<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2018/10/the-origin-of-ransomware-and-its-impact-on-businesses/</loc>
		<lastmod>2018-10-04T15:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-sony-smart-tv-exploit-an-inside-view-of-hijacking-your-living-room/</loc>
		<lastmod>2018-10-04T15:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/securing-apps-when-user-devices-are-compromised/</loc>
		<lastmod>2018-10-04T16:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/avast-av-reclassifies-cryptominers-avast/</loc>
		<lastmod>2018-10-04T16:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/tcg-and-members-offer-new-ways-to-secure-supply-chain/</loc>
		<lastmod>2018-10-04T17:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/eliminating-the-pain-of-certificate-reissue-renewal-and-revocation/</loc>
		<lastmod>2018-10-04T17:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-jared-phipps-advanced-attackers-hiding-inside-encrypted-traffic-at-the-endpoint/</loc>
		<lastmod>2018-10-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/time-to-eliminate-traditional-vpns/</loc>
		<lastmod>2018-10-04T18:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/container-security-winter-is-coming-dress-in-layers/</loc>
		<lastmod>2018-10-04T18:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/identify-outlier-access-with-clustering-and-k-means/</loc>
		<lastmod>2018-10-04T18:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/notes-on-the-bloomberg-supermicro-supply-chain-hack-story/</loc>
		<lastmod>2018-10-04T19:53:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/hostile-by-definition-thoughts-on-zero-trust-security-and-its-pitfalls-part-1/</loc>
		<lastmod>2018-10-04T20:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-data-pipeline/</loc>
		<lastmod>2018-10-04T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/webinar-cloud-devsecops-with-synopsys-and-aws/</loc>
		<lastmod>2018-10-04T22:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/wibu-systems-presents-the-latest-industrie-4-0-technology-advances-at-the-iot-solutions-world-congress/</loc>
		<lastmod>2018-10-04T22:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/net-neutrality-regulation-does-the-past-predict-the-future/</loc>
		<lastmod>2018-10-05T03:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/preventing-your-webservers-from-becoming-phishing-sites-eliminate-wildcard-certificates/</loc>
		<lastmod>2018-10-05T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-stakes-are-high-for-data-breaches-most-organizations-believe-hackers-can-penetrate-their-network/</loc>
		<lastmod>2018-10-05T08:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-spot-good-fuzzing-research/</loc>
		<lastmod>2018-10-05T10:50:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cisco-patches-critical-flaws-in-dna-center-and-prime-infrastructure/</loc>
		<lastmod>2018-10-05T12:15:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/hackers-fly-under-the-radar-for-two-years-after-infecting-chiropractic-clinic-with-malware/</loc>
		<lastmod>2018-10-05T13:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bec-as-a-service-offers-hacked-business-accounts-for-as-little-as-150/</loc>
		<lastmod>2018-10-05T13:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cologne-based-edvxpert-gmbh-chooses-managed-workplace-after-competitive-analysis-avast-business/</loc>
		<lastmod>2018-10-05T13:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/a-new-way-in-the-cloudflare-ipfs-gambit/</loc>
		<lastmod>2018-10-05T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/java-crypto-libraries-go-modular/</loc>
		<lastmod>2018-10-05T14:12:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/defending-against-and-recovering-from-ransomware-cyberspeak-podcast/</loc>
		<lastmod>2018-10-05T14:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/experian-helps-companies-improve-data-breach-preparedness-efforts/</loc>
		<lastmod>2018-10-05T14:24:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/puresec-raises-7-million-to-protect-serverless-applications/</loc>
		<lastmod>2018-10-05T14:39:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/PureSecTeam_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/gosh-darn-policy-requirements/</loc>
		<lastmod>2018-10-05T15:53:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/trojans-go-after-ms-office-vulnerabilities-and-china-hacks-us-hardware/</loc>
		<lastmod>2018-10-05T17:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/zero-trust-security-architectures-network-micro-segmentation/</loc>
		<lastmod>2018-10-05T17:43:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/zero-trust-security-architectures/</loc>
		<lastmod>2018-10-05T17:46:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/zero-trust-security-architectures-software-defined-perimeter/</loc>
		<lastmod>2018-10-05T17:49:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/zero-trust-security-architectures-identity-aware-proxy/</loc>
		<lastmod>2018-10-05T17:50:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-jeff-mans-more-tales-from-the-crypt-analyst/</loc>
		<lastmod>2018-10-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/zero-trust-security-architectures-akamais-approach/</loc>
		<lastmod>2018-10-05T18:10:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/7-practical-online-safety-tips-anyone-can-follow-at-home/</loc>
		<lastmod>2018-10-05T19:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/supply-chain-hacking-bull-in-a-china-shop/</loc>
		<lastmod>2018-10-05T19:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it/</loc>
		<lastmod>2018-10-05T19:45:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/wiretapping/</loc>
		<lastmod>2018-10-05T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/connected-device-security-bill-becomes-law-in-california/</loc>
		<lastmod>2018-10-05T21:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ransomware-recovery-at-the-taxpayers-expense/</loc>
		<lastmod>2018-10-05T21:56:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/what-is-a-network-ids-and-why-do-you-need-it/</loc>
		<lastmod>2018-10-06T03:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/msp-networks-actively-targeted-by-nation-sate-apts-us-government-warns/</loc>
		<lastmod>2018-10-06T07:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/securing-the-enterprise-at-the-iot-solutions-world-congress/</loc>
		<lastmod>2018-10-06T14:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-whitney-phillips-my-first-year-in-application-security/</loc>
		<lastmod>2018-10-06T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/quicktip-howto-secure-your-mikrotik-routeros-router-and-specially-winbox/</loc>
		<lastmod>2018-10-06T15:50:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/android-sms-worm-plus-setting-up-a-mac-for-kids/</loc>
		<lastmod>2018-10-06T17:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-bluetooth/</loc>
		<lastmod>2018-10-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-chris-burrows-career-risk-management-10-tips-to-keep-you-employed/</loc>
		<lastmod>2018-10-06T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/shield-your-home-from-spies-ncsam-at-synopsys/</loc>
