<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2018/08/preventive-security-for-you/</loc>
		<lastmod>2018-08-29T12:53:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cia-network-exposed-through-insecure-communications-system/</loc>
		<lastmod>2018-08-29T13:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-difference-between-saas-and-iaas-from-a-casb-perspective/</loc>
		<lastmod>2018-08-29T13:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/on-becoming-a-contributor-to-the-http-archive/</loc>
		<lastmod>2018-08-29T13:38:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/5-simple-questions-on-serverless-security-that-every-ciso-should-be-ready-to-answer/</loc>
		<lastmod>2018-08-29T13:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-choose-the-right-vendor-for-your-aadhaar-data-vault/</loc>
		<lastmod>2018-08-29T13:48:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/sweetrolls-takeover-the-github-username-re-use-confabulation/</loc>
		<lastmod>2018-08-29T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/netcat-and-ncat/</loc>
		<lastmod>2018-08-29T14:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/protecting-sensitive-data-what-a-breach-means-to-your-business/</loc>
		<lastmod>2018-08-29T14:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/navigating-and-evaluating-cloud-security-solutions/</loc>
		<lastmod>2018-08-29T15:02:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/more-on-security-data-lakes-and-fail/</loc>
		<lastmod>2018-08-29T15:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-intersection-between-iast-and-sca-and-why-you-need-both-in-your-security-toolkit/</loc>
		<lastmod>2018-08-29T15:41:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/report-nearly-half-of-security-professionals-think-they-could-execute-a-successful-insider-attack-on-their-organization/</loc>
		<lastmod>2018-08-29T15:59:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/why-you-need-professional-email-hosting-for-your-business/</loc>
		<lastmod>2018-08-29T16:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/venafi-study-do-enterprises-struggle-with-machine-identities/</loc>
		<lastmod>2018-08-29T16:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-is-foreshadow-and-how-can-you-overcome-this-vulnerability/</loc>
		<lastmod>2018-08-29T16:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/my-take-can-network-traffic-analysis-cure-the-security-ills-of-digital-transformation/</loc>
		<lastmod>2018-08-29T16:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/evolution-of-the-press/</loc>
		<lastmod>2018-08-29T17:03:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/air-canada-alerts-customers-of-mobile-app-breach-20000-users-affected/</loc>
		<lastmod>2018-08-29T17:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/7-regulations-requiring-file-integrity-monitoring-for-compliance/</loc>
		<lastmod>2018-08-29T17:16:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-evolving-threat-landscape-looking-at-our-2018-predictions/</loc>
		<lastmod>2018-08-29T17:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/public-review-requested-tcg-snmp-mib-for-tpm-based-attestation/</loc>
		<lastmod>2018-08-29T17:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fileless-malware-getting-the-lowdown-on-this-insidious-threat/</loc>
		<lastmod>2018-08-29T17:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bsides-cleveland-2018-bill-sempfs-whats-changed-in-the-new-owasp-top-10/</loc>
		<lastmod>2018-08-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-analytics-is-not-a-siem/</loc>
		<lastmod>2018-08-29T18:18:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-cyber-kill-chain-what-you-need-to-know/</loc>
		<lastmod>2018-08-29T19:05:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-sevillage-wrap-up-from-def-con-26/</loc>
		<lastmod>2018-08-29T19:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/android-ios-detections-down-but-fortnite-flaw-problematic/</loc>
		<lastmod>2018-08-29T20:16:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/survey-data-management-is-an-afterthought-in-cloud-migration/</loc>
		<lastmod>2018-08-29T20:41:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/heisenbergs-usb-superposition/</loc>
		<lastmod>2018-08-29T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/new-zero-day-vulnerability-found-in-windows-avast/</loc>
		<lastmod>2018-08-29T22:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/instagrams-new-security-tools-are-a-welcome-step-but-not-enough/</loc>
		<lastmod>2018-08-29T22:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/debunking-trumps-claim-of-googles-sotu-bias/</loc>
		<lastmod>2018-08-30T01:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-devops-and-cis-security-controls-fit-together/</loc>
		<lastmod>2018-08-30T03:05:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/evolution-of-cyber-security-in-healthcare/</loc>
		<lastmod>2018-08-30T03:05:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/spam-campaigns-leveraging-tk-domains-2/</loc>
		<lastmod>2018-08-30T05:39:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/consumer-privacy-reaches-the-u-s-with-the-california-consumer-privacy-act/</loc>
		<lastmod>2018-08-30T07:10:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/scaling-up-pci-compliance-in-an-advancing-organization/</loc>
		<lastmod>2018-08-30T07:24:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/organizations-are-unrealistic-overconfident-about-their-cybersecurity-skills/</loc>
		<lastmod>2018-08-30T07:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/pinpoint-departing-users-with-predictive-flight-risk/</loc>
		<lastmod>2018-08-30T07:40:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/data-talks-download-attacks-ignite-while-attachments-cool-their-heels/</loc>
		<lastmod>2018-08-30T11:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/police-investigating-data-breach-at-chinese-hotel-group/</loc>
		<lastmod>2018-08-30T11:40:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-mitigate-xxe-vulnerabilities-in-python/</loc>
		<lastmod>2018-08-30T12:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/top-compliance-pain-points-by-industry/</loc>
		<lastmod>2018-08-30T13:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/securosis-black-hat-and-ai-what-could-go-wrong/</loc>
		<lastmod>2018-08-30T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/key-cyber-trends-impacting-state-and-local-government-and-education/</loc>
		<lastmod>2018-08-30T14:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/final-nail-in-the-coffin-of-http-chrome-68-and-ssl-tls-implementation/</loc>
		<lastmod>2018-08-30T14:34:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-evolution-of-iot-attacks/</loc>
		<lastmod>2018-08-30T15:04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-osquery-will-change-the-fragmented-security-market/</loc>
		<lastmod>2018-08-30T15:04:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/defining-and-managing-success-for-security-teams/</loc>
		<lastmod>2018-08-30T15:15:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/struts-flaw-sast-iast-dast-rasp-primer-hacking-planes-atms-and-water-heaters/</loc>
		<lastmod>2018-08-30T15:17:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/custom-card-printing-links-customization-to-brand-loyalty/</loc>
		<lastmod>2018-08-30T15:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/guest-essay-a-call-for-immediate-collective-action-to-stem-attacks-on-industrial-control-systems/</loc>
		<lastmod>2018-08-30T15:50:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/application-security-mistake-no-4-ignoring-appsec-policies/</loc>
		<lastmod>2018-08-30T16:46:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/gartner-says-cloud-remains-top-emerging-enterprise-risk/</loc>
		<lastmod>2018-08-30T17:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/reversing-malware-in-a-custom-format-hidden-bee-elements/</loc>
		<lastmod>2018-08-30T17:05:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/transitioning-applications-to-the-cloud-doesnt-have-to-mean-sacrificing-security-visibility-or-control/</loc>
		<lastmod>2018-08-30T17:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/5-best-entry-level-information-security-certifications/</loc>
		<lastmod>2018-08-30T17:53:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-much-does-it-cost-to-become-a-penetration-tester/</loc>
		<lastmod>2018-08-30T17:53:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-are-penetration-teams-structured/</loc>
		<lastmod>2018-08-30T17:53:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-build-a-network-of-security-champions-within-your-organization/</loc>
		<lastmod>2018-08-30T17:53:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-is-a-security-champion-definition-necessity-and-employee-empowerment/</loc>
		<lastmod>2018-08-30T17:53:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-is-it-like-being-a-freelance-penetration-tester/</loc>
		<lastmod>2018-08-30T17:53:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-benefits-of-learning-ethical-hacking/</loc>
		<lastmod>2018-08-30T17:53:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-do-pentesters-document-and-remediate-vulnerabilities-in-ios/</loc>
		<lastmod>2018-08-30T17:53:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-do-pentesters-document-and-remediate-vulnerabilities-in-web-apps/</loc>
		<lastmod>2018-08-30T17:53:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-happens-once-a-penetration-test-uncovers-vulnerabilities/</loc>
		<lastmod>2018-08-30T17:53:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bsides-cleveland-2018-michael-stringers-raindance-raining-recon-from-the-microsoft-cloud/</loc>
		<lastmod>2018-08-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-is-it-like-being-on-a-penetration-testing-team/</loc>
		<lastmod>2018-08-30T18:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-how-and-why-of-account-takeover-attacks/</loc>
		<lastmod>2018-08-30T18:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-awareness-checklist-for-state-government/</loc>
		<lastmod>2018-08-30T18:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/7-security-awareness-tips-for-developers-in-your-organization/</loc>
		<lastmod>2018-08-30T18:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/securityiq-update-adds-awareness-modules-four-languages-mobile-optimized-phishing-simulations/</loc>
		<lastmod>2018-08-30T18:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/pmp%ef%b8%8f-certification-requirements-how-to-become-pmp-certified/</loc>
		<lastmod>2018-08-30T18:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-best-information-security-certifications-for-practitioners/</loc>
		<lastmod>2018-08-30T18:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-most-vulnerable-and-hackable-medical-devices/</loc>
		<lastmod>2018-08-30T18:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-time-has-come-for-rules-of-engagement-for-cyberwarfare/</loc>
		<lastmod>2018-08-30T18:04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-improve-your-website-security-posture-part-ii/</loc>
		<lastmod>2018-08-30T18:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/david-wilcox-on-joining-dtex-and-arming-the-private-sector-with-intelligence-to-combat-insider-threats/</loc>
		<lastmod>2018-08-30T19:16:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/federal-pki-security-challenges-are-you-doing-enough-to-protect-machine-identities/</loc>
		<lastmod>2018-08-30T19:17:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/managed-detection-and-response-hype-or-hope/</loc>
		<lastmod>2018-08-30T20:53:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-joy-of-techs-sextortion/</loc>
		<lastmod>2018-08-30T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/making-an-impact-with-security-awareness-training-structuring-the-program/</loc>
		<lastmod>2018-08-30T22:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-do-pentesters-document-and-remediate-vulnerabilities-in-android/</loc>
		<lastmod>2018-08-30T22:53:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/why-you-need-a-cybersecurity-hero/</loc>
		<lastmod>2018-08-30T22:53:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/enhancing-data-security-for-your-azure-and-redhat-openshift-cloud-applications/</loc>
		<lastmod>2018-08-30T23:59:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/want-to-make-more-money-here-are-the-top-5-highest-paying-infosec-certifications/</loc>
		<lastmod>2018-08-31T00:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/in-2018-what-is-security-architecture/</loc>
		<lastmod>2018-08-31T03:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/strengthen-production-systems-with-container-runtime-security/</loc>
		<lastmod>2018-08-31T03:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/selecting-a-security-leader-dont-get-caught-in-no-mans-land/</loc>
		<lastmod>2018-08-31T03:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/37-of-it-managers-see-failure-to-install-updates-as-the-biggest-security-threat-of-2018/</loc>
		<lastmod>2018-08-31T08:40:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/tell-tale-signs-of-a-spoofed-email-and-3-things-you-can-do-to-stop-them/</loc>
		<lastmod>2018-08-31T10:27:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/domain-validation-where-are-we-now/</loc>
		<lastmod>2018-08-31T13:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/air-canada-admits-app-data-breach-included-customers-passport-details/</loc>
		<lastmod>2018-08-31T13:45:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/icanns-choice-the-crypto-key-roll/</loc>
		<lastmod>2018-08-31T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/nonprofit-agency-gains-better-protection-pricing-and-support-with-switch-to-avast-business-antivirus-avast-business/</loc>
		<lastmod>2018-08-31T14:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/recommended-reading-serverless-security-application-security-and-other-serverless-related-topics/</loc>
		<lastmod>2018-08-31T14:16:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/monthly-blog-round-up-august-2018/</loc>
		<lastmod>2018-08-31T15:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/explained-regular-expression-regex/</loc>
		<lastmod>2018-08-31T15:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ecsa-v10-vs-v9-whats-new-on-the-certification-exam/</loc>
		<lastmod>2018-08-31T15:45:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/mobile-misery-android-ios-data-leakage/</loc>
		<lastmod>2018-08-31T15:52:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-shared-security-podcast-episode-79-election-hacking-and-vulnerable-voting-machines/</loc>
		<lastmod>2018-08-31T16:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bens-book-of-the-month-review-of-social-engineering-the-science-of-human-hacking/</loc>
		<lastmod>2018-08-31T16:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/securing-industrial-iot-sensors-part-2-trusted-software-stack/</loc>
		<lastmod>2018-08-31T16:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bsides-cleveland-2018-sam-nasrs-tools-and-procedures-for-securing-net-applications/</loc>
		<lastmod>2018-08-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-awareness-checklist-items-for-technology-companies/</loc>
		<lastmod>2018-08-31T18:16:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/critical-components-of-implementing-a-successful-security-champions-program/</loc>
		<lastmod>2018-08-31T18:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-do-security-champions-enable-a-devops-culture/</loc>
		<lastmod>2018-08-31T18:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-security-checklist-for-financial-institutions/</loc>
		<lastmod>2018-08-31T18:16:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/top-5-best-practices-for-a-cost-effective-internal-audit/</loc>
		<lastmod>2018-08-31T18:16:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/pmp-certification-overview-and-career-path/</loc>
		<lastmod>2018-08-31T19:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/xkcd-begging-the-question/</loc>
		<lastmod>2018-08-31T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/container-security-part-2-benchmarks-to-the-rescue/</loc>
		<lastmod>2018-08-31T23:52:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-cleveland-2018-jerod-brennens-hacking-identity-a-pen-testers-guide-to-iam/</loc>
		<lastmod>2018-09-01T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-become-a-network-admin-it-security-careers-cyberspeak-podcast/</loc>
		<lastmod>2018-09-01T16:52:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-joy-of-techs-google-search-isnt-rigged/</loc>
		<lastmod>2018-09-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-cleveland-2018-matt-scheurers-phishing-forensics-is-it-just-suspicious-or-is-it-malicious/</loc>
		<lastmod>2018-09-01T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-zero-trust-manifesto/</loc>
		<lastmod>2018-09-02T07:24:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-cleveland-2018-michael-mendez-securing-code-the-basics/</loc>
