<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2018/07/five-tips-for-business-continuity-during-a-disruption/</loc>
		<lastmod>2018-07-17T19:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-evolving-network-security-environment-can-you-protect-your-customers-in-a-5g-universe/</loc>
		<lastmod>2018-07-17T20:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/luke-kingma-lou-patrick-mackays-an-amazon-company/</loc>
		<lastmod>2018-07-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/analyzing-oracle-security-oracle-critical-patch-update-for-july-2018/</loc>
		<lastmod>2018-07-17T21:12:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-record-oracle-fixes-334-vulnerabilities-in-july-2018-cpu/</loc>
		<lastmod>2018-07-17T21:46:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/pentester-academy-command-injection-iso-sugarcrm-6-3-1-exploitation/</loc>
		<lastmod>2018-07-17T22:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/vulnhub-machines-walkthrough-series-fristileaks/</loc>
		<lastmod>2018-07-17T22:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/virtual-machine-introspection-in-malware-analysis/</loc>
		<lastmod>2018-07-17T22:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/aws-security-monitoring-checklist-part-2/</loc>
		<lastmod>2018-07-17T23:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tabnabbing/</loc>
		<lastmod>2018-07-17T23:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-value-of-online-malware-collections/</loc>
		<lastmod>2018-07-17T23:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/password-spraying/</loc>
		<lastmod>2018-07-17T23:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-evolutionary-waves-of-the-penetration-testing-vulnerability-assessment-market/</loc>
		<lastmod>2018-07-18T00:39:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/taking-the-first-steps-down-the-security-posture-path-with-awwa/</loc>
		<lastmod>2018-07-18T04:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bsideslv-preview-your-taxes-are-being-leaked/</loc>
		<lastmod>2018-07-18T04:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/business-email-compromise-scams-have-netted-12-5-billion-says-fbi/</loc>
		<lastmod>2018-07-18T07:22:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/when-disaster-comes-calling/</loc>
		<lastmod>2018-07-18T10:57:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/multi-factor-authentication-made-simple-for-legacy-and-custom-apps/</loc>
		<lastmod>2018-07-18T11:22:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/semafone-issues-guidance-for-contact-centers-still-struggling-with-gdpr/</loc>
		<lastmod>2018-07-18T12:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/researchers-can-earn-up-to-100k-via-microsoft-identity-bounty-program/</loc>
		<lastmod>2018-07-18T12:10:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/q2-appthority-pulse-report-finds-chat-apps-most-popular-risky-blacklisted-apps/</loc>
		<lastmod>2018-07-18T13:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/fortinet-at-google-cloud-next-2018/</loc>
		<lastmod>2018-07-18T13:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/silk-road-administrator-extradited-to-the-us-to-face-trial/</loc>
		<lastmod>2018-07-18T13:39:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/access-to-applications-based-on-a-driving-license-model/</loc>
		<lastmod>2018-07-18T13:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/its-time-to-break-up-the-data-monopolies/</loc>
		<lastmod>2018-07-18T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tenable-research-advisory-patches-issued-for-critical-vulnerabilities-in-2-aveva-scada-ot-apps/</loc>
		<lastmod>2018-07-18T14:09:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/protego-labs-finds-nearly-all-serverless-application-functions-at-risk/</loc>
		<lastmod>2018-07-18T14:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/active-directory-change-resiliency/</loc>
		<lastmod>2018-07-18T14:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/drupal-phishing-and-a-new-cryptomining-botnet/</loc>
		<lastmod>2018-07-18T16:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/attracting-new-candidates-to-the-industry/</loc>
		<lastmod>2018-07-18T16:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-devcentral-chronicles-july-edition-17/</loc>
		<lastmod>2018-07-18T16:20:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/frost-sullivan-honors-avast-business-avast/</loc>
		<lastmod>2018-07-18T16:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circle-city-con-5-0-2018-jessica-hydes-iot-4n6-the-growing-impact-of-the-internet-of-things-on-digital-forensics/</loc>
		<lastmod>2018-07-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/back-to-the-server-is-it-time-to-require-mutual-tls-authentication/</loc>
		<lastmod>2018-07-18T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/xkcd-negative-results/</loc>
		<lastmod>2018-07-18T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/whats-the-real-value-and-danger-of-smart-assistants/</loc>
		<lastmod>2018-07-18T21:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/got-container-security-make-sure-to-secure-code-and-supplemental-components/</loc>
		<lastmod>2018-07-19T03:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/survey-only-four-percent-of-u-s-adults-are-concerned-about-cybersecurity-during-summer-vacation/</loc>
		<lastmod>2018-07-19T03:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-latest-on-pci-minor-on-pci-dss-major-on-almost-everything-else/</loc>
		<lastmod>2018-07-19T07:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/businesses-seek-to-please-customers-before-regulators-in-drive-for-gdpr-compliance/</loc>
		<lastmod>2018-07-19T08:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/microsoft-offers-up-to-100000-to-identity-bug-finders/</loc>
		<lastmod>2018-07-19T10:17:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-is-an-osquery-injection-and-how-does-it-work/</loc>
		<lastmod>2018-07-19T11:35:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/gdpr-and-data-governance-take-advantage/</loc>
		<lastmod>2018-07-19T11:52:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/softec-solutions-turns-to-cloudcare-and-managed-workplace-to-deliver-managed-security-services-avast/</loc>
		<lastmod>2018-07-19T13:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-ciso-collective-delivers-a-one-stop-content-experience-for-security-leaders/</loc>
		<lastmod>2018-07-19T13:16:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/planning-to-join-the-other-50000-security-aficionados-at-black-hat-usa/</loc>
		<lastmod>2018-07-19T13:39:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/puresec-serverless-security-platform-now-generally-available/</loc>
		<lastmod>2018-07-19T13:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tips-to-stay-safe-in-the-iot-world/</loc>
		<lastmod>2018-07-19T13:52:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/user-name-sieving-linkedin-grist/</loc>
		<lastmod>2018-07-19T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/hackers-automate-the-laundering-of-money-via-clash-of-clans/</loc>
		<lastmod>2018-07-19T14:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/be-certain-and-specific-when-fighting-ddos-attacks/</loc>
		<lastmod>2018-07-19T15:16:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/malware-fileless-malware-how-its-created-how-it-spreads-and-what-to-do-about-it-on-demand-webinar-2/</loc>
		<lastmod>2018-07-19T15:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/streamlining-incident-response-communications-in-the-supply-chain/</loc>
		<lastmod>2018-07-19T15:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-secure-your-smart-home-avast/</loc>
		<lastmod>2018-07-19T16:04:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/understanding-why-spear-phish-are-highly-effective/</loc>
		<lastmod>2018-07-19T16:16:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/c-suite-cyber-security-awareness-may-be-the-key-to-taking-a-bite-out-of-breaches/</loc>
		<lastmod>2018-07-19T16:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/google-vs-the-certificate-authorities-are-ev-certificates-the-answer/</loc>
		<lastmod>2018-07-19T16:25:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-ftc-the-law-and-order-of-cyber-attacks/</loc>
		<lastmod>2018-07-19T17:26:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circle-city-con-5-0-2018-chris-kindigs-a-very-particular-set-of-skills-geolocation-techniques-for-osint-and-investigation/</loc>
		<lastmod>2018-07-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-block-ads-like-a-pro/</loc>
		<lastmod>2018-07-19T18:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/identity-access-management-grc-siem-tackling-identity-risk-as-one/</loc>
		<lastmod>2018-07-19T19:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-awareed-auto-reports-creating-security-champions-training/</loc>
		<lastmod>2018-07-19T19:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/3-power-user-tips-for-google-sysadmins-go-beyond-backup-with-spanning/</loc>
		<lastmod>2018-07-19T20:51:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/luke-kingma-lou-patrick-mackays-spaceforce/</loc>
		<lastmod>2018-07-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/human-resources-firm-complyright-breached/</loc>
		<lastmod>2018-07-19T21:08:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-techniques/</loc>
		<lastmod>2018-07-19T21:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/aws-cloud-security-for-beginners-part-2/</loc>
		<lastmod>2018-07-19T22:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-much-does-a-data-breach-cost-reading-the-2018-cost-of-a-data-breach-study/</loc>
		<lastmod>2018-07-19T22:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/aws-cloud-security-for-beginners-part-1/</loc>
		<lastmod>2018-07-19T22:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-vs-siem/</loc>
		<lastmod>2018-07-19T22:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-as-an-active-defense/</loc>
		<lastmod>2018-07-19T22:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/types-of-threats-that-can-be-hunted/</loc>
		<lastmod>2018-07-19T22:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/10-benefits-of-threat-hunting/</loc>
		<lastmod>2018-07-19T22:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/better-cybersecurity-job-descriptions-a-matter-of-degrees/</loc>
		<lastmod>2018-07-20T00:04:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/decision-analysis-applications-in-threat-analysis-frameworks/</loc>
		<lastmod>2018-07-20T04:22:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/copy-pasting-thief-from-a-copy-pasted-code/</loc>
		<lastmod>2018-07-20T07:22:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/as-cloud-cybersecurity-grow-more-complex-enterprises-lean-on-ai/</loc>
		<lastmod>2018-07-20T08:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mobile-app-wall-of-shame-trip38-2/</loc>
		<lastmod>2018-07-20T08:46:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/data-of-1-5-million-people-breached-in-singapores-worst-digital-attack/</loc>
		<lastmod>2018-07-20T11:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/us-clinical-lab-recovers-within-50-minutes-of-getting-hit-by-samsam-ransomware/</loc>
		<lastmod>2018-07-20T12:40:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bridging-the-cybersecurity-skills-gap-with-the-fortinet-network-security-academy/</loc>
		<lastmod>2018-07-20T13:46:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/delivering-enterprise-grade-security-on-a-small-budget-just-got-easier-avast-business/</loc>
		<lastmod>2018-07-20T13:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/action-taken-to-curtail-portuguese-internetwork-firm-accused-of-latest-bgp-hijack/</loc>
		<lastmod>2018-07-20T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ransomware-strain-evolves-rats-cause-mischief-and-yet-another-data-breach-strikes-avast/</loc>
		<lastmod>2018-07-20T15:10:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-new-boto3-amazon-athena-client-wrapper-with-dplyr-async-query-support/</loc>
		<lastmod>2018-07-20T15:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-danger-of-third-parties-ads-pipelines-and-plugins/</loc>
		<lastmod>2018-07-20T15:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-use-threat-stack-to-enable-proactive-security/</loc>
		<lastmod>2018-07-20T15:59:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/qa-series-with-rsac-apj-ambassador-jonathan-trull/</loc>
		<lastmod>2018-07-20T16:34:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circle-city-con-5-0-2018-aamir-lakhanis-rise-of-the-machines/</loc>
		<lastmod>2018-07-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/data-breach-affects-1-5-million-singaporeans/</loc>
		<lastmod>2018-07-20T20:34:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-most-real-time-defensive-solutions-are-poor-threat-hunting-solutions/</loc>
		<lastmod>2018-07-20T20:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-joy-of-tech-googles-microsoft-moment/</loc>
		<lastmod>2018-07-20T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-build-a-threat-hunting-tool-in-10-steps/</loc>
		<lastmod>2018-07-20T21:46:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/considerations-when-outsourcing-threat-hunting/</loc>
		<lastmod>2018-07-20T21:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-and-soc/</loc>
		<lastmod>2018-07-20T21:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-for-suspicious-registry-and-system-file-changes/</loc>
		<lastmod>2018-07-20T22:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-for-ddos-activity-and-geographic-irregularities/</loc>
		<lastmod>2018-07-20T22:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-current-job-outlook-for-threat-hunters/</loc>
		<lastmod>2018-07-20T22:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/2018-popular-siem-starter-use-cases/</loc>
		<lastmod>2018-07-20T23:45:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cisco-issues-patches-for-4-critical-vulnerabilities-in-cisco-policy-suite/</loc>
		<lastmod>2018-07-21T12:03:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/recovering-data-from-an-old-encrypted-time-machine-backup/</loc>
		<lastmod>2018-07-21T13:42:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/questionable-signal-interception-use-stingray-hardware-search-leads-magistrate-to-chastise-fbi/</loc>
		<lastmod>2018-07-21T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circle-city-con-2018-itzik-kotlers-backdooring-with-metadata/</loc>
		<lastmod>2018-07-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/xkcd-sports-champions/</loc>
		<lastmod>2018-07-21T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-top-5-insider-threat-behaviors-you-need-to-monitor/</loc>
		<lastmod>2018-07-22T12:10:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/positioning-system-spoof-lash-up-can-reroute-robotic-automobiles-into-opposing-traffic/</loc>
		<lastmod>2018-07-22T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/getting-hired-a-few-tips/</loc>
		<lastmod>2018-07-22T16:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-2018-dan-mcinerneys-automahack-automate-going-from-zero-to-domain-admin-with-2-tools/</loc>
		<lastmod>2018-07-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/usb-restricted-mode-plus-calisto-trojan/</loc>
		<lastmod>2018-07-22T19:16:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-apache-drill-udf-for-processing-twitter-tweet-text/</loc>
		<lastmod>2018-07-22T20:47:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/robert-m-lee-and-jeff-hass-little-bobby-comics-different-hats/</loc>
		<lastmod>2018-07-22T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/digging-for-security-bugs-vulnerabilities-in-python-applications/</loc>
		<lastmod>2018-07-23T03:17:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-shared-security-weekly-blaze-lost-and-stolen-devices-instagram-and-sim-hijacking-labcorp-security-breach/</loc>
		<lastmod>2018-07-23T04:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/1passwords-travel-mode/</loc>
		<lastmod>2018-07-23T11:17:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/google-security-keys-neutralized-employee-phishing/</loc>
		<lastmod>2018-07-23T11:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/exobot-android-banking-trojans-source-code-leaked-online/</loc>
		<lastmod>2018-07-23T11:52:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/are-you-leaving-your-security-backdoor-open/</loc>
		<lastmod>2018-07-23T12:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/fortinet-expands-security-fabric-offerings-on-google-cloud-platform/</loc>
		<lastmod>2018-07-23T13:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cio-cybersecurity-strategies-increasingly-rely-on-multi-cloud/</loc>
		<lastmod>2018-07-23T13:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/buried-internetworking-infrastructure-risky-business/</loc>
		<lastmod>2018-07-23T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/visit-gemalto-at-black-hat-2018/</loc>