		<lastmod>2018-10-06T23:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-aaron-herndon-thomas-somervilles-red-vs-blue-the-untold-chapter/</loc>
		<lastmod>2018-10-07T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/read-how-to-build-resilient-cloud-configuration-shields/</loc>
		<lastmod>2018-10-07T18:49:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-joy-of-techs-selfies-can-kill/</loc>
		<lastmod>2018-10-07T20:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-michael-morgese-saving-all-the-money-to-buy-all-the-booze-learning-to-hack-all-the-things-on-a-budget/</loc>
		<lastmod>2018-10-07T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/top-siem-use-case-examples/</loc>
		<lastmod>2018-10-07T23:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/chinese-spying-facebook-shadow-contact-information-iphone-x-faceid-privacy-wb37/</loc>
		<lastmod>2018-10-08T04:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/canadian-thanksgiving-canadien-action-de-grace/</loc>
		<lastmod>2018-10-08T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/hacking-law-firms-with-abandoned-domain-names/</loc>
		<lastmod>2018-10-08T09:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/hhs-urges-fda-to-do-more-on-medical-device-security/</loc>
		<lastmod>2018-10-08T09:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/contact-atlantic-2018/</loc>
		<lastmod>2018-10-08T09:57:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/global-piracy-report-q3/</loc>
		<lastmod>2018-10-08T13:29:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bindweed-digging-down-to-a-root-of-a-hidden-phishing-network/</loc>
		<lastmod>2018-10-08T13:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/avast-business-invites-you-to-join-these-industry-events-avast-business/</loc>
		<lastmod>2018-10-08T13:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/aqua-security-and-pivotal-team-up-to-bring-new-application-security-solution-to-the-enterprise/</loc>
		<lastmod>2018-10-09T12:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/week-40-cyberattack-digest-2018-recipe-unlimited-burgerville-apollo-startup-and-others/</loc>
		<lastmod>2018-10-08T14:03:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/does-pci-compliance-equal-security/</loc>
		<lastmod>2018-10-08T14:48:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/proactively-hardening-systems-application-and-version-hardening/</loc>
		<lastmod>2018-10-08T15:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/us-vows-to-go-on-cyber-offense/</loc>
		<lastmod>2018-10-08T15:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/denials-denials-denials-believe-them-or-not-something-is-rotten-on-the-supply-chain-side/</loc>
		<lastmod>2018-10-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/my-take-cyber-attacks-on-industrial-controls-operational-technology-have-only-just-begun/</loc>
		<lastmod>2018-10-08T16:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/inspiring-younger-generations-to-choose-cyber-careers/</loc>
		<lastmod>2018-10-08T16:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-view-from-a-veracode-solution-architect-my-top-5-lessons-learned/</loc>
		<lastmod>2018-10-08T16:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/fortinet-again-recognized-by-gartner-as-an-enterprise-firewall-magic-quadrant-leader/</loc>
		<lastmod>2018-10-08T17:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-ankur-tyagis-analyzing-multi-dimensional-malware-dataset/</loc>
		<lastmod>2018-10-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/3-reasons-why-we-shouldnt-be-replacing-touch-id-with-face-id/</loc>
		<lastmod>2018-10-08T19:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/robert-m-lee-and-jeff-hass-little-bobby-comics-carry-a-big-stick/</loc>
		<lastmod>2018-10-08T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/electronic-voting-and-election-fraud/</loc>
		<lastmod>2018-10-08T21:03:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/10-8-18-dtex-insider-threat-privacy-news-dtex-earns-leadership-product-awards-insider-compromises-french-law-enforcement-agency-the-big-hack/</loc>
		<lastmod>2018-10-08T22:33:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/what-your-compliance-officer-should-know-about-privacy/</loc>
		<lastmod>2018-10-08T22:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/expert-interview-on-2018-election-security-2/</loc>
		<lastmod>2018-10-08T22:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/what-a-security-auditor-needs-to-know-about-privacy-compliance/</loc>
		<lastmod>2018-10-09T00:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/tripwire-for-devops-external-registry-and-alert-capability/</loc>
		<lastmod>2018-10-09T03:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/women-in-information-security-alana-staszczyszyn/</loc>
		<lastmod>2018-10-09T03:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/breached-records-more-than-doubled-in-h1-2018-reveals-breach-level-index/</loc>
		<lastmod>2018-10-09T05:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/does-ai-solve-it-all/</loc>
		<lastmod>2018-10-09T06:25:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/data-centric-security-and-big-data/</loc>
		<lastmod>2018-10-09T07:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/webinar-blockchain-hacking-for-investigating-cryptocurrencies-on-oct-24-2018/</loc>
		<lastmod>2018-10-09T08:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/so-you-want-to-work-in-cybersecurity-eh/</loc>
		<lastmod>2018-10-09T09:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/idc-numbers-show-security-spending-is-off-the-charts-budgets-appropriately-reflected-by-business-size/</loc>
		<lastmod>2018-10-09T09:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ssd-advisory-firefox-information-leak/</loc>
		<lastmod>2018-10-09T09:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/google-shuts-down-following-undisclosed-data-breach/</loc>
		<lastmod>2018-10-09T11:08:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/are-organisations-learning-from-cyber-attacks/</loc>
		<lastmod>2018-10-09T11:10:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-other-cyber-skills-gap-educating-tomorrows-cisos/</loc>
		<lastmod>2018-10-09T11:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/working-with-our-partners-to-mitigate-the-faxploit-threat/</loc>
		<lastmod>2018-10-09T11:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/over-4-5-billion-records-breached-in-h1-2018-finds-report/</loc>
		<lastmod>2018-10-09T12:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ddc-case-study-pci-perfection-through-partnership/</loc>
		<lastmod>2018-10-09T13:04:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/why-education-and-training-are-essential-for-closing-the-cybersecurity-skills-gap/</loc>
		<lastmod>2018-10-09T13:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/application-security-mistake-no-6-going-it-alone/</loc>
		<lastmod>2018-10-09T13:59:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/googles-feet-of-clay/</loc>
		<lastmod>2018-10-09T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-us-national-cyber-strategy/</loc>
