-digital-transformation-gave-birth-to-a-new-breed-of-criminal-machine-identity-thieves/</loc>
		<lastmod>2018-07-13T08:59:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-many-users-can-be-created-in-acunetix/</loc>
		<lastmod>2018-07-13T10:46:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/fake-apps-on-google-data-breaches-around-the-globe-avast/</loc>
		<lastmod>2018-07-13T13:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/executive-insights-growing-up-tech/</loc>
		<lastmod>2018-07-13T13:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/take-cover-eu-threatens-privacy-war-against-united-states/</loc>
		<lastmod>2018-07-13T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/akamai-welcomes-girls-who-code/</loc>
		<lastmod>2018-07-13T14:52:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/owning-saml/</loc>
		<lastmod>2018-07-13T15:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/webstresser-when-platform-capitalism-goes-rogue-2/</loc>
		<lastmod>2018-07-13T15:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/rsac-adboard-checking-in-with-todd-inskeep-on-2018-predictions-and-beyond/</loc>
		<lastmod>2018-07-13T16:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-iocs-and-artifacts/</loc>
		<lastmod>2018-07-13T17:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-solutions/</loc>
		<lastmod>2018-07-13T17:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-become-a-threat-hunter/</loc>
		<lastmod>2018-07-13T17:10:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-process/</loc>
		<lastmod>2018-07-13T17:10:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-ultimate-guide-to-threat-hunting/</loc>
		<lastmod>2018-07-13T17:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/free-yourself-from-fud/</loc>
		<lastmod>2018-07-13T17:39:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circle-city-con-5-0-2018-jelena-milosevics-the-consequences-of-lack-of-security-in-the-healthcare-and-how-to-handle-it/</loc>
		<lastmod>2018-07-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/webinar-branch-offices-local-security/</loc>
		<lastmod>2018-07-13T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-test-and-measure-the-effectiveness-of-your-security-awareness-program/</loc>
		<lastmod>2018-07-13T18:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/soar-native-soc-can-this-work/</loc>
		<lastmod>2018-07-13T18:35:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/barcelona-to-beantown-tufinnovate-boston/</loc>
		<lastmod>2018-07-13T19:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/no-more-paralysis-by-analysis-how-security-is-evolving-to-real-time-outcomes/</loc>
		<lastmod>2018-07-13T20:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/xkcd-stargazing-2/</loc>
		<lastmod>2018-07-13T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-we-value-inquiry-visibility-over-well-over-everything-else/</loc>
		<lastmod>2018-07-13T21:49:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-methodologies/</loc>
		<lastmod>2018-07-13T22:10:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/need-for-speed-optimizing-data-masking-performance-and-providing-secure-data-for-devops-users/</loc>
		<lastmod>2018-07-13T22:23:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/12-russian-intelligence-officers-accused-of-hacking-dnc-during-2016-election/</loc>
		<lastmod>2018-07-13T22:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/recon-for-social-engineering-par-excellence/</loc>
		<lastmod>2018-07-14T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circle-city-con-5-0-2018-edmund-brumaghin-nick-biasinis-stealing-cycles-mining-coin-an-introduction-to-malicious-cryptomining/</loc>
		<lastmod>2018-07-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/xkcd-wall-art/</loc>
		<lastmod>2018-07-14T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/alleviating-aws-athena-aggravation-with-asynchronous-assistance/</loc>
		<lastmod>2018-07-15T00:39:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/meat-is-murder-on-the-environment/</loc>
		<lastmod>2018-07-15T00:55:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/unveiling-the-united-cyber-caliphate-and-the-birth-of-the-e-terrorist/</loc>
		<lastmod>2018-07-15T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/sextortion-and-leaked-passwords/</loc>
		<lastmod>2018-07-15T16:19:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/interesting-email-scam-i-recieved/</loc>
		<lastmod>2018-07-15T17:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-primer-how-to-stay-safe-on-amazons-prime-day-sale/</loc>
		<lastmod>2018-07-15T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circle-city-con-5-0-2018-kyle-ehmkes-applying-thermodynamic-principles-to-threat-intelligence/</loc>