		<lastmod>2018-09-02T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/new-tech-whitesource-leverages-automation-to-mitigate-lurking-open-source-vulnerabilities/</loc>
		<lastmod>2018-09-02T14:50:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/robert-m-lee-and-jeff-hass-little-bobby-comics-ics-vulnerabilities/</loc>
		<lastmod>2018-09-02T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-cleveland-2018-jamie-murdocks-the-marriage-of-threat-intelligence-and-incident-response-or-threat-hunting-for-the-rest-of-us/</loc>
		<lastmod>2018-09-02T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/alleged-satori-iot-botnet-operator-sought-media-spotlight-got-indicted/</loc>
		<lastmod>2018-09-03T02:31:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/tripwirebookclub-gray-hat-python/</loc>
		<lastmod>2018-09-03T03:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-shared-security-weekly-blaze-us-federal-privacy-law-whatsapp-google-drive-warning-improved-security-for-instagram/</loc>
		<lastmod>2018-09-03T04:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/a-real-world-deep-dive-into-the-top-cloud-threats/</loc>
		<lastmod>2018-09-03T07:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cyber-security-roundup-for-august-2018/</loc>
		<lastmod>2018-09-03T09:33:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mozilla-firefox-slated-to-block-all-trackers-crowd-goes-wild/</loc>
		<lastmod>2018-09-03T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/indias-cosmos-bank-suffers-unlimited-atm-attack/</loc>
		<lastmod>2018-09-03T14:18:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/a-week-in-security-august-27-september-2/</loc>
		<lastmod>2018-09-03T16:16:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/samsam-ransomware-keeps-striking-victims-still-unprepared/</loc>
		<lastmod>2018-09-03T17:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/insecurity-podcast-susan-etlinger-on-the-ever-expanding-role-of-ai/</loc>
		<lastmod>2018-09-03T17:16:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-cleveland-2018-jeremy-mios-wacky-and-wild-security-getting-things-under-cis-controls-v7/</loc>
		<lastmod>2018-09-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-joy-of-techs-theres-a-leak-at-apple/</loc>
		<lastmod>2018-09-03T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-cultivate-security-champions-at-the-workplace/</loc>
		<lastmod>2018-09-04T03:40:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/netmuxs-hash-crack-challenge-writeup/</loc>
		<lastmod>2018-09-04T04:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-to-watch-for-as-we-head-into-election-season/</loc>
		<lastmod>2018-09-04T07:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/5-devops-trends-cisos-must-watch/</loc>
		<lastmod>2018-09-04T07:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/protect-your-network-with-wireless-security/</loc>
		<lastmod>2018-09-04T08:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/admiral-picks-semafone-for-customer-security-in-its-contact-centres/</loc>
		<lastmod>2018-09-04T08:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/new-book-announcement-click-here-to-kill-everybody/</loc>
		<lastmod>2018-09-04T11:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/week-35-cyberattack-digest-2018-the-bank-of-spain-t-mobile-singhealth-and-others/</loc>
		<lastmod>2018-09-04T12:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/governments-commit-to-fighting-encryption-and-tech-companies-will-have-to-cooperate/</loc>
		<lastmod>2018-09-04T12:18:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-msp-guide-to-vertical-market-success-spotlight-on-education-avast-business/</loc>
		<lastmod>2018-09-04T13:05:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/social-engineer-newsletter-vol-08-issue-108/</loc>
		<lastmod>2018-09-04T13:47:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/wireshark-bitten/</loc>
		<lastmod>2018-09-04T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/fortinac-automates-iot-security-for-digital-businesses/</loc>
		<lastmod>2018-09-04T14:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/you-bet-your-mobile-app-consumers-are-willing-to-pay-with-their-smartphone/</loc>
		<lastmod>2018-09-04T14:05:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/for-2nd-time-in-3-years-mobile-spyware-maker-mspy-leaks-millions-of-sensitive-records/</loc>
		<lastmod>2018-09-04T17:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/banks-still-have-the-most-money-and-pay-the-price-in-the-cyber-realm/</loc>
		<lastmod>2018-09-04T17:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-cleveland-2018-thomas-pieragastinis-interdisciplinary-infosec-equifax-individuation-and-the-modern-state/</loc>
		<lastmod>2018-09-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/would-you-borrow-money-using-your-mobile-device/</loc>
		<lastmod>2018-09-04T18:56:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/wordpress-database-upgrade-phishing-campaign/</loc>
		<lastmod>2018-09-04T19:16:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/qa-how-emulating-attacks-in-a-live-environment-can-more-pervasively-protect-complex-networks/</loc>
		<lastmod>2018-09-04T19:18:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/these-hacks-brought-to-you-by-leaky-apis/</loc>
		<lastmod>2018-09-04T19:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/9-4-18-dtex-insider-threat-privacy-news-dtex-announces-record-year-adds-new-cfo-and-nsa-veteran-to-team-human-error-drives-uk-data-breach-increase/</loc>
		<lastmod>2018-09-04T20:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/3-key-lessons-that-hospitality-industry-leaders-must-learn-from-the-sabre-reservation-system-hack/</loc>
		<lastmod>2018-09-04T20:49:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-frontiers/</loc>
		<lastmod>2018-09-04T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/luke-kingma-lou-patrick-mackays-futurism-laborless-day/</loc>
		<lastmod>2018-09-04T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/five-eyes-alliance-war-against-encryption-is-your-privacy-not-private/</loc>
		<lastmod>2018-09-04T22:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/fixing-the-cve-program-your-personal-data-checking-out-and-taking-flight/</loc>
		<lastmod>2018-09-04T22:17:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/imperva-recognized-as-a-2018-gartner-magic-quadrant-waf-leader-five-years-running/</loc>
		<lastmod>2018-09-04T22:31:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-is-the-us-doing-to-keep-technology-safe/</loc>
		<lastmod>2018-09-04T22:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-idaho-falls-preview-cyber-security-defense-maturity-model/</loc>
		<lastmod>2018-09-05T03:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/an-ehr-systems-check-up-3-use-cases-for-updating-cyber-hygiene/</loc>
		<lastmod>2018-09-05T03:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/premera-blue-cross-victims-accuse-insurer-of-deliberately-destroying-hacking-evidence/</loc>
		<lastmod>2018-09-05T09:02:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/research-more-smbs-are-reporting-ransomware-attacks-to-authorities-but-less-are-paying-the-ransom/</loc>
		<lastmod>2018-09-05T09:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/contract-upgrade-anti-patterns/</loc>
		<lastmod>2018-09-05T10:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/semafone-adds-avtex-to-channel-partner-portfolio/</loc>
		<lastmod>2018-09-05T11:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-isc%c2%b2-cap-exam-updates-october-2018/</loc>
		<lastmod>2018-09-05T11:08:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/compromised-chrome-extension-snooped-on-users-credentials-cryptocurrency-private-keys/</loc>
		<lastmod>2018-09-05T11:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/45-useful-and-informative-gdpr-presentations-resources/</loc>
		<lastmod>2018-09-05T13:11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/vendor-dismissal-of-discovered-voting-machine-vulnerabilities-stinks-to-high-heaven/</loc>
		<lastmod>2018-09-05T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/aws-appsync-getting-started-guide/</loc>
		<lastmod>2018-09-05T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/take-control-of-your-cloud-with-gemalto-at-govware-2018/</loc>
		<lastmod>2018-09-05T14:35:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/my-take-the-amazing-ways-hackers-manipulate-runtime-to-disguise-deep-network-breaches/</loc>
		<lastmod>2018-09-05T15:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/rate-limiting-a-cure-worse-than-the-disease/</loc>
		<lastmod>2018-09-05T16:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/fighting-network-siloes/</loc>
		<lastmod>2018-09-05T16:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/maintaining-your-pmp-certification-renewal-requirements/</loc>
		<lastmod>2018-09-05T16:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-security-configuration-management-scm-matters/</loc>
		<lastmod>2018-09-05T17:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/an-android-flaw-page-changing-malware-and-more-data-breaches-avast/</loc>
		<lastmod>2018-09-05T17:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/webinar-using-security-champions-to-build-a-devsecops-culture-within-your-organization/</loc>
		<lastmod>2018-09-05T17:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/phishing-101-targeted-phishing-attacks/</loc>
		<lastmod>2018-09-05T17:34:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/privacy-101-your-basic-questions-answered/</loc>
		<lastmod>2018-09-05T17:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-cleveland-2018-kevin-codys-mobile-application-privacy-and-analytics/</loc>
		<lastmod>2018-09-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/3-reasons-you-need-a-root-of-trust-when-orchestrating-machine-identities/</loc>
		<lastmod>2018-09-05T18:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ee-journal-takes-a-look-at-securing-iot-devices-with-tcgs-dice-root-of-trust/</loc>
		<lastmod>2018-09-05T19:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/a-roll-of-the-dice/</loc>
		<lastmod>2018-09-05T19:14:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/discover-privileged-accounts-with-entitlement-classification/</loc>
		<lastmod>2018-09-05T19:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/still-smishing-you-sms-scams/</loc>
		<lastmod>2018-09-05T20:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-joy-of-techs-techs-on-trial/</loc>
		<lastmod>2018-09-05T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/is-evernote-going-away/</loc>
		<lastmod>2018-09-05T21:08:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/android-security-update-september-2018/</loc>
		<lastmod>2018-09-05T21:11:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/browser-extensions-are-they-worth-the-risk/</loc>
		<lastmod>2018-09-05T22:55:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/5-must-read-resources-for-soc-and-threat-intelligence-professionals/</loc>
		<lastmod>2018-09-05T23:05:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/you-the-first-last-and-best-data-protection-and-privacy-defense-part-2/</loc>
		<lastmod>2018-09-06T04:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/rattle-an-ethereum-evm-binary-analysis-framework/</loc>
		<lastmod>2018-09-06T06:30:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hardware-security-still-essential-at-the-heart-of-the-payments-infrastructure/</loc>
		<lastmod>2018-09-06T07:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/organizations-face-ongoing-security-risks-in-the-cloud/</loc>
		<lastmod>2018-09-06T08:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/announcing-the-plugin-password-policy-manager-for-wordpress-2/</loc>
		<lastmod>2018-09-06T10:03:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/new-tech-critical-start-applies-zero-trust-security-model-to-managed-security-services/</loc>
		<lastmod>2018-09-06T10:24:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/card-not-present-cnp-fraud-in-real-life-an-account-of-a-trial-court/</loc>
		<lastmod>2018-09-06T11:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/tripwire-patch-priority-index-for-august-2018/</loc>
		<lastmod>2018-09-06T12:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/use-this-nerc-cip-v6-standards-summary-to-stay-compliant/</loc>
		<lastmod>2018-09-06T12:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-iphone-security-enhancements-you-need-to-know-about/</loc>
		<lastmod>2018-09-06T12:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-osquery-helps-secure-your-cloud-with-these-two-critical-cis-benchmark-controls/</loc>
		<lastmod>2018-09-06T13:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/serial-dataleak-offender-mspy-spouts-a-newish-river-of-data/</loc>
		<lastmod>2018-09-06T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/vigilant-software-adds-personal-data-records-to-its-data-protection-platform/</loc>
		<lastmod>2018-09-06T14:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-is-california-ab-375-and-what-does-it-mean-for-you/</loc>
		<lastmod>2018-09-06T14:12:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/vulnerability-assessments-and-penetration-tests-whats-the-difference/</loc>
		<lastmod>2018-09-06T14:12:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/denial-why-do-small-businesses-turn-a-blind-eye-to-their-biggest-threat-avast-business/</loc>
		<lastmod>2018-09-06T14:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/human-vs-machine-why-machine-learning-wont-replace-threat-hunters-yet/</loc>
		<lastmod>2018-09-06T14:41:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/create-a-security-risk-assessment-for-containers-in-5-steps/</loc>
		<lastmod>2018-09-06T14:41:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/facilitating-digital-transformation-with-fortigates-secure-sd-wan-solutions/</loc>
		<lastmod>2018-09-06T14:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/3-ways-to-improve-incident-response-time-with-iatp/</loc>
		<lastmod>2018-09-06T14:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/getting-the-most-out-of-your-branch-local-connection/</loc>
		<lastmod>2018-09-06T15:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/entrust-datacard-global-partner-conference-2018-the-winners-are/</loc>
		<lastmod>2018-09-06T15:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/leader-of-ddos-for-hire-gang-pleads-guilty-to-bomb-threats/</loc>
		<lastmod>2018-09-06T15:51:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/heath-davies-finance-monthly-ceo-award-winner-2018/</loc>
		<lastmod>2018-09-06T16:07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-cleveland-2018-robert-olsons-evolving-the-teaching-of-pen-testing-in-higher-ed/</loc>
		<lastmod>2018-09-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/state-of-the-art-password-cracking/</loc>
		<lastmod>2018-09-06T18:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/a-quick-guide-to-the-complex-ecto-multi/</loc>
		<lastmod>2018-09-06T18:50:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/pci-for-smb-requirement-5-6-maintain-a-vulnerability-management-program/</loc>
		<lastmod>2018-09-06T19:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-siem-is-a-process-not-a-product/</loc>
		<lastmod>2018-09-06T19:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/avast-at-ifa-summit-avast/</loc>
		<lastmod>2018-09-06T19:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-rolles-theorem/</loc>
		<lastmod>2018-09-06T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-beginners-guide-to-external-penetration-testing-reconnaissance/</loc>
		<lastmod>2018-09-06T21:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/beware-of-the-new-way-crooks-can-drain-your-credit-card-account/</loc>
		<lastmod>2018-09-07T03:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/a-brighter-future-for-devsecops-its-closer-than-you-think/</loc>
		<lastmod>2018-09-07T08:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/gone-phishing-why-android-and-iphone-users-are-susceptible-to-cyber-phishing-scams/</loc>
		<lastmod>2018-09-07T09:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/teenage-hacker-admits-making-hoax-bomb-threats-against-schools-and-airlines/</loc>
		<lastmod>2018-09-07T09:26:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/us-treasury-wants-national-data-breach-notification-standard/</loc>
		<lastmod>2018-09-07T09:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/healthcare-reports-highest-number-of-breaches-over-the-past-financial-year/</loc>
		<lastmod>2018-09-07T10:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/tesla-encouraging-good-faith-security-research-in-bug-bounty-program/</loc>
		<lastmod>2018-09-07T11:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hacking-a-serverless-application-demo/</loc>
		<lastmod>2018-09-07T12:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/british-airways-hacked-400000-customers-affected/</loc>