		<lastmod>2018-10-09T14:21:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/heathrow-airport-escapes-hefty-gdpr-fine-gets-only-120000-under-1998-dpa-for-2017-privacy-breach-incident/</loc>
		<lastmod>2018-10-09T14:42:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/7-ways-to-protect-your-digital-privacy-in-the-21st-century/</loc>
		<lastmod>2018-10-09T15:14:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/consolidation-in-consumer-products-could-it-solve-the-iot-security-issues/</loc>
		<lastmod>2018-10-09T15:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/a-deep-dive-into-secrets-management/</loc>
		<lastmod>2018-10-09T15:44:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/whats-in-your-website-lurking-risk-from-third-party-resources/</loc>
		<lastmod>2018-10-09T15:59:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-much-can-application-isolation-save-your-organization/</loc>
		<lastmod>2018-10-09T16:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/heathrow-airport-fined-120000-following-data-security-incident/</loc>
		<lastmod>2018-10-09T16:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-alex-fernandez-gattis-physicals-badges-and-why-it-matters/</loc>
		<lastmod>2018-10-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/october-2018-patch-tuesday-49-vulns-critical-browser-patches-hyper-v-adobe-vulns/</loc>
		<lastmod>2018-10-09T18:29:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/block-puzzle-games-laced-with-malware-avast/</loc>
		<lastmod>2018-10-09T18:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/fbis-crime-data-explorer-what-the-numbers-say-about-cybercrime/</loc>
		<lastmod>2018-10-09T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/sap-cyber-threat-intelligence-report-october-2018/</loc>
		<lastmod>2018-10-09T19:21:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/venafi-research-how-well-are-german-organizations-protecting-their-machine-identities/</loc>
		<lastmod>2018-10-09T19:24:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/obfuscated-javascript-cryptominer/</loc>
		<lastmod>2018-10-09T19:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/webinar-securing-enterprise-level-cloud-deployments/</loc>
		<lastmod>2018-10-09T19:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/sap-security-notes-october-18-first-critical-businessobjects-note-in-five-years/</loc>
		<lastmod>2018-10-09T19:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/alert-logic-expands-visibility-portability-and-threat-detection-for-container-security/</loc>
		<lastmod>2018-10-09T20:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-horror-movies/</loc>
		<lastmod>2018-10-09T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/vert-threat-alert-october-2018-patch-tuesday-analysis/</loc>
		<lastmod>2018-10-09T22:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/edu-and-the-cloud-3-tips-for-a-secure-relationship/</loc>
		<lastmod>2018-10-09T22:27:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/remote-robbery-an-it-incident-not-a-breach-and-face-off-on-privacy/</loc>
		<lastmod>2018-10-09T22:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/naming-shaming-web-polluters-xiongmai/</loc>
		<lastmod>2018-10-10T00:41:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/enhancing-the-flow-and-protection-of-ephi/</loc>
		<lastmod>2018-10-10T04:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/report-australias-top-law-firms-lead-the-way-in-the-use-of-anti-phishing-technologies/</loc>
		<lastmod>2018-10-10T06:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/a-new-era-for-customer-data-could-security-be-the-new-green-for-businesses/</loc>
		<lastmod>2018-10-10T07:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/geojson-version-of-cbc-quebec-ridings-hex-cartograms-with-example-usage-in-r/</loc>
		<lastmod>2018-10-10T09:39:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/protect-your-network/</loc>
		<lastmod>2018-10-10T11:59:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/rebound-orthopedics-neurosurgery-hacked-2800-records-exposed/</loc>
		<lastmod>2018-10-10T12:18:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/proactive-system-hardening-continuous-hardenings-coming-of-age/</loc>
		<lastmod>2018-10-10T12:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/aira-lab-robonomics-smart-contracts-audit/</loc>
		<lastmod>2018-10-10T12:46:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/escar-asia-2018tss-2-0ubiquitous-tpm-security/</loc>
		<lastmod>2018-10-10T13:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-vet-an-employee-before-granting-admin-access-on-wordpress-2/</loc>
		<lastmod>2018-10-10T13:14:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/aws-lambda-security-taming-your-open-source-dependencies-with-functionshield/</loc>
		<lastmod>2018-10-10T13:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-msp-guide-to-building-your-managed-security-services-best-practices-for-marketing-avast-business/</loc>
		<lastmod>2018-10-10T13:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/el-cubano-de-googlery/</loc>
		<lastmod>2018-10-10T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/information-risks-of-travel/</loc>
		<lastmod>2018-10-10T14:17:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/yes-a-data-breach-is-inevitable-heres-why-and-what-you-should-do/</loc>
		<lastmod>2018-10-10T14:32:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/carbon-black-introduces-cb-threathunter-delivering-advanced-threat-hunting-and-incident-response-ir-capabilities-on-the-cb-predictive-security-cloud-psc/</loc>
		<lastmod>2018-10-10T15:19:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/us-national-cyber-security-awareness-month-prepare-for-threats-and-mitigate-exposure/</loc>
		<lastmod>2018-10-10T16:07:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/avast-pumps-protection-performance-and-privacy-in-2019-avast/</loc>
		<lastmod>2018-10-10T16:14:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/more-commentary-on-china-apple-and-supply-chain-hacking/</loc>
		<lastmod>2018-10-10T16:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/protecting-sensitive-data-a-black-swan-never-truly-sits-still/</loc>
		<lastmod>2018-10-10T16:14:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/make-your-home-both-smart-and-secure-ncsam-at-synopsys/</loc>
		<lastmod>2018-10-10T16:14:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/washington-orthopedic-practice-confirms-data-security-event/</loc>
		<lastmod>2018-10-10T16:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-kent-picat-grubers-inspec-compliance-as-code/</loc>
		<lastmod>2018-10-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/android-ios-and-macos-issues/</loc>
		<lastmod>2018-10-10T18:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-changing-landscape-of-endpoint-security-what-you-need-to-know-for-2018/</loc>
		<lastmod>2018-10-10T18:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/why-you-need-to-perform-open-source-due-diligence-in-an-ma-transaction/</loc>