		<lastmod>2018-07-23T14:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mobile-menace-monday-adware-mobidash-gets-stealthy/</loc>
		<lastmod>2018-07-23T15:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/week-29-cyberattack-digest-2018-singhealth-telefonic-labcorp-and-others/</loc>
		<lastmod>2018-07-23T16:05:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/my-take-how-the-lack-of-api-security-translates-into-digital-transformation-security-holes/</loc>
		<lastmod>2018-07-23T17:36:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/3-reasons-you-should-treat-applications-as-machine-identities-in-your-security-strategy/</loc>
		<lastmod>2018-07-23T17:47:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-2018-cheryl-biswas-patching-its-complicated/</loc>
		<lastmod>2018-07-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-week-in-security-july-16-july-22/</loc>
		<lastmod>2018-07-23T19:11:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/it-pros-turn-to-the-cloud-to-speed-the-transition-to-managed-security/</loc>
		<lastmod>2018-07-23T19:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/xkcd-y-axis/</loc>
		<lastmod>2018-07-23T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/monday-july-23-dtex-insider-threat-privacy-in-the-news-top-ways-insiders-go-rogue-doj-shifts-focus-to-election-security-hr-industry-eyes-importance-of-privacy/</loc>
		<lastmod>2018-07-23T23:11:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-spot-a-zero-day-sight-unseen/</loc>
		<lastmod>2018-07-24T03:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/women-in-information-security-monica-jain/</loc>
		<lastmod>2018-07-24T03:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/hide-n-seek-from-home-routers-to-smart-home-insecurities/</loc>
		<lastmod>2018-07-24T03:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/federal-agency-data-is-under-siege-2/</loc>
		<lastmod>2018-07-24T07:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/more-organizations-are-adopting-biometrics-for-security-but-barriers-still-remain/</loc>
		<lastmod>2018-07-24T07:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-build-a-better-integrated-identity-strategy/</loc>
		<lastmod>2018-07-24T10:22:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/uk-university-domains-spoofed-in-massive-fraud-campaign-targeting-suppliers/</loc>
		<lastmod>2018-07-24T10:55:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/hackers-breach-singapores-largest-healthcare-provider-steal-records-of-1-5-million-patients-including-the-prime-minister/</loc>
		<lastmod>2018-07-24T11:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-keep-your-passwords-private/</loc>
		<lastmod>2018-07-24T11:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/russian-hacking-campaign-targeting-u-s-electric-utilities/</loc>
		<lastmod>2018-07-24T11:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/vigilant-softwares-game-changing-update-to-its-data-protection-platform/</loc>
		<lastmod>2018-07-24T13:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/puresec-improves-security-in-apache-openwhisk-serverless-runtime/</loc>
		<lastmod>2018-07-24T13:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/pass-the-hash-with-kerberos/</loc>
		<lastmod>2018-07-24T13:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/hackers-breached-virginia-bank-twice-in-eight-months-stole-2-4m/</loc>
		<lastmod>2018-07-24T13:38:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/edpb-to-icann-no-can-do/</loc>
		<lastmod>2018-07-24T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/is-this-website-safe-your-complete-website-safety-check-guide-avast-essential-guide/</loc>
		<lastmod>2018-07-24T14:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/not-all-cloud-software-is-created-equal/</loc>
		<lastmod>2018-07-24T14:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/detected-blocked-quarantined-cleaned/</loc>
		<lastmod>2018-07-24T14:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/google-marks-all-http-sites-not-secure-starting-today/</loc>
		<lastmod>2018-07-24T14:22:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/lockcrypt-ransomware-decryption-tool/</loc>
		<lastmod>2018-07-24T14:22:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/beyond-digital-how-social-media-can-lead-to-physical-threats-towards-brands/</loc>
		<lastmod>2018-07-24T14:48:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/should-business-risk-mitigation-be-a-factor-when-we-choose-our-suppliers-and-manufacturers/</loc>
		<lastmod>2018-07-24T15:11:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/pregnancy-and-pediatrics-trusted-doctor-patient-communication-over-a-decade/</loc>
		<lastmod>2018-07-24T15:22:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-we-need-certificate-revocation/</loc>
		<lastmod>2018-07-24T15:55:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/protection-first-strategy-application-isolation-as-the-last-line-of-defense/</loc>
		<lastmod>2018-07-24T16:13:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-data-breach-kill-chain-early-detection-is-key/</loc>
		<lastmod>2018-07-24T16:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-strain-of-mac-malware-proton-found-after-two-years/</loc>
		<lastmod>2018-07-24T16:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/innovation-fuels-infosec-institutes-record-performance-for-first-half-2018/</loc>
		<lastmod>2018-07-24T16:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/role-playing-an-incident-except-its-fun/</loc>
		<lastmod>2018-07-24T17:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-devops-needs-security-during-an-infrastructure-transition/</loc>
		<lastmod>2018-07-24T17:33:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-2018-elissa-shevinskys-containers-exploits-surprises-and-security/</loc>
		<lastmod>2018-07-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/considering-blockchain-as-a-viable-option-for-your-next-database-part-1/</loc>
		<lastmod>2018-07-24T18:10:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/are-you-getting-real-value-for-what-youre-spending-on-cybersecurity-solutions-part-one/</loc>
		<lastmod>2018-07-24T18:21:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ios-application-security-part-47-inspecting-apps-with-frida/</loc>
		<lastmod>2018-07-24T19:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/vulnhub-machines-walkthrough-series-mr-robot/</loc>
		<lastmod>2018-07-24T19:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-pci-dss-compliance-checklist-for-call-and-contact-centers/</loc>
		<lastmod>2018-07-24T19:34:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/browser-extension-bug-leads-to-post-injection/</loc>
		<lastmod>2018-07-24T20:22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-joy-of-tech-self-checkout/</loc>
		<lastmod>2018-07-24T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/integrating-securityiq-with-endpoint-protection-systems/</loc>
		<lastmod>2018-07-24T21:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/securityiq-just-in-time-training-for-symantec/</loc>
		<lastmod>2018-07-24T21:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mocana-embraces-tpm-2-0-for-iot-device-authentication-assurance/</loc>
		<lastmod>2018-07-25T00:34:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/summer-soti-ddos-by-the-numbers/</loc>
		<lastmod>2018-07-25T02:27:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/stop-working-in-silos-integrating-with-apis/</loc>
		<lastmod>2018-07-25T03:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-computer-criminals-are-targeting-the-nhs/</loc>
		<lastmod>2018-07-25T03:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-businesses-should-know-about-gdpr/</loc>
		<lastmod>2018-07-25T08:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-businesses-should-know-about-the-gdpr/</loc>
		<lastmod>2018-07-25T08:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/uk-enterprises-concerned-voice-activated-devices-could-easily-leak-data-affecting-gdpr-compliance/</loc>
		<lastmod>2018-07-25T08:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/lessons-from-the-nhs-digital-data-breach-how-to-assess-your-organisations-risk/</loc>
		<lastmod>2018-07-25T09:15:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/heres-why-twitter-will-lock-your-account-if-you-change-your-display-name-to-elon-musk/</loc>
		<lastmod>2018-07-25T10:29:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/russia-analyzes-fake-news-bill-to-allegedly-stop-proliferation-of-deceitful-content/</loc>
		<lastmod>2018-07-25T11:09:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/on-financial-fraud/</loc>
		<lastmod>2018-07-25T11:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/california-data-breach-reporting-rate-decreases-59-percent-in-first-half-of-2018-negligent-employees-human-errors-continue-to-cause-breaches/</loc>
		<lastmod>2018-07-25T11:59:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/kronos-malware-returns-with-new-attack-campaigns-updates/</loc>
		<lastmod>2018-07-25T12:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/best-security-practices-for-trusted-tls-intermediary/</loc>
		<lastmod>2018-07-25T12:52:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-different-wordpress-web-hosting-types-and-their-pros-cons/</loc>
		<lastmod>2018-07-25T13:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/dave-lewis-the-perimter-is-dead-send-flowers/</loc>
		<lastmod>2018-07-25T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/software-quality-is-a-competitive-differentiator/</loc>
		<lastmod>2018-07-25T14:21:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/virginia-bank-falls-victim-to-two-phishing-scams-loses-2-million/</loc>
		<lastmod>2018-07-25T14:28:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-avoid-targeted-aws-attacks-with-secure-aws-keys/</loc>
		<lastmod>2018-07-25T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/hu-the-missing-element/</loc>
		<lastmod>2018-07-25T14:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/micropsia-malware/</loc>
		<lastmod>2018-07-25T14:41:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ferruh-explains-why-web-application-security-automation-is-a-must-in-enterprises/</loc>
		<lastmod>2018-07-25T14:56:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/videos-best-practices-to-build-a-security-champions-program/</loc>
		<lastmod>2018-07-25T15:34:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mocana-leverages-tpm-2-0-for-secure-embedded-and-iot-devices/</loc>
		<lastmod>2018-07-25T15:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-tcg-architects-guide-demonstrates-fraud-reduction-in-payment-industry-with-trusted-computing/</loc>
		<lastmod>2018-07-25T15:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-hidden-costs-of-certificate-management/</loc>
		<lastmod>2018-07-25T16:15:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/trojans-whats-the-real-deal/</loc>
		<lastmod>2018-07-25T16:22:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/global-critical-infrastructure-remains-under-significant-cyber-attack/</loc>
		<lastmod>2018-07-25T16:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-2018-courtney-falks-playing-russian-troll-whack-a-mole/</loc>
		<lastmod>2018-07-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/my-take-heres-why-identities-are-the-true-firewalls-especially-as-digital-transformation-unfolds/</loc>
		<lastmod>2018-07-25T18:02:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cha-ching-zhengs-datang-coin-ponzi-scheme/</loc>
		<lastmod>2018-07-25T19:03:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/education-is-as-important-as-protection-when-it-comes-to-battling-cybercrime/</loc>
		<lastmod>2018-07-25T19:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-microsoft-requiring-multi-factor-authentication-for-privileged-accounts-is-a-good-thing/</loc>
		<lastmod>2018-07-25T20:15:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/4-things-to-consider-when-evaluating-an-instant-issuance-solution/</loc>
		<lastmod>2018-07-25T20:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/luke-kingma-lou-patrick-mackays-voice-clone/</loc>
		<lastmod>2018-07-25T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/scam-alert-dont-fall-for-this-webcam-extortion-ploy-avast/</loc>
		<lastmod>2018-07-25T21:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/lifelock-bug-exposed-millions-of-customer-email-addresses/</loc>
		<lastmod>2018-07-25T22:20:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/25-of-federal-agencies-have-yet-to-start-compulsory-dmarc-compliance-journey-researchers-find/</loc>
		<lastmod>2018-07-26T03:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-the-federal-government-is-working-to-improve-its-cybersecurity-workforce/</loc>
		<lastmod>2018-07-26T03:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-shared-security-podcast-episode-78-summer-camp-facial-recognition-dark-web-dangers/</loc>
		<lastmod>2018-07-26T04:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/icedid-trickbot-a-give-and-take-relationship/</loc>
		<lastmod>2018-07-26T06:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/to-go-native-or-not-to-go-native-a-cautionary-tale-about-database-encryption/</loc>
		<lastmod>2018-07-26T07:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-cryptojacking-consequences-cisos-cant-ignore/</loc>
		<lastmod>2018-07-26T09:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/here-be-dragons-keeping-kids-safe-online/</loc>
		<lastmod>2018-07-26T10:55:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/five-ways-to-maximize-opportunity-in-the-digital-banking-era/</loc>
		<lastmod>2018-07-26T11:22:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/attend-the-third-annual-federal-it-security-conference-fitsc/</loc>
		<lastmod>2018-07-26T12:03:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/dont-let-your-factory-plant-become-the-next-cybersecurity-victim/</loc>
		<lastmod>2018-07-26T12:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/senator-calls-on-us-government-to-start-killing-adobe-flash-now/</loc>
		<lastmod>2018-07-26T13:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tenable-ipo-accelerating-our-vision/</loc>
		<lastmod>2018-07-26T13:39:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-implications-of-digital-transformation-report/</loc>
		<lastmod>2018-07-26T13:47:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mark-your-calendars-for-these-avast-business-channel-and-it-events-avast-business/</loc>
		<lastmod>2018-07-26T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/surveillance-state-chronicles-crimson-hexagon-this-months-cambridge-analytica/</loc>
		<lastmod>2018-07-26T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/three-c-words-of-web-app-security-part-1-cors/</loc>
		<lastmod>2018-07-26T14:04:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-kubernetes-is-not-a-silver-bullet/</loc>
		<lastmod>2018-07-26T14:09:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/was-the-crystal-ball-crystal-clear-reflecting-on-2018-cybersecurity-predictions/</loc>
		<lastmod>2018-07-26T14:11:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/sextortion-scam-luring-victims-in-with-breached-passwords-dont-pay/</loc>
		<lastmod>2018-07-26T14:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-should-you-do-when-your-identity-has-been-compromised/</loc>
		<lastmod>2018-07-26T15:10:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/https-should-be-implemented-everywhereincluding-on-static-websites/</loc>
		<lastmod>2018-07-26T15:16:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/fortnite-scammers-approaching-1m-in-annual-takings/</loc>
		<lastmod>2018-07-26T15:49:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/insurance-occurrence-assurance/</loc>
		<lastmod>2018-07-26T16:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/fraud-as-a-service-faas-everything-you-need-to-know/</loc>
		<lastmod>2018-07-26T16:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/top-14-social-engineering-red-flags/</loc>
		<lastmod>2018-07-26T16:35:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-awareness-training-vs-software/</loc>
		<lastmod>2018-07-26T16:35:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mobile-malware-android-and-ios/</loc>
		<lastmod>2018-07-26T16:35:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/sports-and-health-fitness-retailers-find-themselves-in-the-cyber-security-firing-line/</loc>
		<lastmod>2018-07-26T17:11:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/prep-for-taxes-prep-for-tax-scammers/</loc>
		<lastmod>2018-07-26T17:20:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cyberattack-biggest-threat-against-u-s-financial-system/</loc>
		<lastmod>2018-07-26T17:23:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/hiding-grants-tomb-in-plain-sight/</loc>
		<lastmod>2018-07-26T17:42:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-run-a-phishing-test-on-your-employees/</loc>