		<lastmod>2018-09-07T13:27:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/job-outlook-for-ccsp-cert-holders/</loc>
		<lastmod>2018-09-07T13:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cryptojacking-and-the-home/</loc>
		<lastmod>2018-09-07T13:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/phishing-scams-pick-up-the-phone-and-mikrotik-routers-watch-and-listen-avast/</loc>
		<lastmod>2018-09-07T13:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/microtik-for-tat-flawed-routers-join-proxy-army/</loc>
		<lastmod>2018-09-07T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/g-suite-migration-and-backup-qa-with-clark-constructions-g-suite-admin/</loc>
		<lastmod>2018-09-07T14:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/shifting-left-requires-remediation-guidance/</loc>
		<lastmod>2018-09-07T14:54:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hotspot-honeypot/</loc>
		<lastmod>2018-09-07T14:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/powershell-for-pentesters-part-4-modules-with-powershell/</loc>
		<lastmod>2018-09-07T14:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/invoice-phishing-campaign/</loc>
		<lastmod>2018-09-07T15:13:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-you-should-be-fed-up-with-the-cycle-of-fud/</loc>
		<lastmod>2018-09-07T16:10:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-can-we-learn-from-the-ba-data-breach/</loc>
		<lastmod>2018-09-07T16:24:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/british-airways-breached/</loc>
		<lastmod>2018-09-07T16:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/zero-day-threats-has-detection-become-deception/</loc>
		<lastmod>2018-09-07T17:28:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Zero-Day-Threats.jpg</image:loc>
			<image:title><![CDATA[Zero-Day-Threats]]></image:title>
			<image:caption><![CDATA[Zero-day Threats Detection]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/israel-keeps-on-growing-as-a-major-center-of-global-cybersecurity-innovation/</loc>
		<lastmod>2018-09-07T17:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/comptia-a-certification-an-overview/</loc>
		<lastmod>2018-09-07T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bulldog-2-ctf-walkthrough/</loc>
		<lastmod>2018-09-07T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/my-take-can-hollywoods-highly-effective-source-code-security-tools-help-make-iot-safe/</loc>
		<lastmod>2018-09-07T17:59:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-cleveland-2018-mark-abramss-go-back-to-the-basics-with-your-processes-improving-operations-without-technology/</loc>
		<lastmod>2018-09-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/new-guide-on-state-data-breach-laws/</loc>
		<lastmod>2018-09-07T19:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/temple-of-doom-1-ctf-walkthrough-part-2/</loc>
		<lastmod>2018-09-07T19:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/luke-kingma-lou-patrick-mackays-futurism-tacos-on-the-blockchain/</loc>
		<lastmod>2018-09-07T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/protecting-trade-secrets-from-physical-intruders/</loc>
		<lastmod>2018-09-07T21:07:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-you-should-know-about-effective-container-security/</loc>
		<lastmod>2018-09-07T21:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-cleveland-2018-john-fattens-anatomy-of-an-attack/</loc>
		<lastmod>2018-09-08T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-boathouses-and-houseboats/</loc>
		<lastmod>2018-09-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-cleveland-2018-amanda-berlins-hackers-hugs-drugs-mental-health-in-infosec/</loc>
		<lastmod>2018-09-08T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/startups-cybersecurity-and-minority-representation-security-awareness-cyberspeak-podcast/</loc>
		<lastmod>2018-09-08T21:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/anonymous-application-access-get-this-valuable-service-safely-on-board/</loc>
		<lastmod>2018-09-09T09:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-dave-kennedys-keynote/</loc>
		<lastmod>2018-09-09T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/can-attackers-circumvent-domain-validation-to-spoof-your-website/</loc>
		<lastmod>2018-09-09T17:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/robert-m-lee-and-jeff-hass-little-bobby-comics-ai-doesnt-work-for-security/</loc>
		<lastmod>2018-09-09T19:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/driving-drill-dynamically-with-docker-and-updating-storage-configurations-on-the-fly-with-sergeant/</loc>
		<lastmod>2018-09-09T20:58:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-soya-aoyamas-an-inconvenient-truth-evading-the-ransomware-protection-in-windows-10/</loc>
		<lastmod>2018-09-09T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/have-your-analysts-see-the-full-cyber-kill-chain/</loc>
		<lastmod>2018-09-10T01:13:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/fighting-network-silos/</loc>
		<lastmod>2018-09-10T02:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bsides-idaho-falls-preview-the-industrialization-of-red-and-blue-teaming/</loc>
		<lastmod>2018-09-10T03:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/a-clean-start-finding-vulnerabilities-in-your-docker-base-images/</loc>
		<lastmod>2018-09-10T03:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-shared-security-weekly-blaze-five-eyes-security-alliance-google-and-your-offline-purchases-privacy-by-default-in-firefox/</loc>
		<lastmod>2018-09-10T04:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/webinar-basics-of-iot-hacking-for-the-career-pen-tester-on-sept-27-2018/</loc>
		<lastmod>2018-09-10T07:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mishandling-cyber-risk-management-is-risky-business/</loc>
		<lastmod>2018-09-10T08:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/week-36-cyberattack-digest-2018-british-airways-huazhu-group-camubot-and-others/</loc>
		<lastmod>2018-09-10T12:48:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/protecting-software-against-exploitation-with-darpas-cfar/</loc>
		<lastmod>2018-09-10T13:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mit-underwater-to-atmosphere-radio-communications-perfected/</loc>
		<lastmod>2018-09-10T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/five-ways-to-make-the-most-of-mobile-biometrics/</loc>
		<lastmod>2018-09-10T14:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/low-security-visibility-avast-business-can-help-avast-business/</loc>
		<lastmod>2018-09-10T14:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/important-notice-end-of-support-for-windows-xp-and-vista-avast-business/</loc>
		<lastmod>2018-09-10T14:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/apps-that-steal-users-browser-histories-kicked-out-of-the-mac-app-store/</loc>
		<lastmod>2018-09-10T14:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/choosing-a-waf-solution-third-party-evaluations-can-help/</loc>
		<lastmod>2018-09-10T14:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/gmail-confidential-not-so-much/</loc>
		<lastmod>2018-09-10T15:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/a-mac-hack/</loc>
		<lastmod>2018-09-10T15:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/complementary-gartner-report-peer-insights-voice-of-the-customer-security-awareness-cbt/</loc>
		<lastmod>2018-09-10T15:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hack-in-the-box-gsec-wrap-up/</loc>
		<lastmod>2018-09-10T16:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/veracode-users-talk-about-selecting-an-appsec-solution/</loc>
		<lastmod>2018-09-10T16:15:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/7-shocking-statistics-that-prove-just-how-important-laptop-security-is/</loc>
		<lastmod>2018-09-10T17:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/10-ways-to-protect-your-privacy-online/</loc>
		<lastmod>2018-09-10T17:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-chris-robertss-the-abyss-is-waving-back-the-four-paths-that-human-evolution-is-charging-down-and-how-we-choose-which-ones-right/</loc>
		<lastmod>2018-09-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/securing-industrial-iot-sensors-part-3-foundational-trust-for-iot/</loc>
		<lastmod>2018-09-10T19:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/android-malware-intercepts-sms-2fa-we-have-the-logs/</loc>
		<lastmod>2018-09-10T20:49:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-joy-of-techs-in-space-no-one-can-hear-you/</loc>
		<lastmod>2018-09-10T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/californias-bad-iot-law/</loc>
		<lastmod>2018-09-10T21:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mitre-adds-appthority-as-cve-numbering-authority-cna/</loc>
		<lastmod>2018-09-10T21:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/from-dev-to-infosec-making-friends/</loc>
		<lastmod>2018-09-10T22:43:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/9-10-18-dtex-insider-threat-privacy-news-sunday-times-insider-fraud-section-features-dtex-ceo-christy-wyatt-to-speak-at-sinet-uk-doj-north-korean-hacker-indictment-highlights-h/</loc>
		<lastmod>2018-09-10T22:48:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/is-more-tech-regulation-coming/</loc>
		<lastmod>2018-09-10T23:44:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/in-a-few-days-credit-freezes-will-be-fee-free/</loc>
		<lastmod>2018-09-11T02:26:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/revised-critical-infrastructure-protection-reliability-standard-cip-003-7-what-are-the-changes/</loc>
		<lastmod>2018-09-11T04:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/to-make-the-internet-of-things-safe-start-with-manufacturing/</loc>
		<lastmod>2018-09-11T07:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-2018-top-security-issue-trust/</loc>
		<lastmod>2018-09-11T07:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/rpo-and-rto-what-do-i-need-to-know/</loc>
		<lastmod>2018-09-11T08:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/using-hacked-iot-devices-to-disrupt-the-power-grid/</loc>
		<lastmod>2018-09-11T11:25:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/making-an-impact-with-security-awareness-training-continuous-contextual-content/</loc>
		<lastmod>2018-09-11T11:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/irs-call-scammers-sentenced-in-texas/</loc>
		<lastmod>2018-09-11T12:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/beware-the-homeless-homebuyer-real-estate-scam/</loc>
		<lastmod>2018-09-11T12:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/sap-cyber-threat-intelligence-report-september-2018/</loc>
		<lastmod>2018-09-11T12:53:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/wait-what-why-google-takes-www-away/</loc>
		<lastmod>2018-09-11T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/4-ways-to-guard-against-an-atm-cash-out/</loc>
		<lastmod>2018-09-11T14:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/whats-so-special-about-zero-day-vulnerabilities/</loc>
		<lastmod>2018-09-11T14:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/a-psychologist-speaks-the-psychology-of-cybercriminals-and-internet-scams-avast-business/</loc>
		<lastmod>2018-09-11T14:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-by-design-or-by-accident/</loc>
		<lastmod>2018-09-11T15:12:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/todays-ciso-is-shifting-toward-strategic-business-enablement/</loc>
		<lastmod>2018-09-11T15:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/2001-09-11-ground-zero-from-space/</loc>
		<lastmod>2018-09-11T15:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ddos-protection-is-the-foundation-for-application-site-and-data-availability/</loc>
		<lastmod>2018-09-11T15:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-pentagon-during-rescue-recovery-operations-post-2001-09-11/</loc>
		<lastmod>2018-09-11T15:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-streamline-cyber-forensic-investigations/</loc>
		<lastmod>2018-09-11T15:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/data-driven-enterprises-must-balance-data-science-with-data-security/</loc>
		<lastmod>2018-09-11T15:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/flight-93/</loc>
		<lastmod>2018-09-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/a-message-for-cisos-stop-stockpiling-cryptocurrencies-for-future-ransomware-payments/</loc>
		<lastmod>2018-09-11T16:01:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/thats-a-wrap-spannings-summer-2018/</loc>
		<lastmod>2018-09-11T16:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/when-encryption-isnt-safe-enough/</loc>
		<lastmod>2018-09-11T16:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/sap-security-notes-september-18-critical-bug-in-sap-hana-xs/</loc>
		<lastmod>2018-09-11T16:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/phishing-scam-targets-wordpress-users-avast/</loc>
		<lastmod>2018-09-11T17:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-pranshu-bajpai-dr-richard-enbodys-crypto-gone-rogue-a-tale-of-ransomware-key-management-and-the-cryptoapi/</loc>
		<lastmod>2018-09-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-light-in-the-dark-myths-and-truths-about-the-dark-web/</loc>
		<lastmod>2018-09-11T18:12:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/september-2018-patch-tuesday-61-vulns-fragmentsmack-hyper-v-escape/</loc>
		<lastmod>2018-09-11T18:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/new-guide-on-how-to-use-the-sucuri-wordpress-security-plugin/</loc>
		<lastmod>2018-09-11T19:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/patch-tuesday-september-2018-edition/</loc>
		<lastmod>2018-09-11T20:35:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/taking-stock-the-internet-of-things-and-machine-learning-algorithms-at-war/</loc>
		<lastmod>2018-09-11T20:56:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-sandboxing-cycle/</loc>
		<lastmod>2018-09-11T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-top-4-b2b-content-marketing-challenges/</loc>
		<lastmod>2018-09-11T21:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bromium-customers-praise-fast-easy-deployment/</loc>
		<lastmod>2018-09-11T22:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/vert-threat-alert-september-2018-patch-tuesday-analysis/</loc>
		<lastmod>2018-09-11T22:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/camubot-malware-sonarsnoop-hacking-and-government-backdoors/</loc>
		<lastmod>2018-09-11T22:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/detect-privileged-access-abuse-with-linear-regression/</loc>
		<lastmod>2018-09-11T23:39:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cybersecurity-playbooks-an-essential-tool-for-the-soc-team/</loc>
		<lastmod>2018-09-12T00:52:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/86-of-it-security-professionals-say-the-world-is-in-a-cyber-war/</loc>
		<lastmod>2018-09-12T01:01:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-evolution-is-not-good-enough-its-time-for-a-security-revolution/</loc>
		<lastmod>2018-09-12T03:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/understanding-iot-security-challenges-an-interview-with-an-industry-expert/</loc>
		<lastmod>2018-09-12T07:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-speed-up-devops-in-3-steps/</loc>
		<lastmod>2018-09-12T07:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/enterprises-still-struggle-to-put-the-sec-in-devops/</loc>
		<lastmod>2018-09-12T08:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/butlins-data-breach-affects-34000-customers/</loc>
		<lastmod>2018-09-12T10:42:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-top-5-activity-log-plugins-for-wordpress-2/</loc>
		<lastmod>2018-09-12T10:46:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/configuration-hardening-proactively-guarding-systems-against-intrusion/</loc>
		<lastmod>2018-09-12T10:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/street-gangs-turn-to-high-tech-cybercrime-to-make-a-living/</loc>
		<lastmod>2018-09-12T11:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/lets-write-a-codexm-checker-its-not-rocket-science/</loc>
		<lastmod>2018-09-12T12:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-msp-guide-to-building-your-managed-security-services-defining-and-bundling-avast-business/</loc>
		<lastmod>2018-09-12T13:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/six-critical-vulnerabilities-in-adobe-coldfusion-get-patches/</loc>
		<lastmod>2018-09-12T13:19:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/defending-against-the-mirai-botnet/</loc>
		<lastmod>2018-09-12T13:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/painting-a-new-security-landscape/</loc>
		<lastmod>2018-09-12T13:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/stewart-baker-and-bruce-schneier-click-here-to-kill-everbody-podcast/</loc>