		<lastmod>2018-10-10T19:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ransomware-might-not-be-as-prevalent-but-organizations-still-need-to-be-as-vigilant-as-possible-in-building-defenses/</loc>
		<lastmod>2018-10-10T19:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/understand-pci-dss-compensating-controls-while-working-with-your-qsa/</loc>
		<lastmod>2018-10-10T20:12:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/6-ways-to-improve-your-business-endpoint-protection/</loc>
		<lastmod>2018-10-10T20:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-endpoint-threats-impacting-security/</loc>
		<lastmod>2018-10-10T20:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-evolution-of-endpoint-security-changing-with-the-currents/</loc>
		<lastmod>2018-10-10T20:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-high-cost-of-switching-security-awareness-programs/</loc>
		<lastmod>2018-10-10T20:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/maintaining-your-network-certification-renewal-requirements/</loc>
		<lastmod>2018-10-10T20:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-joy-of-techs-send-read-receipts/</loc>
		<lastmod>2018-10-10T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-cap-exam-application-process-rules-and-eligibility-exam-length-and-more/</loc>
		<lastmod>2018-10-10T21:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cap-certified-authorization-professional-certification-overview/</loc>
		<lastmod>2018-10-10T21:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-create-a-human-firewall-top-7-elements-required-for-success-in-2018/</loc>
		<lastmod>2018-10-10T21:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/decrypting-gandcrab-ransomware/</loc>
		<lastmod>2018-10-10T22:33:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ccsp-domain-4-cloud-application-security/</loc>
		<lastmod>2018-10-10T23:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ccsp-domain-3-cloud-platform-and-infrastructure-security/</loc>
		<lastmod>2018-10-10T23:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ccsp-domain-2-cloud-data-security/</loc>
		<lastmod>2018-10-10T23:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ccsp-domain-1-architectural-concepts-design-requirements/</loc>
		<lastmod>2018-10-10T23:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-gap-between-u-s-federal-and-state-policies-for-iot-security/</loc>
		<lastmod>2018-10-11T03:29:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ensure-highly-reliable-first-mile-connectivity-with-akamai-direct-connect/</loc>
		<lastmod>2018-10-11T03:49:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-do-keynote-speakers-keep-suggesting-that-improving-security-is-possible-2/</loc>
		<lastmod>2018-10-11T04:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/tripoli-clashes-signal-an-uncertain-future-for-libya-2/</loc>
		<lastmod>2018-10-11T04:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/should-you-upgrade-to-active-directory-2016or-stay-where-you-are-2/</loc>
		<lastmod>2018-10-11T04:30:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/is-your-router-safe-from-a-dns-based-attack-2/</loc>
		<lastmod>2018-10-11T04:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/understanding-the-power-of-big-data-for-your-business/</loc>
		<lastmod>2018-10-11T04:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-to-consider-in-case-of-termination-or-change-of-employment-according-to-iso-27001-2/</loc>
		<lastmod>2018-10-11T04:30:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/violent-piracy-in-southeast-asia-a-feature-of-the-past-2/</loc>
		<lastmod>2018-10-11T04:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/is-personal-information-about-you-or-your-family-discoverable-in-the-public-domain-2/</loc>
		<lastmod>2018-10-11T04:30:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/southern-philippines-regular-kidnappings-in-2018-show-kidnap-for-ransom-remains-a-serious-concern-2/</loc>
		<lastmod>2018-10-11T04:31:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/threat-of-criminal-boardings-in-southeast-asia-still-ongoing-2/</loc>
		<lastmod>2018-10-11T04:31:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/what-you-need-to-know-about-gdpr-article-32/</loc>
		<lastmod>2018-10-11T04:31:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/leopard-spots-and-zebra-stripes-fraud-and-behavioral-analytics/</loc>
		<lastmod>2018-10-11T04:31:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-gdpr-compliance-means-to-the-it-security-professional/</loc>
		<lastmod>2018-10-11T04:31:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-gdpr-deadline-is-here-so-what-next/</loc>
		<lastmod>2018-10-11T04:31:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-to-consider-in-security-terms-and-conditions-for-employees-according-to-iso-27001-2/</loc>
		<lastmod>2018-10-11T04:31:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/principles-grounded-in-action-will-be-critical-to-the-success-of-the-cybersecurity-tech-accord/</loc>
		<lastmod>2018-10-11T04:31:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-keys-for-effective-threat-detection/</loc>
		<lastmod>2018-10-11T04:31:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/todays-email-encryption-options-which-one-is-right-for-you/</loc>
		<lastmod>2018-10-11T04:31:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/stray-emails-how-to-prevent-a-critical-cyber-security-vulnerability/</loc>
		<lastmod>2018-10-11T04:31:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/expert-interview-on-2018-election-security-3/</loc>
		<lastmod>2018-10-11T04:48:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/entering-the-twilight-zone-adventures-in-the-security-leader-search-2/</loc>
		<lastmod>2018-10-11T04:48:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/9-17-18-dtex-insider-threat-privacy-news-el-reg-focus-on-insider-threat-highlights-employee-negligence-down-under-data-breach-caused-by-employee-ransomware-puts-55-out-of-a-job-2/</loc>
		<lastmod>2018-10-11T04:48:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/duration-what-tech-and-cyber-pros-can-learn-from-hurricane-florence-2/</loc>
		<lastmod>2018-10-11T04:48:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/beating-the-owasp-benchmark-2/</loc>
		<lastmod>2018-10-11T04:48:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/british-airways-data-breach-shows-why-every-company-needs-a-cyber-incident-response-and-crisis-communication-plan-2/</loc>
		<lastmod>2018-10-11T04:48:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/7-steps-to-building-a-successful-career-in-information-security-2/</loc>
		<lastmod>2018-10-11T04:48:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/fbi-iot-alert-but-have-they-got-it-right-2/</loc>
		<lastmod>2018-10-11T04:48:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-achieve-dod-8570-iat-level-i-compliance-2/</loc>
		<lastmod>2018-10-11T04:48:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/gulf-of-guinea-mother-ships-used-to-target-vessels-deep-offshore-2/</loc>
		<lastmod>2018-10-11T04:48:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bab-el-mandeb-threat-of-attack-remains-despite-saudi-arabia-resuming-oil-shipments-2/</loc>