		<lastmod>2018-07-26T17:47:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-2018-bryan-mcaninchs-the-faas-and-the-curious-aws-lambda-threat-modeling/</loc>
		<lastmod>2018-07-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-is-a-phishing-filter-plus-how-to-set-one-up/</loc>
		<lastmod>2018-07-26T19:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-top-ten-most-famous-social-engineering-attacks/</loc>
		<lastmod>2018-07-26T19:11:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/10-steps-to-take-after-clicking-a-phishing-scam/</loc>
		<lastmod>2018-07-26T19:11:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/switching-to-https-before-its-too-late/</loc>
		<lastmod>2018-07-26T19:35:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/imperva-to-acquire-devops-security-leader-prevoty/</loc>
		<lastmod>2018-07-26T20:19:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/introducing-malwarebytes-browser-extension/</loc>
		<lastmod>2018-07-26T20:22:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tcg-talks-to-securityledger-com-about-dice-in-new-podcast/</loc>
		<lastmod>2018-07-26T20:34:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/breaking-the-ice-on-dice-scaling-secure-internet-of-things-identities/</loc>
		<lastmod>2018-07-26T20:34:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/you-cant-fix-authentication-without-fixing-access/</loc>
		<lastmod>2018-07-26T20:34:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/building-effective-defense-with-the-phishing-kill-chain/</loc>
		<lastmod>2018-07-26T20:34:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-create-awareness-of-insider-threats/</loc>
		<lastmod>2018-07-26T20:34:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-best-practices-for-ensuring-data-privacy/</loc>
		<lastmod>2018-07-26T20:34:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/fighting-security-fatigue-10-steps-for-detection-prevention/</loc>
		<lastmod>2018-07-26T20:34:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/free-gdpr-quiz-are-you-in-compliance/</loc>
		<lastmod>2018-07-26T20:34:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/book-review-social-engineering-the-science-of-human-hacking/</loc>
		<lastmod>2018-07-26T20:47:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/xkcd-light-hacks/</loc>
		<lastmod>2018-07-26T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit/</loc>
		<lastmod>2018-07-26T21:34:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bluetooth-flaw-allows-man-in-the-middle-attacks-avast/</loc>
		<lastmod>2018-07-26T21:34:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-penetration-testing-and-assessments-should-include-real-world-scenarios/</loc>
		<lastmod>2018-07-27T01:23:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/two-new-apache-drill-udfs-for-processing-urils-and-internet-domain-names/</loc>
		<lastmod>2018-07-27T01:28:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/enterprises-and-governments-trust-hacker-powered-security-to-identify-unique-critical-vulnerabilities/</loc>
		<lastmod>2018-07-27T08:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ftc-seeks-stronger-cybersecurity-enforcement-powers/</loc>
		<lastmod>2018-07-27T09:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/password-check-required-immediately-most-effective-phishing-line/</loc>
		<lastmod>2018-07-27T09:40:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/not-looking-phishy-and-not-hitting-the-panic-button/</loc>
		<lastmod>2018-07-27T09:42:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/shipping-company-struck-by-ransomware-attack/</loc>
		<lastmod>2018-07-27T11:52:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/gdpr-directly-impacts-facebook-1-million-european-users-lost/</loc>
		<lastmod>2018-07-27T12:25:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/build-your-own-banking-trojan-ransomware-on-the-high-seas-and-sim-card-chaos-avast/</loc>
		<lastmod>2018-07-27T13:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/en-garde-cnc/</loc>
		<lastmod>2018-07-27T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/best-practices-for-defeating-automated-attacks/</loc>
		<lastmod>2018-07-27T14:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-quick-start-introduction-to-database-security-an-operational-approach/</loc>
		<lastmod>2018-07-27T15:20:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/state-govts-warned-of-malware-laden-cd-sent-via-snail-mail-from-china/</loc>
		<lastmod>2018-07-27T15:45:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-report-on-police-digital-forensics-techniques/</loc>
		<lastmod>2018-07-27T17:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/debugging-postscript-with-ghostscript/</loc>
		<lastmod>2018-07-27T17:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-2018-kevin-gennusos-deploying-deceptive-systems-luring-attackers-from-the-shadows/</loc>
		<lastmod>2018-07-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-resources/</loc>
		<lastmod>2018-07-27T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/meet-us-at-black-hat-usa-2018/</loc>
		<lastmod>2018-07-27T18:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/going-on-the-offense-how-to-eliminate-internal-threats/</loc>
		<lastmod>2018-07-27T20:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-android-p-includes-several-security-improvements/</loc>
		<lastmod>2018-07-27T20:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/some-changes-in-how-libpcap-works-you-should-know/</loc>
		<lastmod>2018-07-27T20:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-joy-of-tech-is-there-a-lake-on-mars/</loc>
		<lastmod>2018-07-27T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-commercial-threat-hunting-platforms-that-can-provide-great-value-to-your-hunting-party/</loc>
		<lastmod>2018-07-27T21:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/malvertising-input-validation-and-new-iot-botnet-variants/</loc>
		<lastmod>2018-07-27T21:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-safeguard-against-the-privacy-implications-of-cloud-computing/</loc>
		<lastmod>2018-07-27T22:40:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/top-10-privacy-protection-tools-for-the-enterprise/</loc>
		<lastmod>2018-07-27T22:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-methods-for-data-privacy-enhancement/</loc>
		<lastmod>2018-07-27T23:52:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/3-reasons-the-smart-city-needs-data-privacy/</loc>
		<lastmod>2018-07-27T23:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-privacy-education-is-a-must-in-security-awareness-training/</loc>
		<lastmod>2018-07-27T23:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-2018-chris-spehns-greatsct-gotta-catch-em-awl/</loc>
		<lastmod>2018-07-28T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mobile-apps-must-roll-back-welcome-mat-for-cybercriminals/</loc>
		<lastmod>2018-07-28T14:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-2018-dimitry-snezhkovs-quick-retooling-in-net-for-red-teams/</loc>
		<lastmod>2018-07-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bye-bye-dna-hello-gsk-and-others/</loc>
		<lastmod>2018-07-28T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/flakes-connect-the-measles/</loc>
		<lastmod>2018-07-28T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ssd-advisory-line-corporation-uri-handlers-remote-commands-execution/</loc>
		<lastmod>2018-07-29T05:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/summer-soti-web-attacks/</loc>
		<lastmod>2018-07-29T11:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/how-you-can-protect-your-microsoft-exchange-email-service-from-cyber-attacks/</loc>
		<lastmod>2018-07-29T11:17:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/email-impersonation-scams-what-you-or-your-it-staff-can-do-to-protect-your-business/</loc>
		<lastmod>2018-07-29T11:17:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/why-outdated-anti-phishing-advice-leaves-you-exposed-stories-from-the-trenches-part-2/</loc>
		<lastmod>2018-07-29T11:17:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/why-outdated-anti-phishing-advice-leaves-you-exposed-stories-from-the-trenches-part-1/</loc>
		<lastmod>2018-07-29T11:17:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cybersecurity-tips-for-conveyancers-and-solicitors-using-pexa/</loc>
		<lastmod>2018-07-29T11:17:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/businesses-require-new-techniques-to-combat-phishing-in-2018/</loc>
		<lastmod>2018-07-29T11:17:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-scam-which-preys-on-vulnerable-people-and-works/</loc>
		<lastmod>2018-07-29T11:17:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-ways-you-can-dramatically-improve-your-security-posture/</loc>
		<lastmod>2018-07-29T12:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-2018-stephen-decks-abuse-case-testing-in-devops/</loc>
		<lastmod>2018-07-29T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ggplot-doodling-with-hibp-breaches/</loc>
		<lastmod>2018-07-29T14:08:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-chrysanthemum-throne-an-abdication-and-a-unicode-complication/</loc>
		<lastmod>2018-07-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circle-city-con-2018-jeff-mans-rethinking-cyber-security-given-the-spectre-of-a-meltdown-someone-hold-my-beer/</loc>
		<lastmod>2018-07-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/robert-m-lee-and-jeff-hass-little-bobby-comics-attack/</loc>
		<lastmod>2018-07-29T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bsideslv-preview-fighting-fraud-in-the-trenches/</loc>
		<lastmod>2018-07-30T03:40:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-shared-security-weekly-blaze-bluetooth-vulnerabilities-malicious-apps-removed-from-twitter-gmail-confidential-mode/</loc>
		<lastmod>2018-07-30T04:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/google-play-store-no-longer-accepts-crypto-mining-apps/</loc>
		<lastmod>2018-07-30T07:45:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/top-4-things-msps-must-do-in-a-security-breach/</loc>
		<lastmod>2018-07-30T07:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-do-firewalls-work/</loc>
		<lastmod>2018-07-30T09:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/guest-essay-how-siems-uebas-fall-short-in-todays-turbulent-threat-landscape/</loc>
		<lastmod>2018-07-30T09:26:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/theres-a-hole-in-my-aws-s3-bucket/</loc>
		<lastmod>2018-07-30T10:16:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cybersecurity-benchmarking-wheres-the-data/</loc>
		<lastmod>2018-07-30T11:21:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/unknown-attacker-runs-off-with-7-7-million-in-kickcoin-after-hacking-40-wallets/</loc>
		<lastmod>2018-07-30T11:23:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/data-security-incident-at-pediatric-hospital-affects-100k-individuals/</loc>
		<lastmod>2018-07-30T11:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/identifying-people-by-metadata/</loc>
		<lastmod>2018-07-30T11:35:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ca-veracode-dynamic-analysis-helps-you-check-your-security-headers/</loc>
		<lastmod>2018-07-30T13:16:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/an-introduction-to-the-xposed-framework-for-android-penetration-testing/</loc>
		<lastmod>2018-07-30T13:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bank-mode-protects-you-and-your-cash-avast/</loc>
		<lastmod>2018-07-30T13:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/netspectre-the-new-vector/</loc>
		<lastmod>2018-07-30T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/week-30-cyberattack-digest-2018-cosco-jefferson-county-school-idaho-department-of-correction-and-others/</loc>
		<lastmod>2018-07-30T14:16:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/prison-inmates-hacked-tablets-to-earn-225000-in-credits/</loc>
		<lastmod>2018-07-30T14:38:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-top-20-penetration-testing-tools-part-2/</loc>
		<lastmod>2018-07-30T14:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/application-of-open-source-scripting-tools-for-automated-field-device-configuration/</loc>
		<lastmod>2018-07-30T14:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-security-solution-for-smbs-avast/</loc>
		<lastmod>2018-07-30T14:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/join-fortinet-at-black-hat-usa-2018-in-las-vegas/</loc>
		<lastmod>2018-07-30T14:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/save-the-embarrassment-the-value-of-two-factor-authentication/</loc>
		<lastmod>2018-07-30T15:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/saas-data-protection-trends-in-the-tech-industry/</loc>
		<lastmod>2018-07-30T15:19:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-tech-datalocker-introduces-encrypted-flash-drive-with-key-pad/</loc>
		<lastmod>2018-07-30T15:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/key-findings-from-the-2018-credential-spill-report/</loc>
		<lastmod>2018-07-30T15:34:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/create-a-brand-building-human-connection-with-card-holders/</loc>
		<lastmod>2018-07-30T15:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/appsec-mistake-no-1-using-only-one-testing-type/</loc>
		<lastmod>2018-07-30T15:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/top-10-free-threat-hunting-tools/</loc>
		<lastmod>2018-07-30T15:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-become-a-security-architect-cyberspeak-with-infosec-institute-podcast/</loc>
		<lastmod>2018-07-30T15:52:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/gdpr-and-the-insider-threat-how-new-regulations-are-changing-our-data-handling-habits/</loc>
		<lastmod>2018-07-30T16:16:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-week-in-security-july-23-july-29/</loc>
		<lastmod>2018-07-30T16:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/service-provider-security-in-an-era-of-software-defined-anything/</loc>
		<lastmod>2018-07-30T16:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/are-you-getting-real-value-for-what-youre-spending-on-cybersecurity-solutions-part-two/</loc>
		<lastmod>2018-07-30T16:31:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tcg-publishes-new-whitepaper-to-guide-use-of-its-mobile-and-trusted-network-communications-tnc-specifications-for-mobile-security/</loc>
		<lastmod>2018-07-30T17:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/domain-risk-management/</loc>
		<lastmod>2018-07-30T17:16:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/best-practices-for-the-implementation-of-the-privacy-by-design-concept-in-smart-devices/</loc>
		<lastmod>2018-07-30T17:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-2018-magen-wus-carrot-vs-stick-motivation-metrics-and-awareness/</loc>
		<lastmod>2018-07-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/webinar-the-future-of-social-engineering-august-16-2018/</loc>
		<lastmod>2018-07-30T18:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/top-5-technologies-for-mitigating-insider-threats/</loc>
		<lastmod>2018-07-30T18:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-quick-guide-to-the-idn-homograph-attack/</loc>
		<lastmod>2018-07-30T18:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-social-engineering-threats-to-employee-privacy/</loc>
		<lastmod>2018-07-30T19:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/8-data-protection-tips-for-handling-personal-information/</loc>
		<lastmod>2018-07-30T19:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/deslock-encryption/</loc>
		<lastmod>2018-07-30T19:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-attack-windows-10-machine-with-metasploit-on-kali-linux/</loc>
		<lastmod>2018-07-30T19:52:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/intrusion-detection-for-containers-a-critical-part-of-the-container-security-landscape/</loc>
		<lastmod>2018-07-30T20:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/daniel-storis-disney-buys-linux/</loc>
		<lastmod>2018-07-30T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-make-your-own-penetration-testing-lab/</loc>
		<lastmod>2018-07-30T21:17:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/when-is-wireless-penetration-testing-appropriate/</loc>
		<lastmod>2018-07-30T21:17:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-comply-with-gdpr-privacy-regulation-in-6-steps/</loc>
		<lastmod>2018-07-30T21:17:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-employers-need-to-know-about-workplace-monitoring-and-employee-privacy/</loc>
		<lastmod>2018-07-30T21:17:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/8-things-it-professionals-need-to-know-about-customer-privacy/</loc>
		<lastmod>2018-07-30T21:17:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-protect-user-data-with-the-privacy-by-design-framework/</loc>
		<lastmod>2018-07-30T21:17:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/has-california-just-created-gdpr-2-0/</loc>