		<lastmod>2018-09-12T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/oaic-received-242-data-breach-notifications-in-q2-2018/</loc>
		<lastmod>2018-09-12T14:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hacker-accused-of-orchestrating-massive-hack-of-us-financial-institutions-arrested/</loc>
		<lastmod>2018-09-12T14:08:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/veeam-leaks-200-gb-customer-database-goldmine-for-phishers/</loc>
		<lastmod>2018-09-12T14:21:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-cybersecurity-f-word/</loc>
		<lastmod>2018-09-12T14:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/latest-pci-dss-versions-a-look-at-how-the-standard-has-evolved/</loc>
		<lastmod>2018-09-12T14:55:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/network-security-appliances-vs-word-and-powershell/</loc>
		<lastmod>2018-09-12T14:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/musings-on-serverless-and-application-security-with-simon-wardley/</loc>
		<lastmod>2018-09-12T14:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/join-threat-stack-at-builders-of-tomorrow/</loc>
		<lastmod>2018-09-12T16:10:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-is-critical-thinking/</loc>
		<lastmod>2018-09-12T16:15:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-evolution-of-data-literacy-at-the-u-s-department-of-energy-finding-power-grid-cyber-attacks-in-a-data-haystack/</loc>
		<lastmod>2018-09-12T16:33:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-jayson-e-streets-youre-right-this-talk-isnt-really-about-you/</loc>
		<lastmod>2018-09-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/data-breach-380000-british-airways-transactions-compromised-avast/</loc>
		<lastmod>2018-09-12T18:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/protect-yourself-from-magecart-using-subresource-integrity/</loc>
		<lastmod>2018-09-12T20:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/u-s-mobile-giants-want-to-be-your-online-identity/</loc>
		<lastmod>2018-09-12T20:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/luke-kingma-lou-patrick-mackays-futurism-bring-home-the-bacon/</loc>
		<lastmod>2018-09-12T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/three-lessons-you-can-learn-from-a-recent-security-breach/</loc>
		<lastmod>2018-09-12T23:43:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mastering-container-security-docker-kubernetes-and-more/</loc>
		<lastmod>2018-09-13T04:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-cloud-migration-means-for-your-security-posture/</loc>
		<lastmod>2018-09-13T04:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/platform-criminality-aids-sales-of-exploits-and-ip/</loc>
		<lastmod>2018-09-13T10:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/oilrig-launching-attack-campaigns-with-updated-bondupdater-trojan/</loc>
		<lastmod>2018-09-13T11:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-is-vulnerability-management-anyway/</loc>
		<lastmod>2018-09-13T11:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/application-security-mistake-no-5-lack-of-buy-in/</loc>
		<lastmod>2018-09-13T12:42:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ransomware-attack-shuts-down-small-canadian-town-officials-pay-ransom/</loc>
		<lastmod>2018-09-13T12:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/deploying-osquery-at-scale-a-comprehensive-list-of-open-source-tools/</loc>
		<lastmod>2018-09-13T12:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/medical-device-security-improvements-coming-but-not-anytime-soon/</loc>
		<lastmod>2018-09-13T13:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/prison-for-man-who-assisted-scareware-scheme-that-targeted-newspaper-website/</loc>
		<lastmod>2018-09-13T13:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/so-called-cybersecurity-impetus-for-agile-dev-adoption/</loc>
		<lastmod>2018-09-13T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-risks-of-government-hacking/</loc>
		<lastmod>2018-09-13T14:08:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/my-take-heres-how-diversity-can-strengthen-cybersecurity-at-many-levels/</loc>
		<lastmod>2018-09-13T14:58:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/adopt-tls-1-3-kill-two-birds-with-one-stone/</loc>
		<lastmod>2018-09-13T15:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/culture-change-starts-with-you-how-you-can-take-steps-to-improve-your-working-life/</loc>
		<lastmod>2018-09-13T16:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/endpoint-protection-how-to-improve-endpoint-security-with-soar/</loc>
		<lastmod>2018-09-13T16:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-services-enable-partners-to-help-plug-the-holes-in-customer-networks/</loc>
		<lastmod>2018-09-13T17:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hacking-security-episode-1-what-is-hacking-security/</loc>
		<lastmod>2018-09-13T17:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-one-takeaway-from-vmworld-that-storage-drive-users-need-to-be-aware-of/</loc>
		<lastmod>2018-09-13T17:36:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-kelley-robinsons-analyzing-pwned-passwords-with-apache-spark/</loc>
		<lastmod>2018-09-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/darkcloud-bootkit-2/</loc>
		<lastmod>2018-09-13T18:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mobile-device-access-predicted-to-surpass-desktop-this-holiday-season/</loc>
		<lastmod>2018-09-13T18:45:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/should-the-dod-be-wary-of-wildcard-certificates/</loc>
		<lastmod>2018-09-13T18:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/unsuccessfully-defaced-websites/</loc>
		<lastmod>2018-09-13T18:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-tell-if-an-android-app-is-safe-to-install-avast/</loc>
		<lastmod>2018-09-13T20:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-social-media-announcement/</loc>
		<lastmod>2018-09-13T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/an-overview-of-the-owasp-security-champions-playbook/</loc>
		<lastmod>2018-09-13T21:43:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-become-your-own-security-champion/</loc>
		<lastmod>2018-09-13T21:43:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-awareness-checklist-for-local-government/</loc>
		<lastmod>2018-09-13T21:43:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-meaningless-edr-can-actually-hinder-a-companys-security-posture/</loc>
		<lastmod>2018-09-14T07:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/40-of-managers-say-boards-should-oversee-cybersecurity-survey-shows/</loc>
		<lastmod>2018-09-14T07:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/new-build-adds-detection-for-web-cache-poisoning-apache-struts-rce-and-url-rewrite-vulnerabilities/</loc>
		<lastmod>2018-09-14T08:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/multi-cloud-design-the-priority-focus-should-be-on-application-security-part-2/</loc>
		<lastmod>2018-09-14T08:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/6-simple-ways-to-protect-your-website-from-hackers/</loc>
		<lastmod>2018-09-14T08:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/travel-industry-is-non-compliance-worth-the-risk/</loc>
		<lastmod>2018-09-14T09:33:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ico-receiving-500-breach-related-calls-a-week-since-gdpr-took-effect/</loc>
		<lastmod>2018-09-14T13:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/stasi-gdpr-and-you/</loc>
		<lastmod>2018-09-14T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-news-more-phishing-canada-pays-ransom-smbs-are-a-target-avast/</loc>
		<lastmod>2018-09-14T14:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/british-airways-hack-update-caused-by-injected-script-pci-dss-non-compliance-is-suspected/</loc>
		<lastmod>2018-09-14T14:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/british-airways-customer-data-stolen-in-website-and-mobile-app-hack/</loc>
		<lastmod>2018-09-14T14:49:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/enough-ransomware-cautionary-tales/</loc>
		<lastmod>2018-09-14T15:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-iot-within-us-network-connected-medical-devices/</loc>
		<lastmod>2018-09-14T15:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/interac-one-phish-to-phish-them-all/</loc>
		<lastmod>2018-09-14T15:54:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/recognizing-the-best-in-identity-access-management-gemalto-wins-best-iam-solution/</loc>
		<lastmod>2018-09-14T16:32:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/microsoft-jet-database-engine-code-execution-vulnerability/</loc>
		<lastmod>2018-09-14T16:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/millar-inc-achieves-gold-standard-of-data-protection-with-spanning-backup-for-office-365/</loc>
		<lastmod>2018-09-14T17:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/quantum-computing-and-cryptography/</loc>
		<lastmod>2018-09-14T17:38:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-matthew-eidelbergs-vibing-your-way-through-an-enterprise-how-attackers-are-becoming-more-sneaky/</loc>
		<lastmod>2018-09-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/open-source-security-research-group-gets-a-new-office/</loc>
		<lastmod>2018-09-14T18:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/outdated-duplicator-plugin-rce-abused/</loc>
		<lastmod>2018-09-14T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/dns-is-a-unique-and-necessary-security-control/</loc>
		<lastmod>2018-09-14T19:02:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/five-eyes-intelligence-services-choose-surveillance-over-security/</loc>
		<lastmod>2018-09-14T19:20:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/my-take-poorly-protected-local-government-networks-cast-shadow-on-midterm-elections/</loc>
		<lastmod>2018-09-14T20:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/developing-cyber-security-incident-response-plans-for-industrial-control-systems/</loc>
		<lastmod>2018-09-14T20:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-joy-of-techs-facebook-is-drowning-in-fake/</loc>
		<lastmod>2018-09-14T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/blackberry-massively-steps-up-security-efforts-to-address-threat-storm/</loc>
		<lastmod>2018-09-14T23:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-corey-batiuks-pwnbook-penetrating-with-googles-chromebook/</loc>
		<lastmod>2018-09-15T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/erlang-authenticated-remote-code-execution/</loc>
		<lastmod>2018-09-15T14:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-trum/</loc>
		<lastmod>2018-09-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-chad-caleases-life-death-the-nematodes-long-live-cyber-resilience/</loc>
		<lastmod>2018-09-15T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/results-from-the-third-annual-etsi-nfv-plugtest-opnfv-sfc-nsh-event/</loc>
		<lastmod>2018-09-16T00:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/lucky-break/</loc>
		<lastmod>2018-09-16T12:22:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-2018-carl-hertz-robert-wagner-scott-thomas-data-data-everywhere-but-no-one-stops-to-think/</loc>
		<lastmod>2018-09-16T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/healthcares-many-cybersecurity-challenges-security-awareness-cyberspeak-podcast/</loc>
		<lastmod>2018-09-16T15:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/robert-m-lee-and-jeff-hass-little-bobby-comics-assessment-of-perceived-targeting/</loc>
		<lastmod>2018-09-16T19:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-john-griggs-automation-and-open-source-turning-the-tide-on-attackers/</loc>
		<lastmod>2018-09-16T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/quick-tips-for-developing-an-ir-plan/</loc>
		<lastmod>2018-09-17T01:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/configuring-a-password-cracking-computer/</loc>
		<lastmod>2018-09-17T03:01:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/5-reasons-a-visit-the-semepris-booth-is-a-must-at-microsoft-ignite/</loc>
		<lastmod>2018-09-17T03:40:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/weekly-blaze-malware-less-email-attacks-equifax-breach-updates-vizio-class-action-lawsuit/</loc>
		<lastmod>2018-09-17T04:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-challenges-of-artificial-intelligence-ai-for-organisations/</loc>
		<lastmod>2018-09-17T04:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-is-the-most-important-skill-cyber-security-professionals-can-possess-the-experts-weigh-in/</loc>
		<lastmod>2018-09-17T04:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-crash-and-restart-an-iphone-with-a-css-based-web-attack/</loc>
		<lastmod>2018-09-17T07:47:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-protect-your-smb-clients-from-ransomware/</loc>
		<lastmod>2018-09-17T07:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/network-security-in-universities-colleges-and-schools/</loc>
		<lastmod>2018-09-17T08:26:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/businesses-worldwide-expected-to-spend-9-billion-on-cyber-insurance-by-2020/</loc>
		<lastmod>2018-09-17T08:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/uks-interception-regime-violates-human-rights-european-court-rules/</loc>
		<lastmod>2018-09-17T09:25:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/5-reason-to-visit-semperis-at-microsoft-ignite/</loc>
		<lastmod>2018-09-17T09:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/acunetix-team-heads-to-comino-for-an-end-of-summer-bbq/</loc>
		<lastmod>2018-09-17T10:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ransomware-attack-takes-down-airports-flight-information-screens/</loc>
		<lastmod>2018-09-17T11:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/translating-cybersecurity-jargon-to-english/</loc>
		<lastmod>2018-09-17T13:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hardware-security-ramtin-amins-take/</loc>
		<lastmod>2018-09-17T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/dangerous-invoices-and-dangerous-infrastructure/</loc>
		<lastmod>2018-09-17T14:27:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/uk-airport-wont-negotiate-with-ransomware-attackers-falls-back-to-whiteboards/</loc>
		<lastmod>2018-09-17T14:42:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/securing-containers-at-scale/</loc>
		<lastmod>2018-09-17T14:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/50-best-cloud-security-podcasts/</loc>
		<lastmod>2018-09-17T14:53:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/bitdefender-sponsors-the-nutanix-next-on-tour-2018-event-series/</loc>
		<lastmod>2018-09-17T14:59:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/privilege-escalation-vulnerability-found-in-honeywell-android-computers/</loc>
		<lastmod>2018-09-17T15:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/intercepting-and-modifying-responses-with-chrome-via-the-devtools-protocol/</loc>
		<lastmod>2018-09-17T15:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-spencer-gietzens-pacu-attack-and-post-exploitation-in-aws/</loc>
		<lastmod>2018-09-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cyber-attacks-hits-rail-europe-chilis-and-the-canadian-broadcasting-corp-cbc/</loc>
		<lastmod>2018-09-17T18:03:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/fortinet-brings-the-industrys-broadest-security-portfolio-to-microsoft-ignite-2018/</loc>
		<lastmod>2018-09-17T18:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/qa-the-troubling-implications-of-normalizing-encryption-backdoors-for-government-use/</loc>
		<lastmod>2018-09-17T18:44:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/beware-of-emails-purporting-to-be-from-the-irs/</loc>
		<lastmod>2018-09-17T19:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ipv6-will-bring-security-threats-what-you-need-to-know-to-be-prepared/</loc>
		<lastmod>2018-09-17T20:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/explainer-series-rdaas-security-and-managing-compliance-through-database-audit-and-monitoring-controls/</loc>
		<lastmod>2018-09-17T20:49:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-joy-of-techs-post-apple-keynote-grouches/</loc>
		<lastmod>2018-09-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/dangers-on-safari/</loc>
		<lastmod>2018-09-17T21:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/govpaynow-com-leaks-14m-records/</loc>
		<lastmod>2018-09-17T21:57:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/our-2018-update-to-how-to-plan-design-operate-and-evolve-a-soc-publishes/</loc>
		<lastmod>2018-09-17T22:11:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/continuous-security-that-works-with-your-aws-environment-in-a-way-that-makes-sense/</loc>
		<lastmod>2018-09-17T22:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/access-the-internet-archive-advanced-search-scrape-api-with-wayback-a-links-to-a-new-vignette-pkgdown-site/</loc>