		<lastmod>2018-07-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/is-wireless-technology-secure/</loc>
		<lastmod>2018-07-15T20:22:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/robert-m-lee-and-jeff-hass-little-bobby-comics-cfp-process/</loc>
		<lastmod>2018-07-15T21:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-fundamentals-for-federal-agencies/</loc>
		<lastmod>2018-07-16T03:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/8-insights-on-the-future-of-ransomware/</loc>
		<lastmod>2018-07-16T03:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-shared-security-weekly-blaze-polar-fitness-app-location-data-exposed-blocking-scam-phone-calls-samba-tv-privacy-controversy/</loc>
		<lastmod>2018-07-16T04:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/digital-assistants-could-be-amongst-the-hottest-selling-items-on-amazon-prime-day-but-security-fears-are-still-putting-some-consumers-off/</loc>
		<lastmod>2018-07-16T07:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ticketmaster-falls-victim-to-worldwide-digital-card-skimming-attack/</loc>
		<lastmod>2018-07-16T07:35:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/building-a-devsecops-culture/</loc>
		<lastmod>2018-07-16T07:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/video-bug-hunting-as-a-second-income/</loc>
		<lastmod>2018-07-16T09:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/companies-need-casbs-now-more-than-ever-to-help-secure-digital-transformation/</loc>
		<lastmod>2018-07-16T09:37:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-metrics-application-security-and-cancer-research/</loc>
		<lastmod>2018-07-16T10:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/compliance-what-you-need-to-know-about-configuration-audit-variables/</loc>
		<lastmod>2018-07-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/u-s-senators-ask-ftc-to-launch-privacy-investigation-of-smart-tvs/</loc>
		<lastmod>2018-07-16T12:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/reasonably-clever-extortion-e-mail-based-on-password-theft/</loc>
		<lastmod>2018-07-16T12:56:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/join-fortinet-at-the-2018-aws-new-york-and-chicago-summits/</loc>
		<lastmod>2018-07-16T13:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/dell-technologies-and-gemalto-global-partnership-is-win-win-for-customers/</loc>
		<lastmod>2018-07-16T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cambridge-analytica-retreads-create-new-firm/</loc>
		<lastmod>2018-07-16T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/swiss-it-provider-transforms-business-model-with-avast-business-cloudcare-avast-business/</loc>
		<lastmod>2018-07-16T14:22:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/pharmaceutical-companies-face-unique-cybersecurity-challenges-while-navigating-digital-transformation/</loc>
		<lastmod>2018-07-16T14:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/untangle-sysadmin-day-2018-treasure-hunt-sweepstakes/</loc>
		<lastmod>2018-07-16T14:59:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/three-must-dos-while-at-black-hat-2018-2/</loc>
		<lastmod>2018-07-16T15:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/has-your-multifunction-printer-become-a-data-loss-risk-consider-dlp-for-images-2/</loc>
		<lastmod>2018-07-16T15:14:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-week-in-security-july-9-july-15/</loc>
		<lastmod>2018-07-16T15:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/advancing-your-career-with-certifications-tips-from-infosec-institute-alum-jeffrey-coa/</loc>
		<lastmod>2018-07-16T16:10:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/blockchain-insurance-a-closer-look-at-blockchain-security/</loc>
		<lastmod>2018-07-16T16:21:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-i-was-hacked-by-my-six-year-old-daughter/</loc>
		<lastmod>2018-07-16T17:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/your-quick-guide-to-navigating-googles-biggest-conference/</loc>
		<lastmod>2018-07-16T17:41:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circle-city-con-5-0-2018-judy-towers-saedy-subversion-and-espionage-directed-against-you/</loc>
		<lastmod>2018-07-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/infosec-recruiting-is-the-industry-creating-its-own-drought/</loc>
		<lastmod>2018-07-16T18:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/persistent-malicious-redirect-variants/</loc>
		<lastmod>2018-07-16T18:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/luminositylink-rat-author-pleads-guilty/</loc>
		<lastmod>2018-07-16T19:09:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/xkcd-an-apple-for-a-dollar/</loc>
		<lastmod>2018-07-16T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/monday-july-16-dtex-insider-threat-news-privileged-user-dents-apple-self-driving-car-program-doj-says-russia-hacked-clinton-campaign-issues-indictments-against-spies/</loc>