		<lastmod>2018-07-30T22:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-advance-in-your-career-as-a-penetration-tester/</loc>
		<lastmod>2018-07-30T22:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-is-it-like-to-be-a-penetration-tester-for-an-in-house-team/</loc>
		<lastmod>2018-07-30T22:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-get-started-as-a-mobile-penetration-tester/</loc>
		<lastmod>2018-07-30T22:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/monday-july-30-dtex-insider-threat-privacy-in-the-news-california-data-breach-horror-stories-feature-vulnerable-insiders-trump-administration-focusing-on-privacy-regulation/</loc>
		<lastmod>2018-07-30T22:47:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-the-not-secure-tag-in-chrome-68-makes-sense/</loc>
		<lastmod>2018-07-30T22:49:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/functionshield-a-free-serverless-protection-library-to-help-harden-your-serverless-apps/</loc>
		<lastmod>2018-07-30T23:40:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/understanding-keys-is-key-to-understanding/</loc>
		<lastmod>2018-07-31T07:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/73-of-cisos-stockpile-cryptocurrency-to-pay-cybercriminals-if-attacked/</loc>
		<lastmod>2018-07-31T09:10:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/uk-shipping-giant-deals-with-data-breach-by-the-book-recovers-stolen-data/</loc>
		<lastmod>2018-07-31T10:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/steam-game-abstractism-pulled-after-cryptomining-accusations/</loc>
		<lastmod>2018-07-31T11:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/breach-at-electronics-retailer-might-have-exposed-10m-data-records/</loc>
		<lastmod>2018-07-31T11:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/july-vulnerability-of-the-month-two-zero-days-caught-in-development/</loc>
		<lastmod>2018-07-31T12:37:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/fortinet-announces-enhancements-to-our-security-services-portfolio/</loc>
		<lastmod>2018-07-31T13:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-write-social-media-policies-designed-to-reduce-digital-risks/</loc>
		<lastmod>2018-07-31T13:26:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/experts-that-support-your-digital-transformation/</loc>
		<lastmod>2018-07-31T13:58:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-secrets-out-reports-of-the-privacy-of-private-browsing-have-been-greatly-exaggerated/</loc>
		<lastmod>2018-07-31T13:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/leaders-meetings-a-privileged-target-for-hackers/</loc>
		<lastmod>2018-07-31T13:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/amazon-the-rekognition-fail/</loc>
		<lastmod>2018-07-31T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-do-you-check-old-hashes-in-your-abap-system/</loc>
		<lastmod>2018-07-31T14:53:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/patient-engagement-the-benefits-for-healthcare-organizations-and-patients/</loc>
		<lastmod>2018-07-31T15:16:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/considerations-for-load-balancers-when-migrating-applications-to-the-cloud/</loc>
		<lastmod>2018-07-31T15:40:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-is-the-nist-cybersecurity-framework/</loc>
		<lastmod>2018-07-31T15:57:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-for-unusual-logon-activity/</loc>
		<lastmod>2018-07-31T16:52:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-for-swells-in-database-read-volume/</loc>
		<lastmod>2018-07-31T16:52:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-for-unusual-dns-requests/</loc>
		<lastmod>2018-07-31T16:52:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-for-anomalies-in-privileged-account-activity/</loc>
		<lastmod>2018-07-31T16:52:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mud-the-solution-to-our-messy-enterprise-iot-security-problems/</loc>
		<lastmod>2018-07-31T16:52:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/speaking-at-security-summit-brazil-2018/</loc>
		<lastmod>2018-07-31T16:59:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/bens-book-of-the-month-review-of-the-truth-machine-the-blockchain-and-the-future-of-everything/</loc>
		<lastmod>2018-07-31T17:04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/circlecity-con-2018-wolfgang-goerlichs-securing-without-slowing-devops/</loc>
		<lastmod>2018-07-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-for-file-hashes-as-an-ioc/</loc>
		<lastmod>2018-07-31T18:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-for-file-names-as-an-ioc/</loc>
		<lastmod>2018-07-31T18:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-for-urls-as-an-ioc/</loc>
		<lastmod>2018-07-31T18:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-for-domains-as-an-ioc/</loc>
		<lastmod>2018-07-31T18:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-hunting-and-html-response-size/</loc>
		<lastmod>2018-07-31T18:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/extending-firewalls-to-microservices-with-istio/</loc>
		<lastmod>2018-07-31T18:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/onwards-and-upwards-our-gdpr-journey-and-looking-ahead/</loc>
		<lastmod>2018-07-31T18:31:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-check-for-revoked-certificates/</loc>
		<lastmod>2018-07-31T19:33:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/malvertising-in-plain-sight-avast/</loc>
		<lastmod>2018-07-31T20:04:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-carrying-out-data-security-and-privacy-practices-in-response-to-specific-scenarios/</loc>
		<lastmod>2018-07-31T20:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-installing-and-configuring-identity-and-access-services/</loc>
		<lastmod>2018-07-31T20:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-technologies-and-tools-nips-nids/</loc>
		<lastmod>2018-07-31T20:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-technologies-and-tools-firewall/</loc>
		<lastmod>2018-07-31T20:05:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-technologies-and-tools-vpn-concentrators/</loc>
		<lastmod>2018-07-31T20:05:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-technologies-and-tools-switches-and-routers/</loc>
		<lastmod>2018-07-31T20:05:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/rawgit-cdn-is-abused-by-cryptoloot-cryptominers/</loc>
		<lastmod>2018-07-31T20:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/luke-kingma-lou-patrick-mackays-the-fourth-circle-of-amazon-fulfillment/</loc>
		<lastmod>2018-07-31T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/underminer-exploit-kit-how-tenable-can-help/</loc>
		<lastmod>2018-07-31T21:07:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/whats-in-the-spam-mailbox-this-week/</loc>
		<lastmod>2018-07-31T21:10:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/penetration-testing-for-a-company-vs-being-freelance/</loc>
		<lastmod>2018-07-31T21:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-implement-a-data-privacy-strategy-10-steps/</loc>
		<lastmod>2018-07-31T21:10:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-technologies-and-tools-dlp/</loc>
		<lastmod>2018-07-31T21:10:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/introducing-bromium-protected-app-protect-critical-applications-against-compromised-devices/</loc>
		<lastmod>2018-07-31T22:39:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-considerations-to-make-before-purchasing-security-awareness-training/</loc>
		<lastmod>2018-07-31T22:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/qa-certification-accreditation-in-computer-forensics/</loc>
		<lastmod>2018-07-31T22:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-is-the-difference-between-penetration-testing-and-vulnerability-assessment/</loc>
		<lastmod>2018-07-31T22:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/from-my-gartner-blog-gartner-security-and-risk-management-summit-brazil-2018/</loc>
		<lastmod>2018-07-31T23:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/is-facial-recognition-really-such-a-bad-idea/</loc>
		<lastmod>2018-07-31T23:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/podcast-ciso-speak-incident-response/</loc>
		<lastmod>2018-07-31T23:44:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/slim-docker-images-for-rails/</loc>
		<lastmod>2018-08-01T01:27:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/critical-samsam-ransomware-update/</loc>
		<lastmod>2018-08-01T03:10:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-is-passive-asset-discovery-and-is-it-that-important/</loc>
		<lastmod>2018-08-01T03:34:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/introducing-the-checkmarx-certified-engineer-program-cxce/</loc>
		<lastmod>2018-08-01T05:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/interesting-screenshots-at-revolution-3-tour/</loc>
		<lastmod>2018-08-01T07:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-lessons-learned-from-the-mueller-indictment/</loc>
		<lastmod>2018-08-01T08:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/you-could-have-invented-that-bluetooth-attack/</loc>
		<lastmod>2018-08-01T11:05:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/new-ways-to-manage-digital-risk/</loc>
		<lastmod>2018-08-01T12:10:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-need-for-real-world-runtime-protection-benchmarking/</loc>
		<lastmod>2018-08-01T12:31:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/multi-vector-ransomware-attack-shuts-down-alaskan-suburbs/</loc>
		<lastmod>2018-08-01T13:15:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/exploiting-a-microsoft-edge-vulnerability-to-steal-files/</loc>
		<lastmod>2018-08-01T13:36:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-art-of-secure-code/</loc>
		<lastmod>2018-08-01T13:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/saml-the-p0wnage/</loc>
		<lastmod>2018-08-01T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/venafi-and-gemalto-partner-to-simplify-machine-identity-protection/</loc>
		<lastmod>2018-08-01T14:23:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/drive-by-cryptomining-another-way-cyber-criminals-are-trying-to-evade-detection/</loc>
		<lastmod>2018-08-01T14:34:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/threat-stack-quick-guide-to-black-hat-usa-2018/</loc>
		<lastmod>2018-08-01T14:56:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-era-of-software-exposure/</loc>
		<lastmod>2018-08-01T14:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/tips-for-penetration-testing-a-pci-environment/</loc>
		<lastmod>2018-08-01T15:11:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-americas-car-mart-stays-one-step-ahead-of-hackers-with-securityiq/</loc>
		<lastmod>2018-08-01T16:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/securing-a-global-workforce-how-olx-group-dropped-employee-phishing-susceptibility-rates-more-than-90-in-6-months/</loc>
		<lastmod>2018-08-01T16:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/julian-tang-on-infosec-institutes-cissp-boot-camp-compressed-engaging-effective/</loc>
		<lastmod>2018-08-01T16:10:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/google-vault-and-spanning-backup-two-great-products-two-different-purposes/</loc>
		<lastmod>2018-08-01T16:26:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/monthly-blog-round-up-july-2018/</loc>
		<lastmod>2018-08-01T16:45:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/tufin-announces-partner-of-the-year-awards-in-emea-and-u-s/</loc>
		<lastmod>2018-08-01T17:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/circlecity-con-2018-c-matthew-curtins-operator-the-well-rounded-hacker/</loc>
		<lastmod>2018-08-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/xkcd-heatindex/</loc>
		<lastmod>2018-08-01T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/reddit-says-some-user-data-accessed-in-security-incident/</loc>
		<lastmod>2018-08-01T22:22:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/vendor-management-and-privacy-compliance/</loc>
		<lastmod>2018-08-01T23:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/top-4-best-practices-for-protecting-your-business-from-insider-threats/</loc>
		<lastmod>2018-08-01T23:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/reddit-breach-highlights-limits-of-sms-based-authentication/</loc>
		<lastmod>2018-08-02T00:55:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bsideslv-preview-who-watches-the-watchers-understanding-the-internets-background-noise/</loc>
		<lastmod>2018-08-02T03:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/itil-the-change-management-process-and-tripwire-enterprise/</loc>
		<lastmod>2018-08-02T03:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/three-reasons-you-should-treat-applications-as-machine-identities-in-your-security-strategy/</loc>
		<lastmod>2018-08-02T07:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/retail-industry-still-struggles-with-cybersecurity/</loc>
		<lastmod>2018-08-02T08:22:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/us-department-of-justice-creates-software-blacklist-to-prevent-foreign-attacks/</loc>
		<lastmod>2018-08-02T09:17:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/beyond-the-password-implementing-mfa-at-every-connection-point/</loc>
		<lastmod>2018-08-02T10:46:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/why-gamification-is-the-key-to-leveling-up-your-software-security/</loc>
		<lastmod>2018-08-02T11:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/three-suspected-members-of-computer-crime-group-in-custody-for-malware-campaigns/</loc>
		<lastmod>2018-08-02T11:46:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/data-talks-bromium-analyzes-live-running-malware-from-a-unique-threat-vantage-point/</loc>
		<lastmod>2018-08-02T12:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ssd-advisory-infiniband-linux-driver-uaf/</loc>
		<lastmod>2018-08-02T12:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/not-all-two-factor-authentication-is-created-equal/</loc>
		<lastmod>2018-08-02T12:58:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-best-and-safest-phones-for-kids-of-all-ages-avast/</loc>
		<lastmod>2018-08-02T13:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/reddit-hacked-but-dont-give-up-on-2fa-just-yet/</loc>
		<lastmod>2018-08-02T13:57:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ocsi-certifies-safenet-luna-pcie-cryptographic-module-for-use-as-qsigcd-and-qsealcd/</loc>
		<lastmod>2018-08-02T13:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-next-battleground/</loc>
		<lastmod>2018-08-02T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-year-targeted-phishing-went-mainstream/</loc>
		<lastmod>2018-08-02T15:11:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/social-engineering-attacks-what-makes-you-susceptible/</loc>
		<lastmod>2018-08-02T15:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-long-can-we-trust-the-green-padlock/</loc>
		<lastmod>2018-08-02T15:33:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/dns-strengthening-the-weakest-link/</loc>
		<lastmod>2018-08-02T15:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/android-and-onedrive-and-ios-targeting-phish/</loc>
		<lastmod>2018-08-02T16:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/separating-the-wheat-from-the-chaff/</loc>
		<lastmod>2018-08-02T16:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/everything-you-need-to-know-about-cyber-insurance-policy-coverage/</loc>
		<lastmod>2018-08-02T16:39:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/so-many-topics-at-rsa-conference-but-what-does-it-all-mean/</loc>
		<lastmod>2018-08-02T17:34:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/black-hat-2018-the-art-of-secure-code/</loc>
		<lastmod>2018-08-02T17:35:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-april-c-wright-s-the-insecure-software-development-lifecycle-how-to-find-fix-and-manage-deficiencies-within-an-existing-methodology/</loc>
		<lastmod>2018-08-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-perils-of-public-wifi/</loc>
		<lastmod>2018-08-02T18:12:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/national-cybersecurity-alliance-advocates-shared-responsibility-for-securing-the-internet/</loc>
		<lastmod>2018-08-02T18:13:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/50-best-cloud-security-training-resources/</loc>
		<lastmod>2018-08-02T18:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cryptominers-binary-process-cron-variants-and-methods-of-removal/</loc>
		<lastmod>2018-08-02T19:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-joy-of-tech-fact-checking/</loc>
		<lastmod>2018-08-02T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-comply-with-the-red-flags-rule/</loc>
		<lastmod>2018-08-02T21:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/sms-intercept-creates-data-breach-at-reddit-avast/</loc>