		<lastmod>2018-10-11T04:48:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-a-national-healthcare-provider-mitigates-spearphishing-with-securityiqs-phishnotify-2/</loc>
		<lastmod>2018-10-11T04:48:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/gdpr-qa-with-a-cybersecurity-compliance-and-privacy-expert-2/</loc>
		<lastmod>2018-10-11T04:48:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/client-side-injection-attacks-2/</loc>
		<lastmod>2018-10-11T04:48:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cloud-storage-file-sharing-apps-and-gdpr-this-could-get-ugly-fast/</loc>
		<lastmod>2018-10-11T04:48:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/alert-logic-cloud-insight-essentials-certified-for-cis-aws-foundations-benchmark/</loc>
		<lastmod>2018-10-11T04:48:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/60-of-organizations-risk-missing-the-gdpr-deadline/</loc>
		<lastmod>2018-10-11T04:48:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/biggest-cloud-security-threats-are-self-inflicted/</loc>
		<lastmod>2018-10-11T04:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/alert-logic-container-ids-solution-detects-cryptomining-attack-on-aws/</loc>
		<lastmod>2018-10-11T04:48:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/onboard-security-expands-trustsentinel-tss-2-0-with-sapi-middleware/</loc>
		<lastmod>2018-10-11T05:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/apache-struts-vulnerability-exploited-in-new-cryptomining-attack/</loc>
		<lastmod>2018-10-11T05:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-to-prevent-self-inflicted-cloud-security-threats/</loc>
		<lastmod>2018-10-11T05:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/emerging-threat-active-exploit-of-apache-struts-remote-code-execution-vulnerability/</loc>
		<lastmod>2018-10-11T05:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybersecurity-awareness-month-blog-series-alright-boys-its-time-we-have-the-talk/</loc>
		<lastmod>2018-10-11T07:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/patch-tuesday-october-2018-edition/</loc>
		<lastmod>2018-10-11T07:34:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/adobe-patches-critical-flaws-in-many-of-its-software-offerings/</loc>
		<lastmod>2018-10-11T11:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/another-bloomberg-report-another-supply-chain-issue/</loc>
		<lastmod>2018-10-11T11:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/u-s-doe-seeks-innovative-cybersecurity-technologies/</loc>
		<lastmod>2018-10-11T12:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/chinese-intelligence-officer-extradited-to-the-united-states-for-espionage-charges/</loc>
		<lastmod>2018-10-11T13:14:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/noscript-vulnerability-in-tor-browser/</loc>
		<lastmod>2018-10-11T13:37:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/too-busy-dont-care-so-sorry-not-sorry/</loc>
		<lastmod>2018-10-11T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/nyotron-enters-into-strategic-partnership-with-ingram-micro-to-scale-business-operations-globally/</loc>
		<lastmod>2018-10-11T14:04:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/15-years-of-cybersecurity-awareness-month/</loc>
		<lastmod>2018-10-11T14:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/education-hacking-to-achieve-an-hr-filter-bypass/</loc>
		<lastmod>2018-10-11T14:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/3-secops-culture-hacks-you-should-embrace-today/</loc>
		<lastmod>2018-10-11T14:45:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/not-just-another-notch-in-your-belt-organizational-challenges-of-pci-compliance/</loc>
		<lastmod>2018-10-11T15:13:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-does-netsparker-licensing-work/</loc>
		<lastmod>2018-10-11T15:30:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/disaster-recovery-data-center-or-host-infrastructure-reroute/</loc>
		<lastmod>2018-10-11T15:44:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/threat-intelligence-report-active-webshell-big-bang-bot/</loc>
		<lastmod>2018-10-11T15:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-virtualization-protects-your-high-value-assets-webinar/</loc>
		<lastmod>2018-10-11T16:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/scadaguardian-update-enhances-ot-visibility-threat-detection/</loc>
		<lastmod>2018-10-11T17:15:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-app-explosion-and-digital-transformation-drive-rapid-growth-of-the-identity-management-market/</loc>
		<lastmod>2018-10-11T16:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/keys-for-sale-this-is-why-you-must-control-your-own-pki/</loc>
		<lastmod>2018-10-11T17:30:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/evolve-or-die-integrate-security-into-application-development-processes/</loc>
		<lastmod>2018-10-11T17:31:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/national-cyber-security-awareness-month/</loc>
		<lastmod>2018-10-11T17:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/grrcon-augusta-2018-j-wolfgang-goerlichs-bounty-hunters/</loc>
		<lastmod>2018-10-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/why-should-i-update-my-firewall/</loc>
		<lastmod>2018-10-11T18:21:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/stop-fileless-malware-with-abnormal-powershell-command-execution/</loc>
		<lastmod>2018-10-11T19:13:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/webinar-bsimm9-heres-whats-new/</loc>
		<lastmod>2018-10-11T19:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-monitoring-saves-the-day/</loc>
		<lastmod>2018-10-11T19:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/chinese-iphone-users-apple-ids-compromised/</loc>
		<lastmod>2018-10-11T19:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/personal-data-for-coffee-whats-the-risk-avast/</loc>
		<lastmod>2018-10-11T20:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/4-reasons-why-secure-messaging-apps-are-the-best-option-for-boosting-patient-engagement-health-outcomes/</loc>
		<lastmod>2018-10-11T20:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-internal-monologues/</loc>
		<lastmod>2018-10-11T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/learn-10-key-tips-to-make-your-software-security-program-thrive/</loc>
		<lastmod>2018-10-11T23:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/financial-healthcare-government-and-retail-it-professionals-review-fortinets-enterprise-firewall-solution/</loc>
		<lastmod>2018-10-11T23:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/awesome-possum/</loc>
		<lastmod>2018-10-12T00:06:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-choose-a-web-application-scanner-dast-sast-rasp-iast-hast-holy-saas/</loc>
		<lastmod>2018-10-12T00:06:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/work-away-breaking-out-of-office-walls/</loc>
		<lastmod>2018-10-12T00:07:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-ways-attackers-are-targeting-the-healthcare-industry/</loc>
		<lastmod>2018-10-12T03:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/clarifying-the-misconceptions-monitoring-and-auditing-for-container-security/</loc>