		<lastmod>2018-09-17T22:27:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/could-smart-speakers-undo-your-smart-home-avast/</loc>
		<lastmod>2018-09-17T22:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/will-the-adoption-of-https-and-chrome-updates-provide-a-solution-to-ssl-stripping-attacks/</loc>
		<lastmod>2018-09-17T22:35:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/webinar-breaking-into-it-from-first-job-to-advanced-certs-with-comptia/</loc>
		<lastmod>2018-09-17T22:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-abandoned-domain-names-pose-a-major-cyber-risk-to-your-business/</loc>
		<lastmod>2018-09-18T01:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/80-percent-of-us-adults-have-never-considered-cybersecurity-careers-survey-finds/</loc>
		<lastmod>2018-09-18T03:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/93-of-forbes-global-2000-dont-stress-vulnerability-disclosure-policies-says-hackerone-report/</loc>
		<lastmod>2018-09-18T07:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/challenges-of-enterprise-cloud-usage/</loc>
		<lastmod>2018-09-18T08:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/android-issues/</loc>
		<lastmod>2018-09-18T11:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-recover-from-a-hacked-website-event/</loc>
		<lastmod>2018-09-18T11:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/a-quarter-of-civilian-federal-agencies-have-adopted-dmarc-and-spf-for-all-domains/</loc>
		<lastmod>2018-09-18T11:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/convergence-is-the-key-to-future-proofing-security/</loc>
		<lastmod>2018-09-18T13:05:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/apple-to-make-life-easier-for-law-enforcement/</loc>
		<lastmod>2018-09-18T13:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-msp-guide-to-vertical-market-success-spotlight-on-professional-services-avast-business/</loc>
		<lastmod>2018-09-18T13:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/gerhard-jacobs-taking-stock-the-internet-of-things-and-machine-learning-algorithms-at-war/</loc>
		<lastmod>2018-09-18T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/us-district-court-judge-to-state-of-georgia-bad-bad-double-bad/</loc>
		<lastmod>2018-09-18T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/sven-morgenroth-talks-about-php-type-juggling-on-pauls-security-weekly-podcast/</loc>
		<lastmod>2018-09-18T14:21:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/smartphones-that-talk-too-much/</loc>
		<lastmod>2018-09-18T15:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/partner-implements-untangle-at-client-sites-for-cost-effective-network-protection/</loc>
		<lastmod>2018-09-18T15:33:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/itecsa-and-entrust-datacard-collaborate-in-the-official-launch-of-the-of-the-automatic-card-printer-machine/</loc>
		<lastmod>2018-09-18T15:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/nine-major-phishing-attacks-of-2018-and-how-to-spot-them/</loc>
		<lastmod>2018-09-18T15:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/flushing-the-mac-app-store/</loc>
		<lastmod>2018-09-18T15:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/iot-5g-networks-and-cybersecurity-safeguarding-5g-networks-with-automation-and-ai/</loc>
		<lastmod>2018-09-18T16:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/krebs-commentary-on-global-authentication-via-your-wireless-carrier/</loc>
		<lastmod>2018-09-18T16:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-security-leaders-can-do-to-stay-relevant/</loc>
		<lastmod>2018-09-19T06:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Security-Leaders-Relevant.jpg</image:loc>
			<image:title><![CDATA[Security-Leaders-Relevant]]></image:title>
			<image:caption><![CDATA[new CISO]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/spam-filtering-cheat-sheet-14-ways-to-reduce-spam/</loc>
		<lastmod>2018-09-18T16:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/best-practices-for-identifying-dangerous-emails/</loc>
		<lastmod>2018-09-18T16:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/my-take-the-no-1-reason-ransomware-attacks-persist-companies-overlook-unstructured-data/</loc>
		<lastmod>2018-09-18T17:31:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/automating-red-team-homelabs-part-1-kali-automation/</loc>
		<lastmod>2018-09-18T17:37:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/tesla-key-fob-issues-tor-browser-zero-day-woes-and-youve-got-malware/</loc>
		<lastmod>2018-09-18T17:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/secure-messaging-for-enhanced-patient-engagement/</loc>
		<lastmod>2018-09-18T17:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-david-fletcher-sally-vandevens-hacker-tools-compliments-of-microsoft/</loc>
		<lastmod>2018-09-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/backdoor-uses-paste-site-to-host-payload/</loc>
		<lastmod>2018-09-18T20:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/big-brother-is-watching-and-listening-avast/</loc>
		<lastmod>2018-09-18T20:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-nuuo-peekaboo-vulnerability-gives-hackers-your-camera-feed-avast/</loc>
		<lastmod>2018-09-18T20:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-beverages/</loc>
		<lastmod>2018-09-18T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/microsoft-and-imperva-collaboration-bolsters-data-compliance-and-security-capabilities/</loc>
		<lastmod>2018-09-18T21:33:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/must-attend-msignite-2018-the-intelligent-cloud-leads-the-pack/</loc>
		<lastmod>2018-09-18T22:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/coming-soon/</loc>
		<lastmod>2018-09-18T22:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/4-benefits-of-a-security-operations-center/</loc>
		<lastmod>2018-09-18T22:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/slow-it-vs-fast-it-resolving-chaos-around-machine-identities/</loc>
		<lastmod>2018-09-19T00:05:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/guarding-the-gate-cybersecurity-de-mystified/</loc>
		<lastmod>2018-09-19T04:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/u-s-federal-iot-policy-what-you-need-to-know/</loc>
		<lastmod>2018-09-19T04:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/your-business-should-be-more-afraid-of-phishing-than-malware/</loc>
		<lastmod>2018-09-19T07:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/national-get-to-know-your-customers-day-who-are-pci-pals-customers/</loc>
		<lastmod>2018-09-19T07:51:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/yahoo-settles-for-47-million-in-litigation-following-data-breach-of-3-billion-accounts/</loc>
		<lastmod>2018-09-19T09:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/week-37-cyberattack-digest-2018-fetal-diagnostic-institute-of-the-pacific-kayo-moe-university-of-edinburgh-and-others/</loc>
		<lastmod>2018-09-19T09:56:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/pegasus-spyware-used-in-45-countries/</loc>
		<lastmod>2018-09-19T10:19:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/state-of-the-internet-security-credential-stuffing/</loc>
		<lastmod>2018-09-19T10:43:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/state-department-says-some-employee-info-possibly-exposed-in-security-incident/</loc>
		<lastmod>2018-09-19T11:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/making-risk-count-winning-strategies-from-global-cisos/</loc>
		<lastmod>2018-09-19T11:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-makers-of-the-mirai-iot-hijacking-botnet-are-sentenced/</loc>
		<lastmod>2018-09-19T12:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/penetration-tests-vs-vulnerability-scans-understanding-the-differences/</loc>
		<lastmod>2018-09-19T13:09:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/nist-issues-guidance-for-medical-iot-device-security/</loc>
		<lastmod>2018-09-19T13:11:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cyber-threat-alliance-members-issue-first-collaborative-report-on-cryptomining/</loc>
		<lastmod>2018-09-19T14:14:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/taking-a-tour-of-the-pirate-ship-github-dmca-with-r/</loc>
		<lastmod>2018-09-19T14:26:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/researchers-find-new-financial-malware-targeting-banking-customers-in-brazil/</loc>
		<lastmod>2018-09-19T14:39:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/millennials-and-cybersecurity-understanding-the-value-of-personal-data/</loc>
		<lastmod>2018-09-19T15:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-internet-of-things-iot-and-digitally-stored-pii%e2%80%afavoidable-or-inevitable%e2%80%af/</loc>
		<lastmod>2018-09-19T15:42:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/atis-and-tcg-to-collaborate-to-help-improve-cybersecurity/</loc>
		<lastmod>2018-09-19T15:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/poseidon-malware/</loc>
		<lastmod>2018-09-19T16:06:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/old-ssl-certificates-may-be-putting-your-online-security-at-risk/</loc>
		<lastmod>2018-09-19T16:07:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-latest-cloud-hosting-service-to-serve-malware-2/</loc>
		<lastmod>2018-09-19T16:39:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mirai-botnet-authors-avoid-jail-time/</loc>
		<lastmod>2018-09-19T16:54:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/options-abound-for-cyber-security-jobseekers-but-finding-the-right-fit-takes-work/</loc>
		<lastmod>2018-09-19T17:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-dr-jared-demotts-how-to-conduct-a-product-security-test-and-how-it-fits-into-the-larger-security-strategy/</loc>
		<lastmod>2018-09-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-train-call-contact-centers-for-pci-dss-compliance/</loc>
		<lastmod>2018-09-19T18:10:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/introduction-to-wireless-security-with-aircrack-ng/</loc>
		<lastmod>2018-09-19T18:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/creating-custom-cloudtrail-rules-in-threat-stack/</loc>
		<lastmod>2018-09-19T18:46:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/targeting-the-brand-your-c-suite-may-be-at-risk/</loc>
		<lastmod>2018-09-19T19:54:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/fortinet-is-a-premiere-sponsor-at-the-2018-att-business-summit/</loc>
		<lastmod>2018-09-19T20:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-joy-of-techs-whos-the-fairest/</loc>
		<lastmod>2018-09-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-detect-and-remove-a-virus-from-your-android-phone-avast/</loc>
		<lastmod>2018-09-20T01:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ssd-advisory-asustor-nas-devices-authentication-bypass/</loc>
		<lastmod>2018-09-20T03:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/computer-system-security-requirements-for-irs-1075-what-you-need-to-know/</loc>
		<lastmod>2018-09-20T03:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/multi-cloud-use-regulatory-compliance-and-information-protection-drive-new-era-of-encryption-and-key-management-in-france/</loc>
		<lastmod>2018-09-20T07:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/amazon-hit-from-within-employees-leak-proprietary-data-for-profit/</loc>
		<lastmod>2018-09-20T08:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-guide-to-wordpress-password-security-2/</loc>
		<lastmod>2018-09-20T10:38:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ico-to-fine-equifax-500000-for-2017-data-breach/</loc>
		<lastmod>2018-09-20T11:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-vulnerability-in-ess-expressvote-touchscreen-voting-computer/</loc>
		<lastmod>2018-09-20T11:45:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/7gb-of-medical-data-publicly-exposed-thanks-to-misconfigured-aws-s3-bucket/</loc>
		<lastmod>2018-09-20T12:11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/uk-treasury-committee-report-regulation-is-closing-in-on-cryptocurrency/</loc>
		<lastmod>2018-09-20T13:25:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/talking-serverless-security-with-jeremiah-grossman/</loc>
		<lastmod>2018-09-20T13:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/equifax-fined-500000-for-ginormous-2017-breach/</loc>
		<lastmod>2018-09-20T13:48:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/fortigate-intrusion-prevention-continues-to-excel-in-nss-labs-ngips-testing-results/</loc>
		<lastmod>2018-09-20T13:59:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/many-organisations-still-arent-gdpr-compliant-are-you-one-of-them/</loc>
		<lastmod>2018-09-20T14:19:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/equifax-breach-catastrophic-but-no-game-changer-yet/</loc>
		<lastmod>2018-09-20T14:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/office-365-data-protection-part-1-disaster-recovery-and-retention-times/</loc>
		<lastmod>2018-09-20T15:17:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/dont-let-your-data-seep-through-the-cracks-cybersecurity-for-the-smart-home/</loc>
		<lastmod>2018-09-20T16:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-self-signed-certificates-may-be-the-best-choice-for-large-enterprises/</loc>
		<lastmod>2018-09-20T16:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/book-review-malware-data-science/</loc>
		<lastmod>2018-09-20T17:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/nta-the-other-ids/</loc>
		<lastmod>2018-09-20T18:07:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cryptojacking-surges-and-heres-what-to-do-about-it-avast/</loc>
		<lastmod>2018-09-20T18:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-curve-fitting/</loc>
		<lastmod>2018-09-20T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mobile-phone-tracking-updated-2018/</loc>
		<lastmod>2018-09-20T19:29:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/gentoo-hardening-part-4-pax-rbac-and-clamav-updated-2018/</loc>
		<lastmod>2018-09-20T19:29:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/nmap-evade-firewall-scripting-updated-2018/</loc>
		<lastmod>2018-09-20T19:29:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/password-security-complexity-vs-length-updated-2018/</loc>
		<lastmod>2018-09-20T19:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/php-email-injection-example-updated-2018/</loc>
		<lastmod>2018-09-20T19:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cloud-based-ids-and-ips-solutions-updated-2018/</loc>
		<lastmod>2018-09-20T19:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/back-dooring-pe-files-on-windows-updated-2018/</loc>
		<lastmod>2018-09-20T19:29:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/e-commerce-security-planning-for-disasters/</loc>
		<lastmod>2018-09-20T20:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-spencer-browns-over-the-phone-authentication/</loc>
		<lastmod>2018-09-20T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/is-your-pam-solution-enough-to-block-credential-theft/</loc>
		<lastmod>2018-09-20T21:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/detect-host-compromise-with-domains-generated-algorithmically/</loc>
		<lastmod>2018-09-20T23:54:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/lets-go-threat-hunting-insight-into-potential-cyber-threats-and-risks/</loc>
		<lastmod>2018-09-21T00:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/is-your-security-dashboard-ready-for-the-cloud/</loc>
		<lastmod>2018-09-21T03:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-businesses-risk-everything-by-relying-on-staff-to-keep-ransomware-out/</loc>
		<lastmod>2018-09-21T08:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/romanian-citizen-admits-guilt-in-police-department-ransomware-attack/</loc>
		<lastmod>2018-09-21T11:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/22-most-under-used-aws-security-metrics/</loc>
		<lastmod>2018-09-21T12:49:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/dis-computers-benefits-from-switch-to-managed-workplace-avast-business/</loc>
		<lastmod>2018-09-21T13:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/threat-rumination/</loc>
		<lastmod>2018-09-21T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/reverse-engineering-proprietary-ics-protocols/</loc>
		<lastmod>2018-09-21T14:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/my-experience-with-the-dod-version-of-the-rmf/</loc>
		<lastmod>2018-09-21T14:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/rise-of-credential-stuffing-in-asia-pacific-and-japan/</loc>
		<lastmod>2018-09-21T15:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/govpaynow-breach-demonstrates-long-short-term-impacts-of-security-slips/</loc>
		<lastmod>2018-09-21T15:44:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-news-all-in-one-malware-out-govpaynow-drops-the-ball-on-security-and-newegg-suffers-a-crack-avast/</loc>
		<lastmod>2018-09-21T15:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/my-take-heres-why-we-need-secops-to-help-secure-cloud-native-companiess/</loc>