		<lastmod>2018-08-02T21:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/supply-chain-attacks-shipping-the-exploits/</loc>
		<lastmod>2018-08-02T22:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/some-dos-and-donts-for-hiring-your-security-leader/</loc>
		<lastmod>2018-08-03T03:34:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/is-the-end-of-the-eu-us-privacy-shield-in-sight/</loc>
		<lastmod>2018-08-03T03:34:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/four-cool-tools-expected-out-of-black-hat/</loc>
		<lastmod>2018-08-03T07:46:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/qa-crypto-jackers-redirect-illicit-mining-ops-to-bigger-targets-company-servers/</loc>
		<lastmod>2018-08-03T08:32:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/take-a-risk-based-approach-to-managing-cybersecurity-with-nist/</loc>
		<lastmod>2018-08-03T09:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/business-email-compromise-the-9-billion-security-threat-you-cant-ignore-cyberspeak-podcast/</loc>
		<lastmod>2018-08-03T11:34:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/porn-extortion-email-tied-to-password-breach/</loc>
		<lastmod>2018-08-03T11:59:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/hacker-demands-nothing-after-infecting-hong-kong-department-of-health-with-ransomware/</loc>
		<lastmod>2018-08-03T12:38:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/threat-identity-the-first-line-of-defense/</loc>
		<lastmod>2018-08-03T12:47:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/appsec-mistake-no-2-ignoring-open-source-library-use/</loc>
		<lastmod>2018-08-03T13:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/tripwire-patch-priority-index-for-july-2018/</loc>
		<lastmod>2018-08-03T13:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-sanger-attestation-the-age-of-cyberwar-is-here/</loc>
		<lastmod>2018-08-03T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/samsam-ransomware-can-shut-your-city-down-avast/</loc>
		<lastmod>2018-08-03T14:22:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/avast-business-bye-bye-basic-antivirus-hello-superior-protection-avast-business/</loc>
		<lastmod>2018-08-03T14:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/clever-cryptojacking-campaign-targets-microtik-routers-if-you-own-one-patch-now/</loc>
		<lastmod>2018-08-03T14:30:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-telltale-signs-of-a-business-email-compromise-and-how-to-avoid-an-attack/</loc>
		<lastmod>2018-08-03T14:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/defending-the-wall-strong-passwords/</loc>
		<lastmod>2018-08-03T15:01:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/explained-what-is-big-data/</loc>
		<lastmod>2018-08-03T15:22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/singapore-healthcare-breach/</loc>
		<lastmod>2018-08-03T15:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/credit-card-issuer-tcm-bank-leaked-applicant-data-for-16-months/</loc>
		<lastmod>2018-08-03T15:48:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-cliff-smiths-the-sky-isnt-falling-but-the-earth-may-be-shifting-how-gdpr-could-change-the-face-of-infosec/</loc>
		<lastmod>2018-08-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-game-that-cryptojacks-a-town-under-seige-and-more-data-breaches-avast/</loc>
		<lastmod>2018-08-03T18:34:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/xkcd-lightning-distance/</loc>
		<lastmod>2018-08-03T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-first-national-cybersecurity-summit/</loc>
		<lastmod>2018-08-04T12:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/quantum-recommendation-problem-obsoleted/</loc>
		<lastmod>2018-08-04T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/digging-into-mbox-details-a-tale-of-tm-reticulate/</loc>
		<lastmod>2018-08-04T14:17:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fin7-and-the-perfect-phish/</loc>
		<lastmod>2018-08-04T17:09:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-kevin-johnsons-gullivers-travels-security-exploits-and-vulnerabilities-around-the-globe/</loc>
		<lastmod>2018-08-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/xkcd-complex-numbers/</loc>
		<lastmod>2018-08-04T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/michael-real-life-rambo-sheehan-dies-at-63/</loc>
		<lastmod>2018-08-05T05:05:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/satan-ransomware-adds-eternalblue-exploit/</loc>
		<lastmod>2018-08-05T10:46:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/qa-heres-why-it-has-become-vital-for-companies-to-deter-machine-identity-thieves/</loc>
		<lastmod>2018-08-05T11:52:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/quantifying-the-impact-of-the-twitter-fake-accounts-purge-a-technical-analysis/</loc>
		<lastmod>2018-08-05T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/us-national-counterintelligence-and-security-center-releases-2018-foreign-economic-espionage-in-cyberspace-report/</loc>
		<lastmod>2018-08-05T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-david-liebenberg-s-from-ddos-to-mining-chinese-cybercriminals-set-their-sights-on-monero/</loc>
		<lastmod>2018-08-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/robert-m-lee-and-jeff-hass-little-bobby-comics-vendors/</loc>
		<lastmod>2018-08-05T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-top-security-tools-to-use-across-the-cyber-kill-chain/</loc>
		<lastmod>2018-08-05T22:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-shared-security-weekly-blaze-quiet-skies-tsa-surveillance-program-sim-hijacking-and-the-reddit-data-breach-sextortion-scams/</loc>
		<lastmod>2018-08-06T04:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-as-a-quality-gate-for-devops/</loc>
		<lastmod>2018-08-06T04:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-the-cis-controls-can-help-you-achieve-pci-dss-3-2-compliance/</loc>
		<lastmod>2018-08-06T04:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/30-of-cisos-plan-on-entering-a-bug-bounty-program-in-the-next-year/</loc>
		<lastmod>2018-08-06T07:52:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-do-signature-based-attacks-work/</loc>
		<lastmod>2018-08-06T09:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/malware-outbreak-forces-apple-chip-supplier-to-shut-down-operations-new-iphones-could-be-delayed/</loc>
		<lastmod>2018-08-06T11:11:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/update-your-inkjet-printer-now-hp-reports-critical-vulnerabilities-in-several-product-lines/</loc>
		<lastmod>2018-08-06T11:17:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/semiconductor-foundry-notifies-customers-of-computer-virus-incident/</loc>
		<lastmod>2018-08-06T11:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-become-an-incident-responder-it-security-careers-cyberspeak-podcast/</loc>
		<lastmod>2018-08-06T11:40:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/black-hat-arsenal-usa-2018%e2%80%8a-%e2%80%8a-litany-of-tools/</loc>
		<lastmod>2018-08-06T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-is-the-cost-of-a-data-breach/</loc>
		<lastmod>2018-08-06T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/owasp-eu-and-cebit-de-highlights/</loc>
		<lastmod>2018-08-06T14:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/new-build-introduces-http-responses-in-alerts-adds-manual-intervention-vulnerability-checks-in-cisco-asa-apache-tomcat/</loc>
		<lastmod>2018-08-06T14:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/a-security-focused-introduction-to-http-part-2/</loc>
		<lastmod>2018-08-06T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/qa-how-your-typing-and-screen-swiping-nuances-can-verify-your-identity/</loc>
		<lastmod>2018-08-06T15:12:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/vol-08-issue-107-august-2018/</loc>
		<lastmod>2018-08-06T16:08:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/week-31-cyberattack-digest-2018-singhealth-hong-kongs-department-of-health-mgm-hospital-and-others/</loc>
		<lastmod>2018-08-06T16:25:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-week-in-security-july-30-august-5/</loc>
		<lastmod>2018-08-06T16:52:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-accountability-who-in-the-c-suite-should-care/</loc>
		<lastmod>2018-08-06T17:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-michael-james-anti-osint-af-how-to-become-untouchable/</loc>
		<lastmod>2018-08-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-quest-for-optimal-security/</loc>
		<lastmod>2018-08-06T18:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/regaining-the-rights-of-netizens/</loc>
		<lastmod>2018-08-06T19:46:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/monday-aug-6-dtex-in-the-news-the-pervasive-insider-threat-gdpr-creates-privileged-user-security-problems-vulnerable-humans-behind-unitypoint-data-breach/</loc>
		<lastmod>2018-08-06T20:05:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/safely-endangered-infosec-propaganda/</loc>
		<lastmod>2018-08-06T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/onboard-security-publishes-new-guidance-for-secure-software-and-use-of-tpm-with-tss/</loc>
		<lastmod>2018-08-06T21:34:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/tsmc-shut-down-by-wannacry-variant-avast/</loc>
		<lastmod>2018-08-06T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ex-stanford-judge-weak-on-rape-sentencing-for-stanford-student-dumped-by-voters/</loc>
		<lastmod>2018-08-07T00:31:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cissp-domain-3-refresh-security-architecture-and-engineering/</loc>
		<lastmod>2018-08-07T01:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cissp-domain-2-refresh-asset-security/</loc>
		<lastmod>2018-08-07T01:34:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cissp-domain-1-refresh-security-and-risk-management/</loc>
		<lastmod>2018-08-07T01:34:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cissp-domain-5-refresh-identity-and-access-management/</loc>
		<lastmod>2018-08-07T02:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cissp-domain-6-refresh-security-assessment-and-testing/</loc>
		<lastmod>2018-08-07T02:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cissp-domain-7-refresh-security-operations/</loc>
		<lastmod>2018-08-07T02:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cissp-domain-8-refresh-software-development-security/</loc>
		<lastmod>2018-08-07T02:40:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cissp-domain-refresh-4-communications-and-network-security/</loc>
		<lastmod>2018-08-07T02:40:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/devops-and-cloud-the-match-that-drives-todays-businesses/</loc>
		<lastmod>2018-08-07T03:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/when-it-comes-to-a-data-breach-how-do-you-want-to-be-notified/</loc>
		<lastmod>2018-08-07T07:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/report-looks-at-future-trends-in-cyber-security/</loc>
		<lastmod>2018-08-07T07:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/vulnerability-assessment-versus-penetration-assessment/</loc>
		<lastmod>2018-08-07T08:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/this-day-in-history-bombing-of-american-embassy-in-nairobi/</loc>
		<lastmod>2018-08-07T08:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/wannacry-still-alive-and-kicking-tsmc-confirms-virus-that-halted-operations-was-the-infamous-ransomware/</loc>
		<lastmod>2018-08-07T11:09:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/consumer-sentiments-about-cybersecurity-and-what-it-means-for-your-organization/</loc>
		<lastmod>2018-08-07T11:16:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/measuring-the-rationality-of-security-decisions/</loc>
		<lastmod>2018-08-07T11:40:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/checkmarx-report-tackling-software-exposure-in-the-devops-cycle/</loc>
		<lastmod>2018-08-07T12:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/phishing-and-social-media-will-it-over-take-email/</loc>
		<lastmod>2018-08-07T12:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fortinet-and-ibm-sign-cyber-threat-information-sharing-agreement/</loc>
		<lastmod>2018-08-07T13:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/tool-showcase-at-black-hat-usa-2018-fortiappmonitor/</loc>
		<lastmod>2018-08-07T13:52:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/securosis-firestarter-its-a-gdpr-thing/</loc>
		<lastmod>2018-08-07T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/insider-threat-best-practice-without-the-need-for-an-siem-solution/</loc>
		<lastmod>2018-08-07T14:08:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/untangle-survey-finds-smbs-rank-network-security-as-top-it-concern/</loc>
		<lastmod>2018-08-07T15:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/exploit-kits-summer-2018-review/</loc>
		<lastmod>2018-08-07T15:23:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/new-legal-battle-again-shines-light-on-need-for-secure-messaging-record-retention/</loc>
		<lastmod>2018-08-07T15:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/it-is-important-to-have-ethics-in-social-engineering/</loc>
		<lastmod>2018-08-07T16:10:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/addressing-the-growth-of-ssl-encrypted-traffic-volume-with-fortigates-ngfw/</loc>
		<lastmod>2018-08-07T16:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/strategies-for-improving-the-benefits-of-certificate-revocation/</loc>
		<lastmod>2018-08-07T16:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/data-disaster-averted-nonprofit-tales-from-the-front/</loc>
		<lastmod>2018-08-07T17:15:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/lock-the-vote-spamalot-returns-and-samsam-ransomware/</loc>
		<lastmod>2018-08-07T17:24:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/everything-you-need-to-know-about-black-duck-security-advisories/</loc>
		<lastmod>2018-08-07T17:24:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/netspectre-an-ominous-spectre-variant-but-no-immediate-danger/</loc>
		<lastmod>2018-08-07T17:24:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/electoral-trust-meets-software-security/</loc>
		<lastmod>2018-08-07T17:24:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/lifelock-lesson-third-party-security-is-your-security/</loc>
		<lastmod>2018-08-07T17:24:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/software-composition-analysis-the-secret-ingredients-for-a-successful-ma/</loc>
		<lastmod>2018-08-07T17:24:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/third-party-security-russian-grid-meddling-and-patch-apache/</loc>
		<lastmod>2018-08-07T17:24:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/seeker-is-a-better-iast-tool-you-can-count-the-ways/</loc>
		<lastmod>2018-08-07T17:24:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/half-a-billion-iot-devices-vulnerable-breaches-at-homeland-security-fedex-and-the-fastest-growing-cyberthreat/</loc>
		<lastmod>2018-08-07T17:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/infosecurity-europe-highlights-infosec-concerns-in-europe-today/</loc>
		<lastmod>2018-08-07T17:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/singapore-healthcare-hit-with-unprecedented-cyber-attack/</loc>
		<lastmod>2018-08-07T17:34:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/iast-a-better-bugtrap/</loc>
		<lastmod>2018-08-07T17:34:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/fda-adopts-ul-2900-2-1-improves-cyber-security-of-connected-medical-devices/</loc>
		<lastmod>2018-08-07T17:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/making-the-skies-safe-and-secure-with-do-178c-compliance/</loc>
		<lastmod>2018-08-07T17:35:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ghost-gps-routes-smarttvs-are-watching-you-and-securing-open-source/</loc>
		<lastmod>2018-08-07T17:35:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ukraine-dodges-attack-but-vpnfilter-threat-remains/</loc>
		<lastmod>2018-08-07T17:35:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/remediating-xss-does-a-single-fix-work/</loc>
		<lastmod>2018-08-07T17:35:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/hackers-target-cryptocurrency-exchange-new-spectre-vulnerabilities-and-healthier-healthcare/</loc>
		<lastmod>2018-08-07T17:35:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/6-months-later-spectre-still-haunts/</loc>
		<lastmod>2018-08-07T17:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-rasp-complements-application-security-testing-to-minimize-risk/</loc>
		<lastmod>2018-08-07T17:35:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/establishing-trust-and-a-foundation-a-star-wars-solo-story/</loc>
		<lastmod>2018-08-07T17:47:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/golden-cup-was-a-world-cup-of-trouble/</loc>
		<lastmod>2018-08-07T17:47:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/gdpr-raises-the-stakes-on-data-breaches/</loc>