		<lastmod>2018-10-12T03:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/key-and-certificate-management-vs-key-and-certificate-security-time-for-a-change/</loc>
		<lastmod>2018-10-12T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ncsam-improve-your-digital-hygiene-to-reduce-your-risk-of-identity-theft/</loc>
		<lastmod>2018-10-12T10:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/introduction-to-verifiable-delay-functions-vdfs/</loc>
		<lastmod>2018-10-12T10:50:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/midterm-elections-hacking-and-information-warfare-cyberspeak-podcast/</loc>
		<lastmod>2018-10-12T10:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-sextortionist-scam-uses-email-spoofing-attack-to-trick-users/</loc>
		<lastmod>2018-10-12T11:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/fortinet-discovers-new-android-apps-that-mine-the-unminable/</loc>
		<lastmod>2018-10-12T12:43:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/google-ending-and-ca-is-no-state-for-weak-passwords-avast/</loc>
		<lastmod>2018-10-12T13:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/rather-than-focusing-on-fixing-lame-windows-update-system-microsoft-ceo-targets-new-electronic-cricket-bat/</loc>
		<lastmod>2018-10-12T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/lack-of-specialists-tools-budget-and-knowledge-are-the-main-roadblocks-for-financial-sector-in-2018/</loc>
		<lastmod>2018-10-12T14:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/threat-announcement-phishing-sites-detected-on-emoji-domains/</loc>
		<lastmod>2018-10-12T14:51:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/google-data-exposure-how-long-do-you-retain-logs/</loc>
		<lastmod>2018-10-12T16:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/website-skimming-is-on-the-rise-and-your-organization-needs-to-be-prepared/</loc>
		<lastmod>2018-10-12T16:43:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/automation-one-of-the-keys-to-devsecops/</loc>
		<lastmod>2018-10-12T17:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ccna-study-resources/</loc>
		<lastmod>2018-10-12T17:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/maintaining-your-ccna-certification-renewal-requirements/</loc>
		<lastmod>2018-10-12T17:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-benjamin-delpys-keynote-how-to-influence-security-technology-in-kiwi-underpants/</loc>
		<lastmod>2018-10-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/improving-image-manager-with-real-user-feedback/</loc>
		<lastmod>2018-10-12T19:44:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/api-gateway-secure-api-traffic-with-oauth-2-0-and-cache-graphql-responses/</loc>
		<lastmod>2018-10-12T19:45:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/mpulse-timeline-new-impactful-way-to-gain-insight-from-your-mpulse-data/</loc>
		<lastmod>2018-10-12T19:45:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/find-and-fix-first-and-third-party-issues-with-the-power-of-real-data-and-adaptive-performance/</loc>
		<lastmod>2018-10-12T19:46:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/whats-new-in-performance/</loc>
		<lastmod>2018-10-12T19:47:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/automate-firewall-protection-on-your-website/</loc>
		<lastmod>2018-10-12T19:47:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/enhancing-api-protection-in-web-application-protector/</loc>
		<lastmod>2018-10-12T19:48:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/introducing-the-bot-endpoint-protection-report/</loc>
		<lastmod>2018-10-12T19:48:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/whats-new-in-security/</loc>
		<lastmod>2018-10-12T19:49:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/drive-greater-efficiencies-in-reaching-a-distributed-audience-with-one-to-many-delivery/</loc>
		<lastmod>2018-10-12T19:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/streamline-ott-delivery-using-cloud-origins-with-cloud-wrapper/</loc>
		<lastmod>2018-10-12T19:50:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/tailor-video-experiences-for-your-end-viewers-with-manifest-personalization/</loc>
		<lastmod>2018-10-12T19:50:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/need-a-job-consider-a-career-in-cyber-security-ncsam-at-synopsys/</loc>
		<lastmod>2018-10-12T20:44:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/is-a-fragmented-view-of-users-increasing-your-risk-of-breach/</loc>
		<lastmod>2018-10-12T20:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-joy-of-techs-googles-apology/</loc>
		<lastmod>2018-10-12T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ccsp-domain-6-legal-and-compliance/</loc>
		<lastmod>2018-10-12T22:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ccsp-domain-5-operations/</loc>
		<lastmod>2018-10-12T22:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/millions-of-rewarding-jobs-educating-for-a-career-in-cyber-security/</loc>
		<lastmod>2018-10-12T23:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/supply-chain-security-101-an-experts-view/</loc>
		<lastmod>2018-10-13T01:03:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/krebs-sager-interview-on-supply-chain-security/</loc>
		<lastmod>2018-10-13T14:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-ed-skoudis-john-strand-lesley-carhart-dave-kennedy-moderator-panel-discussion-at-a-glance-information-security/</loc>
		<lastmod>2018-10-13T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-in-a-world-of-physically-capable-computers/</loc>
		<lastmod>2018-10-13T17:20:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-vulnerabilities-in-us-weapons-systems/</loc>
		<lastmod>2018-10-13T17:32:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-rock-wall/</loc>
		<lastmod>2018-10-13T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-samuel-sayens-red-teaming-gaps-and-musings/</loc>
		<lastmod>2018-10-13T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-irregular-cyber-warfare/</loc>
		<lastmod>2018-10-14T08:53:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ssd-advisory-firefox-javascript-type-confusion-rce/</loc>
		<lastmod>2018-10-14T12:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/10-essential-network-vulnerability-scanning-tools/</loc>
		<lastmod>2018-10-14T13:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/wifi-feature-request-wpa-handshakes/</loc>
		<lastmod>2018-10-14T14:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-jared-atkinson-robby-winchesters-a-process-is-no-one-hunting-for-token-manipulation/</loc>
		<lastmod>2018-10-14T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/robert-m-lee-and-jeff-hass-little-bobby-comics-supercloud/</loc>
		<lastmod>2018-10-14T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-tso-jen-lius-fuzz-your-smartphone-from-4g-base-station-side/</loc>
		<lastmod>2018-10-14T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/placing-more-importance-on-data-security/</loc>
		<lastmod>2018-10-15T01:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ncsam-consider-the-nexus-between-your-personal-and-professional-life-on-social-media/</loc>