		<lastmod>2018-09-21T16:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/credit-freezes-are-free-let-the-ice-age-begin/</loc>
		<lastmod>2018-09-21T16:31:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/merecently/</loc>
		<lastmod>2018-09-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-sarah-elies-designing-a-cloud-security-blueprint/</loc>
		<lastmod>2018-09-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/faxploiting-hackers-taking-advantage-of-the-forgotten-fax-function-on-your-printer/</loc>
		<lastmod>2018-09-24T06:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Faxploiting.jpg</image:loc>
			<image:title><![CDATA[Faxploiting]]></image:title>
			<image:caption><![CDATA[Faxploiting: Fax Machine Hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-joy-of-techs-imposter-syndrome/</loc>
		<lastmod>2018-09-21T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-security-talent-gap-is-misunderstood-and-ai-changes-it-all/</loc>
		<lastmod>2018-09-21T21:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-missing-piece-of-the-security-conference-circuit/</loc>
		<lastmod>2018-09-21T21:57:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/deep-analysis-of-a-driver-based-mitm-malware-itranslator/</loc>
		<lastmod>2018-09-22T00:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/rule-1-for-detecting-a-phish/</loc>
		<lastmod>2018-09-22T00:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-are-honeywords-password-protection-for-database-breaches/</loc>
		<lastmod>2018-09-22T00:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/pmp-domain-information-overview/</loc>
		<lastmod>2018-09-22T00:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-is-a-data-protection-officer/</loc>
		<lastmod>2018-09-22T00:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-a-data-protection-officer-will-benefit-your-organization/</loc>
		<lastmod>2018-09-22T00:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/building-a-security-awareness-program-on-an-organizational-level/</loc>
		<lastmod>2018-09-22T00:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/spam-or-phish-how-to-tell-the-difference-between-a-marketing-email-and-a-malicious-spam-email/</loc>
		<lastmod>2018-09-22T00:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-is-protected-health-information-phi/</loc>
		<lastmod>2018-09-22T00:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-danny-akackis-to-fail-is-divine/</loc>
		<lastmod>2018-09-22T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-unfulfilling-toys/</loc>
		<lastmod>2018-09-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-brandon-traffanstedts-zero-to-owned-in-1-hour-securing-privilege-in-cloud-devops-on-prem-workflows/</loc>
		<lastmod>2018-09-22T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/privacy-and-anonymity-in-the-modern-world-cyberspeak-podcast/</loc>
		<lastmod>2018-09-23T04:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-adam-hogans-malware-mitigation-sample-detonation-intelligence-automation-make-your-binaries-work-for-you/</loc>
		<lastmod>2018-09-23T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/lets-write-more-codexm-checkers-second-stage-ignition/</loc>
		<lastmod>2018-09-23T14:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/webinar-the-future-of-application-security-enable-devsecops-with-iast/</loc>
		<lastmod>2018-09-23T16:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/robert-m-lee-and-jeff-hass-little-bobby-comics-true-attribution/</loc>
		<lastmod>2018-09-23T19:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-matthew-eidelberg-steven-daracotts-emulacra-and-emulation-an-intro-to-emulating-binary-code-with-vivisect-atlas-of-d00m/</loc>
		<lastmod>2018-09-23T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/building-your-future-business-with-a-soc/</loc>
		<lastmod>2018-09-24T01:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/5-notable-security-incidents-that-recently-affected-federal-entities/</loc>
		<lastmod>2018-09-24T03:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cloud-security-a-cloud-provider-user-partnership/</loc>
		<lastmod>2018-09-24T03:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mobile-phone-call-scams-pegasus-mobile-spyware-newegg-data-breach-wb35/</loc>
		<lastmod>2018-09-24T04:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cryptojacking-uncrowns-ransomware-as-major-threat-for-healthcare-industry/</loc>
		<lastmod>2018-09-24T08:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/poor-pssword-hygiene-and-unpatched-systems-led-to-singapores-biggest-ever-cybersecurity-breach/</loc>
		<lastmod>2018-09-24T09:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/wendys-reportedly-sued-over-collection-of-employees-fingerprints/</loc>
		<lastmod>2018-09-24T11:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/new-variants-of-cold-boot-attack/</loc>
		<lastmod>2018-09-24T11:52:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/android-malware-and-ios-enhancements/</loc>
		<lastmod>2018-09-24T12:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/macos-mojave-security-user-operability-flaws-lead-to-slippery-slope/</loc>
		<lastmod>2018-09-24T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/gemalto-launches-the-new-data-security-directions-council/</loc>
		<lastmod>2018-09-24T14:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/week-38-cyberattack-digest-2018-govpaynow-com-port-of-barcelona-singhealth-and-others/</loc>
		<lastmod>2018-09-24T14:21:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/salesforce-trailblazer-community-survey-reveals-ongoing-upward-trends-in-skill-growth-minority-representation/</loc>
		<lastmod>2018-09-24T14:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/working-with-custom-report-policies-in-netsparker/</loc>
		<lastmod>2018-09-24T14:42:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/atis-advances-ict-cybersecurity-through-collaboration-with-trusted-computing-group/</loc>
		<lastmod>2018-09-24T15:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/open-sourcing-release-plugin-sbt-ci-release-early/</loc>
		<lastmod>2018-09-24T15:58:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/beware-of-hurricane-florence-relief-scams/</loc>
		<lastmod>2018-09-24T16:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/weak-federal-cybersecurity-measures-are-deteriorating-further-and-thats-extremely-dangerous/</loc>
		<lastmod>2018-09-24T16:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/report-on-bsides-miami-2018/</loc>
		<lastmod>2018-09-24T17:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/qa-reddit-breach-shows-use-of-sms-2fa-wont-stop-privileged-access-pillaging/</loc>
		<lastmod>2018-09-24T17:03:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/boosting-loyalty-blockchain-technology-in-retail-banking/</loc>
		<lastmod>2018-09-24T17:15:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/openstack-key-infrastructure-for-public-and-private-clouds/</loc>
		<lastmod>2018-09-24T17:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/tineola-taking-a-bite-out-of-enterprise-blockchain/</loc>
		<lastmod>2018-09-24T17:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-megan-carneys-threat-hunting-the-macos-edition/</loc>
		<lastmod>2018-09-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/android-hacking-and-security-part-2-content-provider-leakage/</loc>
		<lastmod>2018-09-24T18:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-is-a-honey-pot/</loc>
		<lastmod>2018-09-24T18:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/crack-me-challenge-part-4/</loc>
		<lastmod>2018-09-24T18:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-close-the-cyber-security-skills-shortage-by-maximizing-existing-resources/</loc>
		<lastmod>2018-09-24T18:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-does-my-phone-get-hot-android-phone-overheating-guide-avast/</loc>
		<lastmod>2018-09-24T20:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/wirelurker-masque-every-apple-ios-app-could-be-compromised/</loc>
		<lastmod>2018-09-24T21:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/missouri-ciso-michael-roling-leaves-a-legacy-of-excellence-in-government-cybersecurity-leadership/</loc>
		<lastmod>2018-09-24T21:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/imperva-joins-global-cybersecurity-tech-accord/</loc>
		<lastmod>2018-09-24T21:38:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/infosec-institute-announces-2018-cybersecurity-scholarship-recipients/</loc>
		<lastmod>2018-09-24T22:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/9-24-2018-dtex-insider-threat-privacy-news-ceo-christy-wyatt-tells-enterprise-times-uk-how-to-handle-negligent-insider-threats-cnbc-reports-insider-bribery-on-rise-wyatt-to-speak-at-forrester-fo/</loc>
		<lastmod>2018-09-24T23:33:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-joy-of-techs-introducing-amazon-home/</loc>
		<lastmod>2018-09-25T00:36:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/women-in-information-security-sharka/</loc>
		<lastmod>2018-09-25T03:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/granular-security-at-the-app-level/</loc>
		<lastmod>2018-09-25T07:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/14-years-prison-for-man-who-helped-hackers-evade-detection-by-anti-virus-software/</loc>
		<lastmod>2018-09-25T07:23:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/as-bots-and-robotic-processes-rise-in-the-enterprise-so-do-security-risks/</loc>
		<lastmod>2018-09-25T07:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/air-miles-on-sale-on-the-dark-web-at-a-fraction-of-the-cost/</loc>
		<lastmod>2018-09-25T07:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/azure-goes-boom-to-remind-us-infrastructure-and-multi-cloud-still-matter/</loc>
		<lastmod>2018-09-25T08:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/education-sector-data-breaches-skyrocket/</loc>
		<lastmod>2018-09-25T08:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/dont-look-away-peekaboo-vulnerability-may-allow-hackers-to-play-the-long-game/</loc>
		<lastmod>2018-09-25T08:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cissp-exam-changes-tips-to-pass-the-new-cat-format-and-free-e-book-cyberspeak-podcast/</loc>
		<lastmod>2018-09-25T11:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/evidence-for-the-security-of-pkcs-1-digital-signatures/</loc>
		<lastmod>2018-09-25T11:50:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-integrate-netsparker-cloud-with-slack/</loc>
		<lastmod>2018-09-25T12:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/september-2018-update-for-netsparker/</loc>
		<lastmod>2018-09-25T13:09:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/alert-logic-critical-watch-report-reveals-increase-in-volume-and-intensity-of-cyber-attacks/</loc>
		<lastmod>2018-09-25T13:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/directdefense-inc-carbon-black-worlds-largest-pay-for-play-data-exfiltration-botnet/</loc>
		<lastmod>2018-09-25T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cities-paying-ransom-what-does-it-mean-for-taxpayers/</loc>
		<lastmod>2018-09-25T14:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/securing-your-azure-deployment-with-the-fortinet-security-fabric/</loc>
		<lastmod>2018-09-25T15:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/20-years-of-the-hipaa-security-rule-what-have-we-learned/</loc>
		<lastmod>2018-09-25T15:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/threat-stack-announces-general-availability-of-its-docker-containerized-agent/</loc>
		<lastmod>2018-09-25T16:09:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/venafi-study-how-successfully-are-federal-agencies-responding-to-bod-18-01/</loc>
		<lastmod>2018-09-25T16:21:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/extrahop-to-bring-enterprise-network-traffic-analysis-to-the-cloud-through-microsoft-azure/</loc>
		<lastmod>2018-09-25T16:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-holiday-shopping-surge-is-going-global-how-to-keep-up-and-cash-in/</loc>
		<lastmod>2018-09-25T17:48:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mobile-matters-how-to-ready-your-apps-for-the-holiday-shopping-spike/</loc>
		<lastmod>2018-09-25T17:51:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-rachel-giacobozzis-the-hybrid-analyst-how-phishing-created-a-new-type-of-intel-analyst/</loc>
		<lastmod>2018-09-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/130-million-hotel-customers-breached-due-to-exposed-database/</loc>
		<lastmod>2018-09-25T18:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/fortinet-again-recognized-as-leader-in-gartners-2018-utm-mq-report/</loc>
		<lastmod>2018-09-25T18:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/fortinet-recognized-by-gartner-as-a-leader-in-utm-mq/</loc>
		<lastmod>2018-09-25T18:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ssl-vs-website-security/</loc>
		<lastmod>2018-09-25T20:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-6-6-time/</loc>
		<lastmod>2018-09-25T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/fuzzing-bitcoin-with-the-defensics-sdk-part-2-fuzz-the-bitcoin-protocol/</loc>
		<lastmod>2018-09-25T21:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/porous-portals-newegg-is-a-broken-egg-and-mirais-creators-have-new-hats/</loc>
		<lastmod>2018-09-25T21:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/managing-app-permissions-how-to-guide-for-android-phones-avast/</loc>
		<lastmod>2018-09-25T23:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-sql-injections-are-the-cockroaches-of-the-appsec-world-and-how-cisos-can-eradicate-them-once-and-for-all/</loc>
		<lastmod>2018-09-26T02:43:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/malware-in-the-cloud-what-you-need-to-know/</loc>
		<lastmod>2018-09-26T03:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/death-taxes-and-compliance-updates-an-update-to-nist-800-171/</loc>
		<lastmod>2018-09-26T03:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/malware-steals-passwords-from-6-4-million-shein-customers/</loc>
		<lastmod>2018-09-26T07:31:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-artificial-intelligence-is-key-to-combating-new-and-advanced-threats/</loc>
		<lastmod>2018-09-26T07:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/windows-file-server-auditing-with-fileaudit/</loc>
		<lastmod>2018-09-26T08:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hide-and-seek-iot-botnet-learns-new-tricks-uses-adb-over-internet-to-exploit-thousands-of-android-devices/</loc>
		<lastmod>2018-09-26T08:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/effortless-security-feature-detection-with-winchecksec/</loc>
		<lastmod>2018-09-26T10:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/former-nsa-employee-gets-5-years-in-prison-for-retaining-classified-data/</loc>
		<lastmod>2018-09-26T11:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/four-roads-to-securing-sd-wan-deep-dive-at-the-sd-wan-summit-2018-paris/</loc>
		<lastmod>2018-09-26T12:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-msp-guide-to-building-your-managed-security-services-pricing-strategies-avast-business/</loc>
		<lastmod>2018-09-26T13:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/best-practices-for-choosing-an-endpoint-detection-and-response-edr-solution/</loc>
		<lastmod>2018-09-26T13:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/att-summit-day-1/</loc>
		<lastmod>2018-09-26T13:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/wydens-warning-winter-is-coming/</loc>
		<lastmod>2018-09-26T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-importance-of-key-management-when-implementing-a-secure-information-gateway/</loc>
		<lastmod>2018-09-26T14:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/50-useful-docker-tutorials-for-it-professionals-from-beginner-to-advanced/</loc>
		<lastmod>2018-09-26T14:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/shiftleft-for-net/</loc>
		<lastmod>2018-09-26T15:01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/protecting-sensitive-data-the-death-of-an-smb/</loc>
		<lastmod>2018-09-26T15:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-mfa-on-pexa-property-exchange-australia-leaves-security-concerns/</loc>
		<lastmod>2018-09-26T15:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/look-ma-no-passwords-how-why-blackfish-uses-bloom-filters/</loc>
		<lastmod>2018-09-26T15:32:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/puresec-initiates-industrys-first-owasp-top-10-project-for-cloud-native-application-security/</loc>
		<lastmod>2018-09-26T15:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-worlds-most-popular-coding-language-happens-to-be-most-hackers-weapon-of-choice/</loc>
		<lastmod>2018-09-26T16:18:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-and-why-business-is-migrating-to-the-cloud/</loc>
		<lastmod>2018-09-26T16:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/five-eyes-groups-calls-for-encryption-back-doors-is-a-shot-across-tech-industrys-bow/</loc>