		<lastmod>2018-08-07T17:47:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/timehop-breach-provides-gdpr-response-template/</loc>
		<lastmod>2018-08-07T17:47:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/another-inside-job-gmail-privacy-and-uk-cyber-crime-court/</loc>
		<lastmod>2018-08-07T17:47:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/common-security-challenges-in-ci-cd-workflows/</loc>
		<lastmod>2018-08-07T17:47:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/supreme-court-puts-the-brakes-on-big-brother/</loc>
		<lastmod>2018-08-07T17:47:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/celebrating-freedom-with-free-beer/</loc>
		<lastmod>2018-08-07T17:47:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/third-parties-spoil-the-party-and-wordpress-content-mismanagement/</loc>
		<lastmod>2018-08-07T17:47:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/vulnerable-routers-are-still-out-there-and-hackers-are-noticing/</loc>
		<lastmod>2018-08-07T17:47:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/creating-a-secure-sdlc-solving-open-sources-biggest-problem-government-unprepared-for-cyber-attacks/</loc>
		<lastmod>2018-08-07T17:52:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-nathan-sweaneys-whos-watching-the-watchers/</loc>
		<lastmod>2018-08-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ai-ml-in-cybersecurity-why-algorithms-are-dangerous/</loc>
		<lastmod>2018-08-07T18:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/an-analysis-of-the-dll-address-leaking-trick-used-by-the-double-kill-internet-explorer-zero-day-exploit-cve-2018-8174/</loc>
		<lastmod>2018-08-07T18:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/florida-man-arrested-in-sim-swap-conspiracy/</loc>
		<lastmod>2018-08-07T19:27:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cookie-consent-script-used-to-distribute-malware/</loc>
		<lastmod>2018-08-07T20:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-to-expect-during-a-pci-assessment-and-how-to-prepare-for-one/</loc>
		<lastmod>2018-08-07T20:15:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/building-security-into-connected-medical-devices/</loc>
		<lastmod>2018-08-07T20:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/technical-skills-vs-soft-skills-which-are-more-important-as-an-infosec-professional/</loc>
		<lastmod>2018-08-07T20:52:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-main-concerns-with-biometric-authentication/</loc>
		<lastmod>2018-08-07T20:52:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-joy-of-tech-make-money-with-airbnb/</loc>
		<lastmod>2018-08-07T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/exploit-kits-go-cryptomining-summer-2018-edition-2/</loc>
		<lastmod>2018-08-07T21:14:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/virtual-machine-introspection-in-malware-analysis-libvmi/</loc>
		<lastmod>2018-08-07T22:16:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/toppo-1-capture-the-flag-walkthrough/</loc>
		<lastmod>2018-08-07T22:16:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/blockchain-vulnerabilities-imperfections-of-the-perfect-system/</loc>
		<lastmod>2018-08-07T23:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/powershell-for-pentesters/</loc>
		<lastmod>2018-08-07T23:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-the-caesars-defcon-wifi-situation-looks-like/</loc>
		<lastmod>2018-08-08T03:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/why-you-should-consider-a-career-in-government-cyber-security/</loc>
		<lastmod>2018-08-08T03:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/back-to-the-future-stick-to-the-fundamentals-for-devops-security/</loc>
		<lastmod>2018-08-08T03:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/us-treasury-releases-guidelines-to-improve-financial-regulation-foster-tech-innovation/</loc>
		<lastmod>2018-08-08T09:02:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/digital-transformation-opportunity-and-risk-how-will-you-manage/</loc>
		<lastmod>2018-08-08T11:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/many-developers-have-yet-to-take-responsibility-for-code-security-reveals-devops-study/</loc>
		<lastmod>2018-08-08T11:16:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/at-17-million-atlanta-network-recovery-six-times-more-expensive-than-estimated/</loc>
		<lastmod>2018-08-08T12:16:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/range-telephone-cooperative-builds-new-msp-practice-with-managed-workplace-avast-business/</loc>
		<lastmod>2018-08-08T13:17:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/21-security-pros-reveal-the-one-thing-theyd-change-about-aws-security/</loc>
		<lastmod>2018-08-08T13:19:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/are-we-honest-about-our-password-habits/</loc>
		<lastmod>2018-08-08T13:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/snapchats-source-code-leaked-out-and-was-published-on-github/</loc>
		<lastmod>2018-08-08T13:41:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bankbot-anubis-still-a-threat-gets-upgrade/</loc>
		<lastmod>2018-08-08T13:42:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/internetworking-wmd/</loc>
		<lastmod>2018-08-08T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/raising-the-bar-for-ethical-cryptocurrency-mining/</loc>
		<lastmod>2018-08-08T14:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/no-cryptocurrency-exchange-can-fully-guarantee-security-researchers-say/</loc>
		<lastmod>2018-08-08T14:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/infosec-institute-launches-industrys-first-security-awareness-practitioner-certification/</loc>
		<lastmod>2018-08-08T14:52:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/reddit-breach-takeaways-mfa-and-access-management/</loc>
		<lastmod>2018-08-08T15:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-mature-are-your-cyber-defender-strategies/</loc>
		<lastmod>2018-08-08T15:45:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/6-things-you-probably-dont-know-about-your-certificates-and-why-they-matter/</loc>
		<lastmod>2018-08-08T15:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/codenomi-con-speakers-agree-bringing-back-privacy-requires-citizen-action/</loc>
		<lastmod>2018-08-08T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/data-privacy-five-ways-to-ensure-you-comply-with-gdpr/</loc>
		<lastmod>2018-08-08T17:47:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/criminals-hacking-cpus-to-mine-cryptocurrencies/</loc>
		<lastmod>2018-08-08T17:47:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/new-york-state-cybersecurity-law-encryption-deadline-coming-september-3-2018/</loc>
		<lastmod>2018-08-08T17:56:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-arnar-gunnarssons-we-dont-have-to-worry-about-that-its-in-the-cloud/</loc>
		<lastmod>2018-08-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/white-hat-black-hat-and-the-emergence-of-the-gray-hat-the-true-costs-of-cybercrime/</loc>
		<lastmod>2018-08-08T18:04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/when-it-comes-to-managing-third-party-risk-many-organizations-are-falling-short/</loc>
		<lastmod>2018-08-08T18:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/best-practices-for-the-protection-of-information-assets-part-2/</loc>
		<lastmod>2018-08-08T18:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/vulnhub-machines-walkthrough-series-vulnix/</loc>
		<lastmod>2018-08-08T18:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/best-practices-for-the-protection-of-information-assets-part-1/</loc>
		<lastmod>2018-08-08T18:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/android-security-update-aug-2018/</loc>
		<lastmod>2018-08-08T19:34:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/xkcd-disaster-movie/</loc>
		<lastmod>2018-08-08T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/new-wi-fi-attack-can-crack-your-passwords-avast/</loc>
		<lastmod>2018-08-08T23:16:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/google-releases-details-on-new-shielded-vms-cloud-security-tools/</loc>
		<lastmod>2018-08-08T23:16:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/that-xkcd-on-voting-machine-software-is-wrong/</loc>
		<lastmod>2018-08-09T00:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/beware-real-estate-scams-are-growing/</loc>
		<lastmod>2018-08-09T03:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-next-milestone-for-the-nys-dfs-cybersecurity-regulation-is-approaching/</loc>
		<lastmod>2018-08-09T03:40:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/data-security-solutions-for-small-businesses/</loc>
		<lastmod>2018-08-09T03:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/thats-right-we-are-playing-both-sides-of-the-key-management-game/</loc>
		<lastmod>2018-08-09T07:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/two-thirds-of-organizations-dont-use-hardening-benchmarks-to-establish-a-secure-baseline-report-reveals/</loc>
		<lastmod>2018-08-09T07:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/researchers-aim-to-befuddle-cybercriminals-with-defensive-wwii-fighter-pilot-trick/</loc>
		<lastmod>2018-08-09T08:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/lifes-a-breach-the-harsh-cost-of-a-data-breach-for-professional-services-firms/</loc>
		<lastmod>2018-08-09T10:48:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cyber-incident-risk-from-it-headache-to-business-threat/</loc>
		<lastmod>2018-08-09T11:10:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ransomware-strikes-computer-servers-of-golfers-association/</loc>
		<lastmod>2018-08-09T12:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/26-5-million-comcast-xfinity-customers-had-their-partial-home-addresses-and-ssns-exposed/</loc>
		<lastmod>2018-08-09T12:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/leaky-amazon-s3-buckets-challenges-solutions-and-best-practices/</loc>
		<lastmod>2018-08-09T12:26:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/best-practices-for-user-access-management/</loc>
		<lastmod>2018-08-09T13:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/sumo-logic-expands-certification-program-to-empower-users-to-better-secure-modern-applications-and-cloud-infrastructures/</loc>
		<lastmod>2018-08-09T13:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/esentire-and-secure-infrastructure-provider-cyxtera-partner-to-bring-zero-trust-network-protection-to-midsize-enterprises/</loc>
		<lastmod>2018-08-09T13:15:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fortinet-secure-sd-wan-gives-the-performance-of-a-lifetime-recommended-by-nss-labs/</loc>
		<lastmod>2018-08-09T13:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/top-five-securityiq-phishing-templates-july-2018-edition/</loc>
		<lastmod>2018-08-09T13:46:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/egregious-egress/</loc>
		<lastmod>2018-08-09T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/state-of-security-for-open-source-web-applications-2018/</loc>
		<lastmod>2018-08-09T14:31:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/conversations-with-the-inventor-of-wild-card-certificates-part-3-the-risk-of-exploit/</loc>
		<lastmod>2018-08-09T15:04:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/project-zero-director-exhorts-black-hat-audience-to-do-security-better/</loc>
		<lastmod>2018-08-09T15:22:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/8-everyday-technologies-that-can-make-you-vulnerable-to-cyberattacks/</loc>
		<lastmod>2018-08-09T15:47:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/can-snmp-still-be-used-to-detect-ddos-attacks/</loc>
		<lastmod>2018-08-09T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/navigating-the-threat-from-within-insider-threats-in-the-finance-industry/</loc>
		<lastmod>2018-08-09T16:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-paul-coggins-ss7-for-infosec/</loc>
		<lastmod>2018-08-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/tufin-fortinet-policy-based-change-automation-across-the-security-fabric/</loc>
		<lastmod>2018-08-09T18:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-improve-website-resilience-for-ddos-attacks-part-ii-caching/</loc>
		<lastmod>2018-08-09T20:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/xkcd-voting-software/</loc>
		<lastmod>2018-08-09T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/quiet-skies-a-tsa-surveillance-program-targets-ordinary-u-s-citizens/</loc>
		<lastmod>2018-08-09T22:46:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cisos-witness-more-cyber-breaches-but-endpoint-detection-and-response-tools-have-tripled-visibility-on-attacks/</loc>
		<lastmod>2018-08-09T22:59:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/dont-fear-the-tsa-cutting-airport-security-be-glad-that-theyre-talking-about-it/</loc>
		<lastmod>2018-08-10T11:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/professional-golfers-association-hit-by-ransomware-days-before-championship/</loc>
		<lastmod>2018-08-10T12:52:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/top-10-anti-phishing-email-templates/</loc>
		<lastmod>2018-08-10T12:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-10-best-practices-for-identifying-and-mitigating-phishing/</loc>
		<lastmod>2018-08-10T12:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/threat-hunting-for-unexpectedly-patched-systems/</loc>
		<lastmod>2018-08-10T12:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-help-your-medical-devices-meet-the-ul-and-fda-standard/</loc>
		<lastmod>2018-08-10T13:10:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/uk-government-worried-huawei-software-could-facilitate-cyberespionage/</loc>
		<lastmod>2018-08-10T13:12:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/latest-on-the-currys-pc-world-data-breach-impacting-10-million-customers/</loc>
		<lastmod>2018-08-10T13:48:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cyber-security-roundup-for-july-2018/</loc>
		<lastmod>2018-08-10T13:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/new-google-software-new-smartphone-flaws-and-the-high-cost-of-ransomware-avast/</loc>
		<lastmod>2018-08-10T13:59:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/alejandro-hernandezs-exposing-security-weakness-in-stock-trading-tech/</loc>
		<lastmod>2018-08-10T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/best-practices-for-the-protection-of-information-assets-part-3/</loc>
		<lastmod>2018-08-10T14:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-add-a-phishing-notification-button-to-outlook/</loc>
		<lastmod>2018-08-10T14:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-trends-in-spear-phishing-attacks/</loc>
		<lastmod>2018-08-10T14:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/hackers-phish-butlins-holiday-camp-chain-access-customers-personal-data/</loc>
		<lastmod>2018-08-10T14:37:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/pmp-certification-boost-your-career-and-earn-more-money-cyberspeak-podcast/</loc>
		<lastmod>2018-08-10T15:34:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/iot-hackers-trick-brazilian-bank-customers-into-providing-sensitive-information/</loc>
		<lastmod>2018-08-10T16:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/concern-over-iot-security-grew-for-most-bhusa-attendees-in-past-year-reveals-survey/</loc>
		<lastmod>2018-08-10T16:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/some-vpn-providers-leak-your-ipv6-ip-address/</loc>
		<lastmod>2018-08-10T17:54:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-matthew-rogers-getting-newcomers-into-infosec-the-tribulations-of-the-auburn-university-hacking-club/</loc>
		<lastmod>2018-08-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/threat-hunting-for-mismatched-port-application-traffic/</loc>
		<lastmod>2018-08-10T18:23:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-6-latest-phishing-emails-to-avoid-in-2018/</loc>
		<lastmod>2018-08-10T18:23:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/securing-an-organization-top-5-cybersecurity-solutions-for-prevention-detection-and-response/</loc>
		<lastmod>2018-08-10T18:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-protect-your-rdp-access-from-ransomware-attacks/</loc>
		<lastmod>2018-08-10T18:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-top-3-open-source-tools-for-aws-incident-response/</loc>
		<lastmod>2018-08-10T18:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-phishing-response-playbook/</loc>
		<lastmod>2018-08-10T19:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/anti-phishing-training-vs-software-does-security-awareness-training-work/</loc>
		<lastmod>2018-08-10T19:34:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/medical-devices-still-hackable-researchers-say/</loc>
		<lastmod>2018-08-10T20:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/luke-kingma-lou-patrick-mackays-futurism-resurrected/</loc>
		<lastmod>2018-08-10T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-detect-prevent-payroll-phishing-attacks/</loc>