		<lastmod>2018-07-16T21:44:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/vulnhub-machines-walkthrough-series-pwnlab-init/</loc>
		<lastmod>2018-07-16T22:22:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/qrl-jacking/</loc>
		<lastmod>2018-07-16T22:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/usv-2017-part-2-ctf-walkthrough/</loc>
		<lastmod>2018-07-16T23:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/interview-with-an-expert-how-does-a-ciso-learn-to-be-a-ciso/</loc>
		<lastmod>2018-07-16T23:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bsideslv-preview-planning-for-the-worst-and-watch-out-for-that-bus/</loc>
		<lastmod>2018-07-17T03:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/women-in-information-security-jessica-hebenstreit/</loc>
		<lastmod>2018-07-17T03:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ciso-responsibilities-growing-faster-than-their-ability-to-address-them/</loc>
		<lastmod>2018-07-17T08:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-a-zero-trust-network-with-authentication-is-essential/</loc>
		<lastmod>2018-07-17T09:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/never-patch-another-system-again/</loc>
		<lastmod>2018-07-17T10:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/realize-the-significant-business-value-of-identity-governance/</loc>
		<lastmod>2018-07-17T10:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/four-healthcare-it-companies-warn-pho-put-800k-patients-data-at-risk/</loc>
		<lastmod>2018-07-17T11:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/magniber-ransomware-improves-expands-within-asia/</loc>
		<lastmod>2018-07-17T11:46:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/intro-to-osquery-frequently-asked-questions-for-beginners/</loc>
		<lastmod>2018-07-17T12:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/httpstls-and-ipv6-enablement-both-in-the-majority-for-world-cup-streaming/</loc>
		<lastmod>2018-07-17T14:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cybercrime-tactics-techniques-q2-2018/</loc>
		<lastmod>2018-07-17T12:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-tackle-the-hidden-threat-of-social-media/</loc>
		<lastmod>2018-07-17T13:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/high-ssl-performance-earns-fortigate-5th-consecutive-recommended-rating-in-latest-nss-labs-ngfw-test-results/</loc>
		<lastmod>2018-07-17T13:46:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ddos-attacks-grow-more-popular-targeted/</loc>
		<lastmod>2018-07-17T13:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/dave-lewis-dude-wheres-my-car-with-my-lunch/</loc>
		<lastmod>2018-07-17T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/is-your-data-hackproof/</loc>
		<lastmod>2018-07-17T14:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/week-28-cyberattack-digest-2018-macys-bb-hospitality-group-ticketmaster-and-ohers/</loc>
		<lastmod>2018-07-17T14:06:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/trump-casts-doubt-on-justice-department-investigation-wants-joint-cybersecurity-team-with-russia/</loc>
		<lastmod>2018-07-17T14:09:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/metropolitan-school-district-of-wayne-township-combats-ransomware-with-securityiq/</loc>
		<lastmod>2018-07-17T14:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/implementing-psd2-three-critical-criteria-to-consider/</loc>
		<lastmod>2018-07-17T14:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/http-security-a-security-focused-introduction-to-http-part-1/</loc>
		<lastmod>2018-07-17T15:22:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-ways-to-find-and-fix-open-source-vulnerabilities/</loc>
		<lastmod>2018-07-17T15:46:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-data-protection-policies-your-employees-must-know-in-the-post-gdpr-era/</loc>
		<lastmod>2018-07-17T15:46:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/3-reasons-traditional-certificate-management-tools-wont-survive/</loc>
		<lastmod>2018-07-17T15:51:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tackling-accountability-in-asia/</loc>
		<lastmod>2018-07-17T16:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circle-city-con-5-0-2018-tony-martin-vegues-how-to-lie-with-statistics-information-security-edition/</loc>
		<lastmod>2018-07-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/early-guide-to-black-hat-2018/</loc>
		<lastmod>2018-07-17T18:47:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/long-overdue-shedding-legacy-employee-monitoring-technology-to-effectively-manage-insider-threats/</loc>
		<lastmod>2018-07-17T19:51:34+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->