		<lastmod>2018-09-26T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/vpnfilter-update-new-attack-modules-documented/</loc>
		<lastmod>2018-09-26T17:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-dragnet-truman-kains-your-social-engineering-sidekick/</loc>
		<lastmod>2018-09-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hypervisor-security-presentation-by-ian-pratt/</loc>
		<lastmod>2018-09-26T18:50:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ease-me-into-cryptography-part-1-buzzwords-and-hash-function/</loc>
		<lastmod>2018-09-26T19:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/luke-kingma-and-lou-patrick-mackays-futurism-halp/</loc>
		<lastmod>2018-09-26T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/webinar-static-analysis-helps-devops-teams-maintain-velocity-securely/</loc>
		<lastmod>2018-09-26T22:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/tripwire-patch-priority-index-for-september-2018/</loc>
		<lastmod>2018-09-26T23:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/venafi-retail-research-will-holiday-shoppers-be-duped-by-look-alike-domains/</loc>
		<lastmod>2018-09-27T03:43:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ics-cybersecurity-visibility-protective-controls-continuous-monitoring-wash-rinse-repeat/</loc>
		<lastmod>2018-09-27T04:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-to-do-and-what-to-avoid-when-implementing-security-in-the-devops-lifecycle/</loc>
		<lastmod>2018-09-27T04:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/iots-security-needs-point-to-an-increased-role-for-pki/</loc>
		<lastmod>2018-09-27T07:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-gdpr-is-prompting-renovation-of-data-protection-practices-worldwide/</loc>
		<lastmod>2018-09-27T08:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/new-torii-botnet-uncovered-more-sophisticated-than-mirai-avast/</loc>
		<lastmod>2018-09-27T10:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/malcare-wordpress-site-security-service-reviewed-2/</loc>
		<lastmod>2018-09-27T11:04:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ssd-advisory-irda-linux-driver-uaf/</loc>
		<lastmod>2018-09-27T11:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-is-the-internet-of-things/</loc>
		<lastmod>2018-09-27T12:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/defending-our-digital-homeland-preventive-control-is-only-the-beginning/</loc>
		<lastmod>2018-09-27T12:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-case-for-the-business-benefits-behind-biometrics-is-growing/</loc>
		<lastmod>2018-09-27T12:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/stopping-threats-in-real-time-with-bromium-application-isolation/</loc>
		<lastmod>2018-09-27T13:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/new-torii-botnets-sophisticated-techniques-set-it-apart-from-mirai/</loc>
		<lastmod>2018-09-27T13:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-futures-dueling-interwebs-the-sino-american-bifurcation/</loc>
		<lastmod>2018-09-27T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/top-4-questions-to-ask-about-compliance-security-and-containers/</loc>
		<lastmod>2018-09-27T14:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/att-business-summit-day-2/</loc>
		<lastmod>2018-09-27T14:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/2018-payment-security-report-whats-new/</loc>
		<lastmod>2018-09-27T14:42:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/making-an-impact-with-security-awareness-training-quick-wins-and-sustained-impact/</loc>
		<lastmod>2018-09-27T14:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-challenges-related-to-containers/</loc>
		<lastmod>2018-09-27T14:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/three-security-lessons-to-keep-in-mind-leading-up-to-the-r-cisc-summit/</loc>
		<lastmod>2018-09-27T14:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hacking-security-episode-2-the-4-ciso-tribes/</loc>
		<lastmod>2018-09-27T14:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/open-source-security-risk-managing-the-threat-in-mergers-and-acquisitions/</loc>
		<lastmod>2018-09-27T14:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/optimizing-multi-cloud-cross-dc-web-apps-and-sites/</loc>
		<lastmod>2018-09-27T14:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/apache-struts-rces-and-the-equifax-breach-anniversary/</loc>
		<lastmod>2018-09-27T14:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/celebrate-cyber-security-awareness-month-with-free-training-resources/</loc>
		<lastmod>2018-09-27T15:43:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/decrypting-dharma-ransomware-a-complicated-recovery-process/</loc>
		<lastmod>2018-09-27T15:57:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/inner-circle-podcast-episode-013-den-jones-explains-project-zen/</loc>
		<lastmod>2018-09-27T16:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-social-media-can-cost-you-thousands-of-dollars/</loc>
		<lastmod>2018-09-27T16:54:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-you-shouldnt-trust-safe-spying-apps/</loc>
		<lastmod>2018-09-27T17:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-tomasz-banias-intelligence-creating-intelligence-leveraging-what-you-know-to-improve-finding-what-you-dont/</loc>
		<lastmod>2018-09-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-your-data-protection-officer-should-know-about-privacy-requirements/</loc>
		<lastmod>2018-09-27T18:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-should-a-security-manager-know-about-us-and-uk-privacy-laws/</loc>
		<lastmod>2018-09-27T18:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-devops-need-penetration-testing/</loc>
		<lastmod>2018-09-27T19:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/do-security-managers-need-an-iapp-certificate/</loc>
		<lastmod>2018-09-27T19:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/tcg-and-members-mocana-and-wibu-systems-will-demonstrate-iot-security-at-iot-solutions-world-congress-october-16-18-2018/</loc>
		<lastmod>2018-09-27T20:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/secret-service-warns-of-surge-in-atm-wiretapping-attacks/</loc>
		<lastmod>2018-09-27T20:45:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-bad-opinions/</loc>
		<lastmod>2018-09-27T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ccsp-certification-overview-and-career-path/</loc>
		<lastmod>2018-09-27T21:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ccsp-exam-details-and-process/</loc>
		<lastmod>2018-09-27T22:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-become-ccsp-certified-certification-requirements/</loc>
		<lastmod>2018-09-27T22:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ccsp-overview-of-domains/</loc>
		<lastmod>2018-09-27T22:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/apple-joins-google-in-requiring-certificate-transparency/</loc>
		<lastmod>2018-09-27T22:38:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/network-certification-overview-and-career-path/</loc>
		<lastmod>2018-09-27T23:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ccsp-study-resources/</loc>
		<lastmod>2018-09-27T23:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/earning-ccsp-cpe-credits/</loc>
		<lastmod>2018-09-27T23:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/maintaining-your-ccsp-certification-renewal-requirements/</loc>
		<lastmod>2018-09-27T23:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/dynamic-provisioning-workflow-classification-regression-tree/</loc>
		<lastmod>2018-09-28T00:19:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/job-outlook-for-network-cert-holders/</loc>
		<lastmod>2018-09-28T04:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-become-network-certified-certification-requirements/</loc>
		<lastmod>2018-09-28T04:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/network-overview-of-domains/</loc>
		<lastmod>2018-09-28T04:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/magecart-campaign-remains-active-2/</loc>
		<lastmod>2018-09-28T07:21:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-financial-institutions-are-leading-the-charge-to-upskill-their-developers-in-secure-coding/</loc>
		<lastmod>2018-09-28T07:59:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/port-of-san-diego-suffers-ransomware-attack/</loc>
		<lastmod>2018-09-28T11:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/turn-the-tables-on-your-attackers-with-deception-technology-cyberspeak-podcast/</loc>
		<lastmod>2018-09-28T11:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cloud-security-budgets-increase-substantially-in-2018-as-cisos-recognize-the-dangers-out-there/</loc>
		<lastmod>2018-09-28T11:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/quick-hit-using-the-new-equal-earth-projection-in-r/</loc>
		<lastmod>2018-09-28T12:08:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-increased-ehr-accessibility-means-for-cybersecurity/</loc>
		<lastmod>2018-09-28T13:13:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/australian-teen-who-hacked-into-apple-and-stole-90-gb-of-files-avoids-jail/</loc>
		<lastmod>2018-09-28T13:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/french-release-secure-os-to-open-source-community/</loc>
		<lastmod>2018-09-28T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/iast-defined-plus-how-it-is-impacting-business-critical-software/</loc>
		<lastmod>2018-09-28T14:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/zuckerbergs-facebook-page-ill-livestream-its-deletion-says-hacker/</loc>
		<lastmod>2018-09-28T14:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/my-take-the-many-ways-social-media-is-leveraged-to-spread-malware-manipulate-elections/</loc>
		<lastmod>2018-09-28T14:49:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/quick-tips-you-can-use-to-improve-your-sales-technique/</loc>
		<lastmod>2018-09-28T15:39:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hackerhalloween/</loc>
		<lastmod>2018-09-28T16:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-top-skills-of-fortune-100-cisos/</loc>
		<lastmod>2018-09-28T17:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/engineering-trustworthy-systems-get-cybersecurity-design-right-the-first-time/</loc>
		<lastmod>2018-09-28T17:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/facebookery-at-its-finest-the-fifty-million-caper/</loc>
		<lastmod>2018-09-28T17:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/7-new-modules-for-vpnfilter-malware-hide-seek-botnet-targets-android-and-house-oversight-takes-on-ai-avast/</loc>
		<lastmod>2018-09-28T17:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-joshua-naga-crumbaughs-guaranteed-failure-awareness-the-greatest-cyber-insanity/</loc>
		<lastmod>2018-09-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-can-malware-target-your-organization/</loc>
		<lastmod>2018-09-28T18:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/this-weeks-roundup/</loc>
		<lastmod>2018-09-28T19:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/facebook-security-bug-affects-90m-users/</loc>
		<lastmod>2018-09-28T19:36:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/can-we-have-ndr-please/</loc>
		<lastmod>2018-09-28T20:06:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/insecure-code-cited-in-facebook-hack-impacting-nearly-50-million-users/</loc>
		<lastmod>2018-09-28T20:27:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-earn-pmp-pdu-credits/</loc>
		<lastmod>2018-09-28T20:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-awareness-training-for-small-business/</loc>
		<lastmod>2018-09-28T20:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/15-ways-to-secure-your-business-wi-fi/</loc>
		<lastmod>2018-09-28T20:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-iot-security-skills-gap/</loc>
		<lastmod>2018-09-28T20:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-an-effective-security-awareness-program-needs-security-champions-in-your-organization/</loc>
		<lastmod>2018-09-28T20:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/missed-gdpr-deadline-6-steps-you-need-to-take-right-now/</loc>
		<lastmod>2018-09-28T20:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/container-security-part-3-kubernetes-cheat-sheet/</loc>
		<lastmod>2018-09-28T20:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/facebook-discloses-data-breach-50-million-user-accounts-affected/</loc>
		<lastmod>2018-09-28T20:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-joy-of-techs-instagrams-founders-leave/</loc>
		<lastmod>2018-09-28T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/facebook-leaks-data-including-private-conversations-from-50-million-accounts/</loc>
		<lastmod>2018-09-28T21:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/pci-for-smb-requirement-7-8-implement-strong-access-control-measures/</loc>
		<lastmod>2018-09-28T21:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/port-of-san-diego-suffers-ransomware-attack-avast/</loc>
		<lastmod>2018-09-28T21:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/if-it-happened-to-facebook/</loc>
		<lastmod>2018-09-28T21:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cve-2018-11776-rce-flaw-in-apache-struts-could-be-root-cause-of-clamorous-hacks/</loc>
		<lastmod>2018-09-28T21:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-use-biometrics-in-logical-access-entry/</loc>
		<lastmod>2018-09-28T21:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/biometrics-in-the-cloud/</loc>
		<lastmod>2018-09-28T21:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/network-exam-details-and-process/</loc>
		<lastmod>2018-09-28T21:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mini-pwning-with-gl-inet-ar150/</loc>
		<lastmod>2018-09-28T22:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/facebook-security-breach-what-should-you-do-avast/</loc>
		<lastmod>2018-09-28T22:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/goldeneye-1-ctf-walkthrough-part-1/</loc>
		<lastmod>2018-09-28T23:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/wakanda1-ctf-walkthrough/</loc>
		<lastmod>2018-09-28T23:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/mdm-brute-forced/</loc>
		<lastmod>2018-09-29T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-derek-milroys-threat-modeling-how-to-actually-do-it-and-make-it-useful/</loc>
		<lastmod>2018-09-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/xkcd-stanislav-petrov-day/</loc>
		<lastmod>2018-09-29T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/things-get-seriously-insecure-yet-again-for-facebook/</loc>
		<lastmod>2018-09-29T22:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/long-term-security-attitudes-and-practices-study/</loc>
		<lastmod>2018-09-29T23:27:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-matt-reids-structuring-your-incident-response-could-be-one-of-the-most-important-things-you-do-to-bolster-security/</loc>
		<lastmod>2018-09-30T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/robert-m-lee-and-jeff-hass-little-bobby-comics-polling/</loc>
		<lastmod>2018-09-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/grrcon-augusta-2018-james-oneills-how-this-20-year-old-changed-the-security-industry/</loc>
		<lastmod>2018-09-30T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/pci-dss-basics/</loc>
		<lastmod>2018-10-01T01:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/facebooks-fake-account-crackdown-privacy-upgrade-to-https-new-security-features-in-apple-ios-12-wb36/</loc>
		<lastmod>2018-10-01T04:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-your-soc-needs-more-than-a-siem-tool/</loc>
		<lastmod>2018-10-01T04:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/machine-learning-helps-it-and-security-leaders-stay-ahead-of-cyber-threats/</loc>
		<lastmod>2018-10-01T09:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/facebook-faces-a-whopping-e1-4-billion-penalty-under-gdpr-for-sept-30-data-breach/</loc>
		<lastmod>2018-10-01T09:37:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/telegram-not-really-anonymous-researcher-reports-bug-that-leaks-ip-addresses/</loc>
		<lastmod>2018-10-01T10:49:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/practice-cybersecurity-every-day-not-just-october/</loc>
		<lastmod>2018-10-01T11:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/tesco-bank-fined-16-4-million-for-2016-digital-attack/</loc>
		<lastmod>2018-10-01T11:44:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/backing-up-saas-apps-native-saas-or-draas/</loc>
		<lastmod>2018-10-01T12:13:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/a-brief-introduction-to-mfa/</loc>
		<lastmod>2018-10-01T12:53:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/renewable-security-steps-to-save-the-cyber-security-planet/</loc>
		<lastmod>2018-10-01T12:54:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/vigilant-streamlines-iso-27001-risk-assessments-with-vsrisk-cloud/</loc>