		<lastmod>2018-08-10T23:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-detect-and-prevent-secure-document-phishing-attacks/</loc>
		<lastmod>2018-08-11T00:34:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/wordpress-phishing-scams-what-every-user-needs-to-know/</loc>
		<lastmod>2018-08-11T00:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-awareness-training-and-education/</loc>
		<lastmod>2018-08-11T00:34:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-detect-and-prevent-direct-deposit-phishing-scams/</loc>
		<lastmod>2018-08-11T00:34:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-prevent-ceo-fraud-10-tips/</loc>
		<lastmod>2018-08-11T00:34:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/staying-safe-in-a-connected-world/</loc>
		<lastmod>2018-08-11T13:23:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-unbroken-litany-of-distrust/</loc>
		<lastmod>2018-08-11T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/top-5-best-alternatives-for-the-tor-browser/</loc>
		<lastmod>2018-08-11T16:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-timothy-de-blocks-exploring-information-security-qa-panel/</loc>
		<lastmod>2018-08-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-joy-of-tech-if-you-dont-have-something-good-to-say/</loc>
		<lastmod>2018-08-11T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/connecting-apache-zeppelin-up-to-amazon-athena-with-an-iam-profile-name/</loc>
		<lastmod>2018-08-11T22:37:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/connecting-apache-zeppelin-and-apache-drill-postgresql-etc/</loc>
		<lastmod>2018-08-12T03:20:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/linux-kernel-tcp-vulnerability/</loc>
		<lastmod>2018-08-12T05:51:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-josh-rickards-securing-windows-with-group-policy/</loc>
		<lastmod>2018-08-12T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-ll3nigmall-s-atat-how-to-take-on-the-entire-rebellion-with-2-3-stormtroopers/</loc>
		<lastmod>2018-08-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/xkcd-pie-charts/</loc>
		<lastmod>2018-08-12T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fbi-warns-of-unlimited-atm-cashout-blitz/</loc>
		<lastmod>2018-08-13T00:28:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/building-enterprise-class-threat-intelligence/</loc>
		<lastmod>2018-08-13T00:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/book-review-how-great-science-fiction-works-by-gary-k-wolfe-course-review-by-rick-howard/</loc>
		<lastmod>2018-08-13T02:14:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/secure-code-dojo-how-to-defeat-sql-injection/</loc>
		<lastmod>2018-08-13T02:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ics-security-the-european-perspective/</loc>
		<lastmod>2018-08-13T03:46:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-shared-security-weekly-blaze-facebook-and-your-financial-transactions-smart-home-security-critical-hp-printer-vulnerabilities/</loc>
		<lastmod>2018-08-13T04:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-do-i-enable-2fa-on-my-account/</loc>
		<lastmod>2018-08-13T08:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-do-i-reset-2fa-for-my-account/</loc>
		<lastmod>2018-08-13T08:22:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-statistics-based-attacks-work/</loc>
		<lastmod>2018-08-13T09:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/when-it-comes-to-data-breaches-healthcare-businesses-stand-to-lose-most/</loc>
		<lastmod>2018-08-13T11:23:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/researchers-showed-its-possible-to-take-over-a-network-with-malicious-faxes/</loc>
		<lastmod>2018-08-13T11:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-problem-with-passwords-security-awareness-cyberspeak-podcast/</loc>
		<lastmod>2018-08-13T11:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/tibetan-activists-diaspora-hit-by-resurfacing-malware-in-cyberespionage-operation/</loc>
		<lastmod>2018-08-13T11:51:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cisa-domain-2-governance-and-management-of-it/</loc>
		<lastmod>2018-08-13T12:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/threat-landscape-report-virtually-no-firm-is-immune-from-severe-exploits/</loc>
		<lastmod>2018-08-13T13:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/infrastructure-security-monday-the-idiocy-chronicles/</loc>
		<lastmod>2018-08-13T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/deeplocker-new-breed-of-malware-that-uses-ai-to-fly-under-the-radar/</loc>
		<lastmod>2018-08-13T14:07:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cisa-domain-4-information-systems-operations-maintenance-and-service-management/</loc>
		<lastmod>2018-08-13T14:23:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-iapp/</loc>
		<lastmod>2018-08-13T14:23:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-ultimate-guide-to-dod-8570/</loc>
		<lastmod>2018-08-13T14:23:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cisa-domain-3-information-systems-acquisition-development-and-implementation/</loc>
		<lastmod>2018-08-13T14:23:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/earning-cisa-cpe-credits/</loc>
		<lastmod>2018-08-13T14:23:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/are-you-ready-for-indias-new-personal-data-protection-law/</loc>
		<lastmod>2018-08-13T14:34:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/5-star-phish/</loc>
		<lastmod>2018-08-13T15:23:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-is-dod-8570/</loc>
		<lastmod>2018-08-13T15:34:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/everything-you-need-to-know-about-cipt-certification/</loc>
		<lastmod>2018-08-13T15:34:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/enhanced-infrastructure-ddos-protection-analytics-targeted-visibility-for-greater-accuracy/</loc>
		<lastmod>2018-08-13T15:38:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/week-32-cyberattack-digest-2018-blue-springs-family-care-unitypoint-health-comcast-xfinity-and-others/</loc>
		<lastmod>2018-08-13T16:02:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/black-hat-usa-2018-a-secops-recap/</loc>
		<lastmod>2018-08-13T16:14:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-dod-iat-level-2/</loc>
		<lastmod>2018-08-13T16:46:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cisa-domain-5-protection-of-information-assets/</loc>
		<lastmod>2018-08-13T16:46:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-complete-guide-to-cipp-g-certification/</loc>
		<lastmod>2018-08-13T16:46:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/at-home-in-akron-tufin-opens-new-office-in-the-city-of-invention/</loc>
		<lastmod>2018-08-13T17:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/venafi-study-election-infrastructure-is-at-risk/</loc>
		<lastmod>2018-08-13T17:31:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-week-in-security-august-6-12/</loc>
		<lastmod>2018-08-13T17:52:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/showmecon-2018-jon-clarks-how-hyperbolic-discounting-is-keeping-your-security-program-from-succeeding/</loc>
		<lastmod>2018-08-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-ultimate-guide-to-isc%c2%b2-certifications/</loc>
		<lastmod>2018-08-13T18:16:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/osiris-dropper-found-using-process-doppelganging/</loc>
		<lastmod>2018-08-13T19:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/shopping-for-a-cyber-security-product-7-tips-to-help-you-get-what-you-need/</loc>
		<lastmod>2018-08-13T20:05:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/robert-m-lee-and-jeff-hass-little-bobby-comics-vendor-tax/</loc>
		<lastmod>2018-08-13T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/in-brief-splashr-update-high-performance-scraping-with-splashr-furrr-teamhg-memexs-aquarium/</loc>
		<lastmod>2018-08-13T21:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/maximizing-the-impact-of-static-analysis/</loc>
		<lastmod>2018-08-13T21:46:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/alert-fatigue-is-a-big-cybersecurity-problem/</loc>
		<lastmod>2018-08-14T04:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/hack-the-marine-corps-bug-bounty-program-announced-by-dod/</loc>
		<lastmod>2018-08-14T12:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-find-and-remediate-open-infrastructure-ports/</loc>
		<lastmod>2018-08-14T15:06:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/imperva-completes-the-acquisition-of-prevoty/</loc>
		<lastmod>2018-08-14T15:21:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/back-to-school-cybersecurity-hints-tips-and-links-for-a-safer-school-year/</loc>
		<lastmod>2018-08-14T15:27:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-is-an-ev-multi-domain-ssl-certificate-revocation-information-and-reporting-policy/</loc>
		<lastmod>2018-08-14T17:08:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-value-add-of-combining-soar-with-existing-security-technologies/</loc>
		<lastmod>2018-08-14T20:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/vert-threat-alert-august-2018-patch-tuesday-analysis/</loc>
		<lastmod>2018-08-14T23:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/accelerate-review-what-makes-a-high-performer-of-software-development-and-delivery/</loc>
		<lastmod>2018-08-15T03:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/log-management-for-government-agencies-what-you-need-to-know/</loc>
		<lastmod>2018-08-15T03:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/man-gets-jail-time-for-helping-to-cash-out-ransomware-payments/</loc>
		<lastmod>2018-08-15T12:16:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/firemons-annual-state-of-the-firewall-report-finds-chronic-deficiencies-in-basic-firewall-hygiene/</loc>
		<lastmod>2018-08-15T13:38:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/whats-in-our-secops-stack-6-top-integrations/</loc>
		<lastmod>2018-08-15T14:18:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime/</loc>
		<lastmod>2018-08-15T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/black-hat-usa-2018-ransomware-is-still-the-star/</loc>
		<lastmod>2018-08-15T17:16:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/onelogin-celebrates-diversity-in-cybersecurity-by-donating-55000-at-black-hat-las-vegas/</loc>
		<lastmod>2018-08-15T17:23:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cloudpassage-debuts-halo-cloud-secure-delivering-unparalleled-continuous-security-of-public-cloud-infrastructure/</loc>
		<lastmod>2018-08-20T13:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/building-values-to-love-your-team/</loc>
		<lastmod>2018-08-15T23:23:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-internet-of-things-getting-smarter-about-securing-smart-technologies/</loc>
		<lastmod>2018-08-16T02:13:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/caller-id-spoofing-what-it-is-and-what-to-do-about-it/</loc>
		<lastmod>2018-08-16T04:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/sextortion-scams-using-redacted-phone-numbers-to-demand-payment/</loc>
		<lastmod>2018-08-16T11:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/hackers-steal-13-5-million-from-indian-bank-in-global-attack/</loc>
		<lastmod>2018-08-16T14:16:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-seven-security-sessions-not-to-miss-at-vmworld-2018/</loc>
		<lastmod>2018-08-16T14:19:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-secure-your-content-management-system/</loc>
		<lastmod>2018-08-16T16:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/anticoinminer-mining-campaign/</loc>
		<lastmod>2018-08-16T17:14:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/anti-coinminer-mining-campaign-2/</loc>
		<lastmod>2018-08-16T17:14:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-observability-operationalizing-data-in-complex-distributed-systems/</loc>
		<lastmod>2018-08-16T18:04:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/securing-yourself-at-def-con-26/</loc>
		<lastmod>2018-08-16T20:33:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-pains-of-encryption-key-management-why-manual-processes-are-so-hard/</loc>
		<lastmod>2018-08-17T01:53:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/itil-problem-management-and-tripwire-enterprise/</loc>
		<lastmod>2018-08-17T03:46:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/liar-liar-pants-on-fire-barclays-phish-claims-cards-explode/</loc>
		<lastmod>2018-08-17T16:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/mafia-ransomware-targeting-users-in-korea/</loc>
		<lastmod>2018-08-18T21:15:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ics-security-in-the-age-of-it-ot-convergence/</loc>
		<lastmod>2018-08-20T03:10:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/you-the-first-last-and-best-data-protection-and-privacy-defense-part-1/</loc>
		<lastmod>2018-08-20T03:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ics-security-what-it-is-and-why-its-a-challenge-for-organizations/</loc>
		<lastmod>2018-08-20T10:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/spam-campaign-targeting-south-korean-users-with-gandcrab-v4-3-ransomware/</loc>
		<lastmod>2018-08-20T12:10:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/considering-ad-fs-for-sso-heres-what-cisos-should-know/</loc>
		<lastmod>2018-08-20T14:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/why-would-customers-choose-me/</loc>
		<lastmod>2018-08-20T14:07:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-week-in-security-august-13-19/</loc>
		<lastmod>2018-08-20T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-enemy-is-us-a-look-at-insider-threats/</loc>
		<lastmod>2018-08-20T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/http-vs-https-will-the-world-follow-google/</loc>
		<lastmod>2018-08-20T19:53:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-mitre-attck-framework-defense-evasion/</loc>
		<lastmod>2018-08-21T03:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-you-need-to-know-summer-2018-state-of-the-internet-security-web-attack-report/</loc>
		<lastmod>2018-08-21T10:07:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/microsoft-seized-six-fake-domains-mimicking-u-s-political-organizations/</loc>
		<lastmod>2018-08-21T12:11:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/we-put-a-smart-card-inside-a-mobile-device/</loc>
		<lastmod>2018-08-21T12:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/derived-piv-credentials-making-its-way-to-mobile/</loc>
		<lastmod>2018-08-21T12:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-how-to-for-asset-tagging/</loc>
		<lastmod>2018-08-21T13:23:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/successful-transition-from-method-1-domain-verification/</loc>
		<lastmod>2018-08-21T13:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/10-top-tools-for-threat-hunters-from-black-hat-usa-2018/</loc>
		<lastmod>2018-08-21T14:22:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/inside-an-aws-breach-intel-from-multi-step-breaches/</loc>
		<lastmod>2018-08-21T14:58:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-digital-entropy-of-death-bsides-manchester/</loc>
		<lastmod>2018-08-21T18:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/is-the-cybersecurity-of-your-business-econveyancing-ready/</loc>
		<lastmod>2018-08-21T18:47:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-protect-your-legal-practice-from-payment-redirection-fraud/</loc>
		<lastmod>2018-08-21T18:47:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-prevent-payment-redirection-fraud-at-your-conveyancing-practice/</loc>
		<lastmod>2018-08-21T18:47:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/is-your-conveyancing-practice-secure-from-hacking/</loc>
		<lastmod>2018-08-21T18:47:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/inc-magazine-names-intelisecure-one-of-americas-fastest-growing-companies-for-fifth-consecutive-year/</loc>
		<lastmod>2018-08-21T19:15:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/disclosing-vulnerabilities-how-to-avoid-becoming-the-next-data-breach-headline/</loc>
		<lastmod>2018-08-21T22:04:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-are-certificate-signing-requests/</loc>
		<lastmod>2018-08-21T23:09:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/inside-the-judicial-challenges-of-when-ransomware-strikes-a-city/</loc>
		<lastmod>2018-08-22T04:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/criminal-claims-they-stole-20k-british-pharmacy-chain-customers-data/</loc>
		<lastmod>2018-08-22T11:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cis-releases-revised-top-20-critical-security-controls/</loc>
		<lastmod>2018-08-22T14:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/lessons-in-resilience-a-conversation-on-security-at-redeploy-2018/</loc>
		<lastmod>2018-08-22T14:53:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/badgelife-a-defcon-26-retrospective/</loc>