		<lastmod>2018-10-15T03:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/defense-in-depth-4-essential-layers-of-ics-security/</loc>
		<lastmod>2018-10-15T03:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/google-shutdown-weapons-systems-vulnerabilities-voice-phishing-scams-wb38/</loc>
		<lastmod>2018-10-15T04:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/artificial-intelligence-and-machine-learning-the-most-effective-weapons-against-ransomware/</loc>
		<lastmod>2018-10-15T07:43:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/high-ranking-chinese-operative-charged-with-economic-espionage-theft-of-trade-secrets/</loc>
		<lastmod>2018-10-15T09:54:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/week-41-cyberattack-digest-2018-google-facebook-navionics-and-others/</loc>
		<lastmod>2018-10-15T11:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/scottish-ambulance-service-exposed-employees-data-online/</loc>
		<lastmod>2018-10-15T11:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/why-dnssec-isnt-enough/</loc>
		<lastmod>2018-10-15T12:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-check-if-your-facebook-account-was-hacked-and-what-the-hackers-have-on-you/</loc>
		<lastmod>2018-10-15T12:45:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cynerio-welcomes-dr-john-halamka-as-advisor/</loc>
		<lastmod>2018-10-15T14:03:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-as-a-north-star-at-contact-atlantic/</loc>
		<lastmod>2018-10-15T13:06:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/introducing-aws-ec2-tag-integration-2/</loc>
		<lastmod>2018-10-15T14:20:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/improve-security-by-thinking-beyond-the-security-realm/</loc>
		<lastmod>2018-10-15T13:36:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/fake-adobe-update-really-does-update-flash-while-also-installing-cryptominer/</loc>
		<lastmod>2018-10-15T14:14:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-u-s-government-is-getting-smarter-on-cloud/</loc>
		<lastmod>2018-10-15T14:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/semafones-work-with-rnib-recognized-by-emerging-payments-awards-and-security-excellence-awards/</loc>
		<lastmod>2018-10-15T14:14:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/recognizing-and-preventing-modern-cyber-scams/</loc>
		<lastmod>2018-10-15T14:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bruce-schneier-we-can-no-longer-leave-online-security-to-the-market/</loc>
		<lastmod>2018-10-15T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/mpower-2018-how-can-soar-help-you-measure-roi-for-your-soc/</loc>
		<lastmod>2018-10-15T15:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/schneider-electric-introduces-new-technology-partners-initiative-to-help-apc-resellers-grow-their-business-2/</loc>
		<lastmod>2018-10-15T15:37:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/has-a-bot-network-compromised-your-systems/</loc>
		<lastmod>2018-10-15T17:54:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-audit-weaknesses-offer-a-silver-lining/</loc>
		<lastmod>2018-10-15T16:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/hype-aside-can-blockchain-really-replace-ssl/</loc>
		<lastmod>2018-10-15T17:07:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/product-update-sucuri-firewall-in-singapore-and-amsterdam/</loc>
		<lastmod>2018-10-15T18:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/guest-essay-supply-chain-vulnerabilities-play-out-in-latest-pentagon-personnel-records-breach/</loc>
		<lastmod>2018-10-15T18:57:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-emma-zaballos-clippy-for-the-dark-web-looks-like-youre-trying-to-buy-some-dank-kush-can-i-help-you-with-that/</loc>
		<lastmod>2018-10-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/maintaining-a-pulse-ransomware-in-the-healthcare-sector/</loc>
		<lastmod>2018-10-15T19:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-bloomberg-report-on-alleged-china-hack-what-it-means-for-supply-chain-security-and-machine-identities/</loc>
		<lastmod>2018-10-15T20:31:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-kolakoski-sequence/</loc>
		<lastmod>2018-10-15T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/govware-2018-survey-challenges-include-resources-and-open-source-use/</loc>
		<lastmod>2018-10-15T21:59:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/threat-intelligence-report-powershell-dropper-kilences/</loc>
		<lastmod>2018-10-15T21:59:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/sap-as-a-critical-part-of-a-holistic-cybersecurity-approach/</loc>
		<lastmod>2018-10-15T21:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/network-anomaly-detection-track-record-in-real-life/</loc>
		<lastmod>2018-10-15T22:32:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/dockerfiles-for-phoenix/</loc>
		<lastmod>2018-10-16T00:48:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/10-15-18-dtex-privacy-insider-threat-news-35-million-voter-records-for-sale-on-dark-web-courtesy-of-insiders-dhs-vulnerable-to-insider-attacks/</loc>
		<lastmod>2018-10-16T02:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/semafone-opens-australian-office-to-support-global-contact-center-customers/</loc>
		<lastmod>2018-10-16T04:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/medical-device-risk-mitigation-is-perhaps-the-most-pressing-issue-for-healthcare-cios/</loc>
		<lastmod>2018-10-16T07:05:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybersecurity-awareness-month-blog-series-its-cybersecurity-awareness-month-advice-to-smbs/</loc>
		<lastmod>2018-10-16T07:11:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/pentagon-data-breach-puts-personal-details-of-30000-staff-at-risk/</loc>
		<lastmod>2018-10-16T07:15:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/when-it-comes-to-container-security-enterprises-are-their-own-worst-enemy/</loc>
		<lastmod>2018-10-16T07:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/natterbox-takes-pci-compliance-further-with-new-automated-payment-system/</loc>
		<lastmod>2018-10-16T09:19:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/dating-app-for-trump-supporters-exposed-members-information/</loc>
		<lastmod>2018-10-16T11:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/using-application-analytics-to-achieve-security-at-scale/</loc>
		<lastmod>2018-10-16T11:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derived-piv-credentials-solving-authentication-challenges-for-highly-regulated-industries/</loc>
		<lastmod>2018-10-16T12:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/mobile-id-verification-in-a-trusted-identity-assurance-platform/</loc>
		<lastmod>2018-10-16T12:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/securing-the-multi-cloud-3-steps-for-maintaining-control-and-visibility/</loc>
		<lastmod>2018-10-16T13:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/madison-county-computer-system-infected-with-ransomware/</loc>
		<lastmod>2018-10-16T13:54:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/removing-the-barriers-to-secure-development-and-scalable-application-security-with-ca-veracode-greenlight/</loc>