		<lastmod>2018-10-01T13:21:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/se-labs-introducing-cyber-security-to-schools/</loc>
		<lastmod>2018-10-01T13:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cyber-hygiene-practices-that-can-make-a-difference/</loc>
		<lastmod>2018-10-01T13:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/dod-rmf-part-1-how-we-got-to-the-rmf/</loc>
		<lastmod>2018-10-01T13:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/done-with-chrome/</loc>
		<lastmod>2018-10-01T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/voice-phishing-scams-are-getting-more-clever/</loc>
		<lastmod>2018-10-01T14:02:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/digital-signatures-making-e-procurements-safer/</loc>
		<lastmod>2018-10-01T14:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/scammers-target-google-chrome-extension-developers/</loc>
		<lastmod>2018-10-01T14:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybersecurity-professionals-path-to-job-security/</loc>
		<lastmod>2018-10-01T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-safeguard-the-nations-critical-infrastructure-using-proper-security-measures/</loc>
		<lastmod>2018-10-01T15:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-is-everyones-responsibility-in-the-organization/</loc>
		<lastmod>2018-10-01T15:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/a-family-affair-protecting-your-home-networks-devices/</loc>
		<lastmod>2018-10-01T15:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/national-cybersecurity-awareness-month-sweepstakes/</loc>
		<lastmod>2018-10-01T15:01:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/protecting-your-industrial-operations-with-top-floor-to-shop-floor-visibility/</loc>
		<lastmod>2018-10-01T15:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/week-39-cyberattack-digest-2018-shein-facebook-tesco-and-others/</loc>
		<lastmod>2018-10-01T15:59:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/will-internet-connected-medical-devices-replace-humans/</loc>
		<lastmod>2018-10-01T16:36:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/15-years-of-national-cyber-security-awareness-month/</loc>
		<lastmod>2018-10-01T16:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/smishing-anyone/</loc>
		<lastmod>2018-10-01T17:54:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-joel-cardellas-stop-boiling-the-ocean-how-to-succeed-with-small-gains/</loc>
		<lastmod>2018-10-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/tcg-members-mocana-and-wibu-systems-to-demonstrate-iot-security-at-iot-solutions-world-congress/</loc>
		<lastmod>2018-10-01T18:13:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/10-1-18-dtex-insider-threat-privacy-news-welcome-to-cybersecurity-awareness-month-ceo-christy-wyatt-reveals-trusted-insider-strategy-provides-how-to-for-insider-negligence-five-years-post-snowd/</loc>
		<lastmod>2018-10-01T18:47:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/october-cybersecurity-month/</loc>
		<lastmod>2018-10-01T20:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-incoming-calls/</loc>
		<lastmod>2018-10-01T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cyber-security-roundup-for-september-2018/</loc>
		<lastmod>2018-10-01T21:20:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/turn-on-multifactor-authentication-ncsam-at-synopsys/</loc>
		<lastmod>2018-10-01T21:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cve-2018-11776-and-why-you-need-black-duck-security-advisories/</loc>
		<lastmod>2018-10-01T21:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-diet-pill-security-model/</loc>
		<lastmod>2018-10-01T23:47:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-do-you-establish-credibility/</loc>
		<lastmod>2018-10-02T00:24:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/aci-research-shows-5-out-of-6-routers-at-risk-avast/</loc>
		<lastmod>2018-10-02T04:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/mssp-vs-msp-what-a-missing-s-could-mean-for-your-company/</loc>
		<lastmod>2018-10-02T05:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybersecurity-awareness-month-blog-series-leading-the-cybersecurity-jobs-of-the-future/</loc>
		<lastmod>2018-10-02T07:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-do-culture-and-morale-impact-roi-for-a-security-operations-center/</loc>
		<lastmod>2018-10-02T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/site-reliability-engineering-from-devops-to-noops/</loc>
		<lastmod>2018-10-02T08:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/azure-ad-connect-confirmation/</loc>
		<lastmod>2018-10-02T08:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/seven-signs-of-a-strong-security-culture/</loc>
		<lastmod>2018-10-02T08:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/better-web-pentesting-in-windows-with-ahk/</loc>
		<lastmod>2018-10-02T08:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/pony-a-breakdown-of-the-most-popular-malware-in-credential-theft/</loc>
		<lastmod>2018-10-02T08:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/visit-us-at-owasp-appsec-usa-2018/</loc>
		<lastmod>2018-10-02T08:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/fruitfly-mac-malware-creator-used-it-to-spy-on-minors-fbi-discloses-technique/</loc>
		<lastmod>2018-10-02T10:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ssd-advisory-android-printing-man-in-the-middle-attack/</loc>
		<lastmod>2018-10-02T11:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/researchers-use-android-password-managers-to-make-phishing-attacks-more-practical/</loc>
		<lastmod>2018-10-02T12:43:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/even-with-the-latest-ios-12-update-your-iphones-lockscreen-is-unsafe/</loc>
		<lastmod>2018-10-02T13:11:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/strengthen-your-security-with-avast-password-generator-avast/</loc>
		<lastmod>2018-10-02T13:43:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-msp-guide-to-vertical-market-success-spotlight-on-healthcare-avast-business/</loc>
		<lastmod>2018-10-02T13:43:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-fix-is-in-clodflares-esni/</loc>
		<lastmod>2018-10-02T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/infographic-bsimm9-by-the-numbers/</loc>
		<lastmod>2018-10-02T14:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bsimm9-hot-off-the-presses-and-better-than-ever/</loc>
		<lastmod>2018-10-02T14:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ransomware-attacks-via-rdp-on-the-rise-avast/</loc>
		<lastmod>2018-10-02T15:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/iot-botnets-on-the-rise/</loc>
		<lastmod>2018-10-02T15:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/postcards-really-dental-service-organizations-and-patient-engagement/</loc>
		<lastmod>2018-10-02T16:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/are-extended-validation-ev-certificates-end-of-life/</loc>
		<lastmod>2018-10-02T17:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/tcg-announces-two-new-open-source-credentialing-tools-for-trusted-supply-chain/</loc>
		<lastmod>2018-10-02T17:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/peer2peer-sessions-maximizing-value-submission-tips-and-more/</loc>
		<lastmod>2018-10-02T17:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/leveraging-segmentation-to-secure-iot/</loc>
		<lastmod>2018-10-02T17:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-ken-donzes-do-i-have-a-signature-to-detect-that-malware/</loc>
		<lastmod>2018-10-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-secops-ebook-for-cloud-infrastructure-a-practitioners-guide-for-security-ops-teams/</loc>
		<lastmod>2018-10-02T18:19:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/attackers-have-compressed-and-accelerated-the-cyber-killchain/</loc>
		<lastmod>2018-10-02T18:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/following-a-trail-of-confusion-powershell-in-malicious-office-documents/</loc>
		<lastmod>2018-10-02T18:40:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/danabot-observed-in-large-campaign-targeting-u-s-organizations/</loc>
		<lastmod>2018-10-02T20:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-joy-of-techs-parental-controls/</loc>
		<lastmod>2018-10-02T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/optimizing-soc-with-tufin-swimlanes-soar-platform/</loc>
		<lastmod>2018-10-02T21:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/webinar-breaking-into-it-from-first-job-to-advanced-certs-with-comptia-2/</loc>
		<lastmod>2018-10-02T21:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/new-national-cyber-strategy-message-deterrence-through-u-s-strength/</loc>
		<lastmod>2018-10-02T22:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/when-security-researchers-pose-as-cybercrooks-who-can-tell-the-difference/</loc>
		<lastmod>2018-10-02T23:42:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/open-season-on-open-source-infinite-campus-limited-by-ddos-and-mojaves-a-bad-apple/</loc>
		<lastmod>2018-10-02T23:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/fakespy-comes-back-new-wave-hits-japan/</loc>
		<lastmod>2018-10-03T02:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-verizon-phidbr-a-wake-up-call-for-healthcare-organizations/</loc>
		<lastmod>2018-10-03T03:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/women-in-information-security-pam-armstrong/</loc>
		<lastmod>2018-10-03T03:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-protect-your-website-against-a-cross-site-scripting-xss-attack/</loc>
		<lastmod>2018-10-03T08:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/half-of-businesses-have-yet-to-take-control-of-password-security-technology-sector-leads-the-pack/</loc>
		<lastmod>2018-10-03T09:29:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/are-your-applications-secure/</loc>
		<lastmod>2018-10-03T10:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/prepare-for-psd2-understanding-the-opportunities-and-digital-risks/</loc>
		<lastmod>2018-10-03T10:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ransomware-operators-breach-40-000-records-from-fetal-diagnostic-institute-of-the-pacific/</loc>
		<lastmod>2018-10-03T11:09:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/force-strong-passwords-on-users-to-improve-wordpress-security-2/</loc>
		<lastmod>2018-10-03T11:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/sophisticated-voice-phishing-scams/</loc>
		<lastmod>2018-10-03T12:03:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/modern-insider-threat-management-machine-learning-as-a-non-negotiable/</loc>
		<lastmod>2018-10-03T12:05:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/hacker-defacing-11000-us-websites-faces-10-years-behind-bars/</loc>
		<lastmod>2018-10-03T12:05:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/terahertz-millimeter-wave-scanners/</loc>
		<lastmod>2018-10-03T12:11:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/network-outage-at-some-recipe-unlimited-locations-caused-by-malware/</loc>
		<lastmod>2018-10-03T12:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/talking-serverless-and-aws-lambda-security-with-jeff-forristal/</loc>
		<lastmod>2018-10-03T13:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-industry-guidelines-for-domain-verification-promote-a-safer-internet/</loc>
		<lastmod>2018-10-03T13:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/accelerating-your-zero-trust-security-transformation-with-enterprise-threat-protector/</loc>
		<lastmod>2018-10-03T13:42:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/avast-business-invites-you-to-security-master-course-avast-business/</loc>
		<lastmod>2018-10-03T13:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/prc-stealing-intellectual-property-despite-agreements/</loc>
		<lastmod>2018-10-03T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/data-protection-compliance-to-take-center-stage-at-gitex-2018/</loc>
		<lastmod>2018-10-03T14:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/september-2018-update-for-netsparker-enterprise/</loc>
		<lastmod>2018-10-03T14:25:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-secops-processes-to-try-today/</loc>
		<lastmod>2018-10-03T14:53:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/making-security-hygiene-a-priority/</loc>
		<lastmod>2018-10-03T14:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/funding-news-hysolate-cybersecurity-18m-b-round-solves-security-vs-productivity-problem/</loc>
		<lastmod>2018-10-03T15:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/webinar-effective-policies-for-managing-and-releasing-open-source-software/</loc>
		<lastmod>2018-10-03T15:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-integrate-cloud-security-into-your-ssi/</loc>
		<lastmod>2018-10-03T15:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/keeping-the-cyber-strangers-in-your-house-at-bay/</loc>
		<lastmod>2018-10-03T16:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-secure-are-the-browser-extensions-you-create/</loc>
		<lastmod>2018-10-03T16:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/video-basics-of-iot-hacking-for-the-career-pen-tester/</loc>
		<lastmod>2018-10-03T16:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/webinar-get-started-in-cybersecurity-beginner-tips-certifications-and-career-paths/</loc>
		<lastmod>2018-10-03T16:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/instagram-accounts-frozen-with-ransomware-avast/</loc>
		<lastmod>2018-10-03T16:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-bill-lampes-siem-trends-what-is-my-mean-time-ro-value/</loc>
		<lastmod>2018-10-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/from-my-gartner-blog-endpoint-has-won-why-bother-with-nta/</loc>
		<lastmod>2018-10-03T19:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/owasp-top-10-security-risks-part-i/</loc>
		<lastmod>2018-10-03T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-effects-of-gdprs-72-hour-notification-rule/</loc>
		<lastmod>2018-10-03T20:24:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/why-governments-should-be-wary-of-encryption-backdoors/</loc>
		<lastmod>2018-10-03T20:30:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/luke-kingma-and-lou-patrick-mackays-futurism-church-of-the-wacky-waving-inflatable-arm-flailing-tube-man/</loc>
		<lastmod>2018-10-03T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/news-update-october-3rd/</loc>
		<lastmod>2018-10-03T21:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/a-practical-guide-to-ccpa-for-u-s-businesses/</loc>
		<lastmod>2018-10-04T03:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ssd-advisory-cisco-prime-infrastructure-file-inclusion-and-remote-command-execution-to-privileges-escalation/</loc>
		<lastmod>2018-10-04T05:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/full-steam-ahead-for-emvco-and-partners-in-the-fight-against-online-commerce-fraud/</loc>
		<lastmod>2018-10-04T07:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/2018-state-of-devops-great-for-security/</loc>
		<lastmod>2018-10-04T08:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ethereum-security-guidance-for-all/</loc>
		<lastmod>2018-10-04T10:50:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/intel-management-mode-apple-didnt-lock/</loc>
		<lastmod>2018-10-04T10:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/canada-advances-cybersecurity-strategy-to-fend-off-nation-state-attacks/</loc>
		<lastmod>2018-10-04T11:27:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ge-power-selects-nozomi-networks-for-advanced-ics-cyber-security/</loc>
		<lastmod>2018-10-04T12:45:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/tech-companies-unite-against-australias-encrypted-data-demands/</loc>
		<lastmod>2018-10-04T12:10:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/experts-speak-out-managing-digital-risk-during-ncsam-and-beyond/</loc>
		<lastmod>2018-10-04T12:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/criminals-holding-hijacked-instagram-influencers-accounts-for-ransom/</loc>
		<lastmod>2018-10-04T12:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/research-report-evaluates-osquerys-role-in-upending-endpoint-security-complimentary-copy/</loc>
		<lastmod>2018-10-04T13:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/addressing-your-customers-iot-risks-with-fortinac/</loc>
		<lastmod>2018-10-04T13:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/stearing-clear-of-sso/</loc>
		<lastmod>2018-10-04T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/puresec-7m-series-a-thanks-to-our-community/</loc>
		<lastmod>2018-10-04T14:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/go-live-addressable-ad-supported-live-video-at-scale/</loc>
		<lastmod>2018-10-04T14:23:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/analyzing-impact-of-www-subdomain-on-cookie-security/</loc>
		<lastmod>2018-10-04T14:26:40+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->