		<lastmod>2018-08-22T17:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/5-ways-that-automation-improves-machine-identity-protection/</loc>
		<lastmod>2018-08-22T18:40:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/healthcare-industry-5-key-areas-security-professionals-should-consider/</loc>
		<lastmod>2018-08-23T04:23:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/unencrypted-laptop-exposes-personal-details-of-37000-eir-customers-faulty-security-update-blamed/</loc>
		<lastmod>2018-08-23T10:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/magic-for-devops-teams-threat-stack-announces-containerized-agent/</loc>
		<lastmod>2018-08-23T12:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/can-search-extensions-keep-your-searches-private/</loc>
		<lastmod>2018-08-23T15:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bsides-cleveland-2018-matt-scheurers-active-defense-helping-threat-actors-hack-themselves/</loc>
		<lastmod>2018-08-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-on-the-go/</loc>
		<lastmod>2018-08-23T18:09:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/experts-urge-rapid-patching-of-struts-bug/</loc>
		<lastmod>2018-08-23T20:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fake-app-infects-your-android-with-spyware-avast/</loc>
		<lastmod>2018-08-23T21:17:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/financial-impact-of-cyber-attacks-on-banking-sector-as-a-result-of-poor-ssh-key-management/</loc>
		<lastmod>2018-08-23T22:22:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/introducing-gepetto-a-splash-like-rest-api-to-headless-chrome/</loc>
		<lastmod>2018-08-23T22:32:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/book-review-black-hills-by-dan-simmons/</loc>
		<lastmod>2018-08-24T02:49:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/guide-to-securing-your-mobile-app-against-cyber-attacks/</loc>
		<lastmod>2018-08-24T03:53:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/critical-national-infrastructures-on-the-radar-british-mps-say-attack-is-imminent/</loc>
		<lastmod>2018-08-24T07:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/friday-rstats-twofer-finding-macos-32-bit-apps-processing-data-from-system-commands/</loc>
		<lastmod>2018-08-24T10:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fortnite-says-it-will-reward-users-who-enable-2fa-with-free-emote/</loc>
		<lastmod>2018-08-24T11:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-you-need-to-know-apache-struts-vulnerability-8-22-2018/</loc>
		<lastmod>2018-08-24T12:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-one-school-district-is-blazing-the-trail-to-digital-transformation/</loc>
		<lastmod>2018-08-24T13:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/avast-security-products-win-awards-avast/</loc>
		<lastmod>2018-08-24T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ca-veracodes-journey-to-devops-getting-agile-ish/</loc>
		<lastmod>2018-08-24T15:11:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/august-24th-updates/</loc>
		<lastmod>2018-08-24T15:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/three-big-fakes-two-big-flaws-avast/</loc>
		<lastmod>2018-08-24T15:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/green-card-scams-preying-on-the-desperate/</loc>
		<lastmod>2018-08-24T16:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/have-press-release-will-travel-the-hack/</loc>
		<lastmod>2018-08-24T16:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-a-i-is-shaking-the-foundations-of-cybersecurity/</loc>
		<lastmod>2018-08-24T16:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-rant-on-single-function-security-tools/</loc>
		<lastmod>2018-08-24T17:51:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bsides-cleveland-2018-spencer-mcintyres-reflective-pe-unloading/</loc>
		<lastmod>2018-08-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/new-apache-struts-vulnerability-highlights-need-for-software-composition-analysis/</loc>
		<lastmod>2018-08-24T18:27:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fake-font-dropper/</loc>
		<lastmod>2018-08-24T18:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/codexm-awesome-code-checker-power-itty-bitty-learning-curve/</loc>
		<lastmod>2018-08-24T18:40:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/static-vs-dynamic-data-masking-why-are-we-still-comparing-the-two/</loc>
		<lastmod>2018-08-24T20:12:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/learning-held-hostage-how-to-prepare-for-and-prevent-data-loss-due-to-ransomware/</loc>
		<lastmod>2018-08-24T20:20:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/xkcd-supreme-court-bracket/</loc>
		<lastmod>2018-08-24T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/looking-back-on-black-hat-2018-four-key-learnings-from-this-years-event/</loc>
		<lastmod>2018-08-24T23:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bsides-cleveland-2018-celeste-halls-one-puzzle-piece-at-a-time-logging-quick-wins/</loc>
		<lastmod>2018-08-25T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-joy-of-techs-it-gets-a-seal-of-approval/</loc>
		<lastmod>2018-08-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bsides-cleveland-2018-christine-stevensons-go-hack-yourself-moving-beyond-assumption-based-security/</loc>
		<lastmod>2018-08-25T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/whos-behind-the-screencam-extortion-scam/</loc>
		<lastmod>2018-08-25T23:35:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/senator-john-sidney-mccain-iii-1936-2018/</loc>
		<lastmod>2018-08-26T00:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/stealing-certificates-with-apostille/</loc>
		<lastmod>2018-08-26T13:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/sen-john-mccain-1936-2018/</loc>
		<lastmod>2018-08-26T18:40:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/provisioning-a-headless-raspberry-pi/</loc>
		<lastmod>2018-08-27T01:39:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-create-a-layered-security-defense-strategy/</loc>
		<lastmod>2018-08-27T01:40:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/revolutionize-endpoint-security-with-application-isolation-containment/</loc>
		<lastmod>2018-08-27T03:52:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/arnecc-eln-elno-ecnl-pexa-the-alphabet-of-electronic-conveyancing/</loc>
		<lastmod>2018-08-27T03:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-shared-security-weekly-blaze-new-tsa-body-scanners-back-to-school-cybersecurity-instagram-hacking/</loc>
		<lastmod>2018-08-27T04:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/tripwire-nccoe-collaborate-on-the-energy-sector-asset-management-project/</loc>
		<lastmod>2018-08-27T04:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/do-something-know-something-learn-something-a-3-step-guide-to-keeping-your-infosec-career-exciting/</loc>
		<lastmod>2018-08-27T04:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/diminished-data-privacy-customer-doubt-could-affect-corporate-business-models-monetization/</loc>
		<lastmod>2018-08-27T07:16:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/networkminer-2-3-2-released/</loc>
		<lastmod>2018-08-27T09:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/heres-how-anyone-with-20-can-hire-an-iot-botnet-to-blast-out-a-week-long-ddos-attack/</loc>
		<lastmod>2018-08-27T10:45:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/critical-apache-struts-flaw-just-waiting-to-be-exploited-poc-reported-in-the-wild/</loc>
		<lastmod>2018-08-27T12:30:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/remote-access-phone-scams-bilk-australians-of-au4-4-million-stolen-so-far-in-2018/</loc>
		<lastmod>2018-08-27T13:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/2-3-million-t-mobile-customers-exposed-following-data-breach/</loc>
		<lastmod>2018-08-27T13:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/acm-sigarch-dr-wolfs-magnificent-theory/</loc>
		<lastmod>2018-08-27T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/there-was-zero-trust-at-black-hat/</loc>
		<lastmod>2018-08-27T14:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/future-cyberwar/</loc>
		<lastmod>2018-08-27T14:02:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-chronology-of-gandcrab-v4-x/</loc>
		<lastmod>2018-08-27T14:04:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-maximize-cloud-performance-while-keeping-data-safe/</loc>
		<lastmod>2018-08-27T14:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/rsa-and-nist-partner-to-reduce-e-commerce-fraud-risk/</loc>
		<lastmod>2018-08-27T14:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/many-uk-smbs-still-lax-in-data-protection-new-study-unveils/</loc>
		<lastmod>2018-08-27T14:44:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/shaping-the-healthcare-ecosystem-with-blockchain/</loc>
		<lastmod>2018-08-27T14:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/securing-applications-with-coveritys-static-analysis-results/</loc>
		<lastmod>2018-08-27T15:52:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/week-34-cyberattack-digest-2018-dnc-sitter-app-facebook-and-others/</loc>
		<lastmod>2018-08-27T15:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/private-permissioned-blockchain-the-way-forward-for-the-banking-and-financial-industry/</loc>
		<lastmod>2018-08-27T16:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/trends-in-multi-cloud-deployment/</loc>
		<lastmod>2018-08-27T16:19:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cehv10-and-cehv9-comparing-the-versions/</loc>
		<lastmod>2018-08-27T16:32:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/securing-industrial-iot-sensors-part-1-the-tpm-for-network-security/</loc>
		<lastmod>2018-08-27T16:52:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-week-in-security-august-20-26/</loc>
		<lastmod>2018-08-27T17:52:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bsides-cleveland-2018-tom-estons-using-technology-to-defend-digital-privacy-human-rights/</loc>
		<lastmod>2018-08-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/speaking-at-gartner-security-summit-london-2018/</loc>
		<lastmod>2018-08-27T18:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/simplifying-world-tile-grid-creation-with-geom_wtg/</loc>
		<lastmod>2018-08-27T18:45:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/vmware-monetizing-the-hybrid-cloud/</loc>
		<lastmod>2018-08-27T18:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/enterprise-security-risk-apps-capturing-corporate-mobile-screens/</loc>
		<lastmod>2018-08-27T20:54:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/robert-m-lee-and-jeff-hass-little-bobby-comics-what-is-it-ot-convergence/</loc>
		<lastmod>2018-08-27T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/mobile-menace-monday-fakegift-is-the-gift-that-keeps-on-frustrating/</loc>
		<lastmod>2018-08-27T21:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/phishing-scams-targeting-pastors-whos-next/</loc>
		<lastmod>2018-08-27T22:23:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/8-27-19-dtex-insider-threat-privacy-news-microsoft-apt28-shut-downs-highlight-insider-threat-risks-tech-heavyweights-seek-to-sidestep-california-privacy-law/</loc>
		<lastmod>2018-08-27T23:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/blockchain-is-only-as-secure-as-your-private-keys/</loc>
		<lastmod>2018-08-28T02:48:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/will-you-still-need-a-vpn-with-wpa3-avast/</loc>
		<lastmod>2018-08-28T03:52:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-sky-is-falling-no-wait-thats-just-our-data-in-the-cloud/</loc>
		<lastmod>2018-08-28T04:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/highlights-from-defcon-2018/</loc>
		<lastmod>2018-08-28T07:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/hows-it-going-with-the-gdpr-steps-to-take-to-protect-your-business-this-fall/</loc>
		<lastmod>2018-08-28T07:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/77-of-businesses-have-experienced-cyber-attack-in-the-past-12-months/</loc>
		<lastmod>2018-08-28T07:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-make-the-best-of-cybersecurity-incidents/</loc>
		<lastmod>2018-08-28T08:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/windows-zero-day-vulnerability-comes-with-poc-on-github/</loc>
		<lastmod>2018-08-28T08:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/my-take-as-phishers-take-aim-at-elections-why-not-train-employees-to-serve-as-phishing-police/</loc>
		<lastmod>2018-08-28T10:24:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bank-of-spain-reveals-its-website-suffered-a-dos-attack/</loc>
		<lastmod>2018-08-28T11:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/moffitt-cancer-center-replaces-av-selects-bromium-application-isolation/</loc>
		<lastmod>2018-08-28T13:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-a-devops-recruiter-hires-for-containers-and-serverless/</loc>
		<lastmod>2018-08-28T13:26:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fiserv-flaw-exposed-customer-data-at-hundreds-of-banks/</loc>
		<lastmod>2018-08-28T13:27:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/secret-agent-mess/</loc>
		<lastmod>2018-08-28T13:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/late-summer-facebookery/</loc>
		<lastmod>2018-08-28T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/critical-rce-vulnerability-in-facebook-server-patched-researcher-nabs-5000-bounty/</loc>
		<lastmod>2018-08-28T14:09:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/iot-5g-networks-and-cybersecurity-a-new-atmosphere-for-mobile-network-attacks/</loc>
		<lastmod>2018-08-28T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/securing-web-applications-in-microservices-architectures/</loc>
		<lastmod>2018-08-28T14:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cybercrime-and-agile-development-organizations-must-keep-pace/</loc>
		<lastmod>2018-08-28T14:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ocr-software-firm-abbyy-leaks-203000-customer-documents-in-mongodb-server-snafu/</loc>
		<lastmod>2018-08-28T15:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/explainer-series-what-is-clickjacking/</loc>
		<lastmod>2018-08-28T16:46:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/5-ways-to-improve-your-mips-score-through-secure-messaging/</loc>
		<lastmod>2018-08-28T16:52:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/trends-in-open-source-security/</loc>
		<lastmod>2018-08-28T17:05:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/in-the-financial-services-industry-the-time-for-a-fresh-approach-to-cyber-security-is-now/</loc>
		<lastmod>2018-08-28T17:40:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/researchers-discovered-vulnerabilities-that-allow-attackers-to-control-pacemakers-remotely/</loc>
		<lastmod>2018-08-28T17:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bsides-cleveland-2018-brett-hawkins-code-execution-with-jdk-scripting-tools-nashorn-javascript-engine/</loc>
		<lastmod>2018-08-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ransomware-incident-response-data-process-driven/</loc>
		<lastmod>2018-08-28T19:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/atlas-quantum-breach-affects-261000-users-avast/</loc>
		<lastmod>2018-08-28T19:17:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/official-cardi-b-website-plagued-by-spammers/</loc>
		<lastmod>2018-08-28T19:17:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/useful-flags-for-chromedriver/</loc>
		<lastmod>2018-08-28T20:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cve-2018-11776-the-latest-apache-struts-vulnerability/</loc>
		<lastmod>2018-08-28T20:04:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/xkcd-hazard-symbol/</loc>
		<lastmod>2018-08-28T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/green-card-scams-tech-support-scams/</loc>
		<lastmod>2018-08-28T21:10:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/core-integrity-verifications/</loc>
		<lastmod>2018-08-28T21:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-test-hack-dont-let-ghostscript-haunt-you-and-a-helpful-hacker/</loc>
		<lastmod>2018-08-28T22:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fortnite-and-android-an-epic-disagreement/</loc>
		<lastmod>2018-08-28T22:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/three-ways-to-secure-legacy-infrastructure/</loc>
		<lastmod>2018-08-29T04:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/researchers-find-power-grid-iot-device-security-a-dangerous-mix/</loc>
		<lastmod>2018-08-29T08:41:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/understand-how-to-simplify-your-compliance-projects-with-our-free-demonstrations/</loc>
		<lastmod>2018-08-29T08:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/instagram-to-support-authenticator-apps-for-improved-2fa-feature/</loc>
		<lastmod>2018-08-29T11:52:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/computer-science-and-diversity/</loc>
		<lastmod>2018-08-29T12:21:36+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->