		<lastmod>2018-10-16T14:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-mcsweeney-effect-writer-offers-up-personal-data-direct-purchase-only/</loc>
		<lastmod>2018-10-16T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/protect-your-employees-from-phishing-and-social-engineering-ncsam-at-synopsys/</loc>
		<lastmod>2018-10-16T15:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/managing-thousands-of-users-in-hundreds-of-branches-with-a-few-clicks/</loc>
		<lastmod>2018-10-16T15:35:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-research-shows-that-consumers-are-willing-to-pay-for-iot-services/</loc>
		<lastmod>2018-10-16T15:44:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/breaches-are-like-spilled-milk-it-doesnt-help-to-cry/</loc>
		<lastmod>2018-10-16T15:49:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/mocana-onboard-security-and-wibu-systems-to-demonstrate-security-of-iot-systems-based-on-trust-at-electronica-2018/</loc>
		<lastmod>2018-10-16T16:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-new-alert-logic-partner-connect-program-provides-partners-with-security-solutions-opportunity-qa-with-christopher-rajiah/</loc>
		<lastmod>2018-10-16T16:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/dreamforce-a-people-conference-disguised-as-a-tech-conference/</loc>
		<lastmod>2018-10-16T16:59:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/legal-group-protects-its-distributed-office-networks-with-untangle/</loc>
		<lastmod>2018-10-16T17:09:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/breaking-into-it-from-first-job-to-advanced-certs-with-comptia-cyberspeak-podcast/</loc>
		<lastmod>2018-10-16T17:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/getting-serious-about-security-in-schools/</loc>
		<lastmod>2018-10-16T18:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/attack-of-the-hackers-cybersecurity-and-local-governments-in-the-21st-century/</loc>
		<lastmod>2018-10-16T18:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-joe-rozners-synfuzz-building-a-grammar-based-re-targetable-test-generation-framework/</loc>
		<lastmod>2018-10-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/malicious-redirects-from-newsharecounts-com-tweet-counter/</loc>
		<lastmod>2018-10-16T19:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-modified-bayes-theorem/</loc>
		<lastmod>2018-10-16T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/notes-on-the-uk-iot-cybersec-code-of-practice/</loc>
		<lastmod>2018-10-16T21:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/prevent-fraud-with-rare-and-volume-based-analytics/</loc>
		<lastmod>2018-10-16T21:37:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/analyzing-oracle-security-oracle-critical-patch-update-for-october-2018/</loc>
		<lastmod>2018-10-16T22:37:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ubiquitous-seo-poisoning-urls/</loc>
		<lastmod>2018-10-17T01:09:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/latest-pci-dss-3-2-requirements-for-service-providers-push-common-sense-security/</loc>
		<lastmod>2018-10-17T03:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/women-in-information-security-theresa-payton/</loc>
		<lastmod>2018-10-17T04:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/avast-scores-high-in-malware-protection-avast/</loc>
		<lastmod>2018-10-17T06:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/guest-essay-pentagons-security-flaws-highlighted-in-gao-audit-and-recent-data-breach/</loc>
		<lastmod>2018-10-17T09:26:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/organisations-5-biggest-information-security-concerns/</loc>
		<lastmod>2018-10-17T10:05:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/anthem-agrees-to-16-million-settlement-following-compromise-of-80-million-health-records/</loc>
		<lastmod>2018-10-17T11:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/interview-with-coderisk-a-free-source-code-analysis-service-for-wordpress-plugins/</loc>
		<lastmod>2018-10-17T13:05:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/crosslin-technologies-saves-time-with-managed-workplace-avast-business/</loc>
		<lastmod>2018-10-17T13:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/prolexic-platform-enhancements-new-apj-scrubbing-centers-and-more/</loc>
		<lastmod>2018-10-17T14:19:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-need-for-fast-and-accurate-threat-intelligence/</loc>
		<lastmod>2018-10-17T14:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/facebookery-criminal-enterprise-at-work/</loc>
		<lastmod>2018-10-17T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/devops-application-automation-the-inescapable-path/</loc>
		<lastmod>2018-10-17T15:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cyber-security-not-just-a-job-but-many-jobs-of-the-future-ncsam-at-synopsys/</loc>
		<lastmod>2018-10-17T15:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/aws-security-best-practices-config-rules-for-aws-lambda-security/</loc>
		<lastmod>2018-10-17T15:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/opentalk18/</loc>
		<lastmod>2018-10-17T15:54:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/another-ios-passcode-bypass-bug/</loc>
		<lastmod>2018-10-17T15:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/35-million-us-voter-registration-records-found-for-sale-on-dark-web/</loc>
		<lastmod>2018-10-17T17:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-daniel-lagos-rfid-luggage-tags-iata-versus-real-life/</loc>
		<lastmod>2018-10-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cyber-thieves-steal-millions-from-mexican-banks/</loc>
		<lastmod>2018-10-17T18:12:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-evilmog-s-escoteric-hashcat-attacks/</loc>
		<lastmod>2018-10-17T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/oracle-patches-301-vulnerabilities-in-october-2018-cpu/</loc>
		<lastmod>2018-10-17T19:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/10-tips-to-take-control-of-your-public-wi-fi-security/</loc>
		<lastmod>2018-10-17T19:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-joy-of-techs-unacceptable/</loc>
		<lastmod>2018-10-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/forget-securing-the-backdoor-security-vulnerability-leaves-commercial-front-doors-easily-unlockable/</loc>
		<lastmod>2018-10-17T23:55:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/our-how-to-architect-and-deploy-a-siem-solution-publishes/</loc>
		<lastmod>2018-10-18T00:05:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cipher-security-named-to-2018-mssp-alert-top-100-managed-security-services-providers-list/</loc>
		<lastmod>2018-10-18T00:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ncsam-six-tips-to-help-keep-your-business-secure/</loc>
		<lastmod>2018-10-18T03:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/auditing-amazon-machine-images-with-tripwire-for-devops/</loc>
		<lastmod>2018-10-18T03:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/are-data-breaches-the-new-reality-for-retail/</loc>
		<lastmod>2018-10-18T07:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/failure-to-detect-a-breach-may-wreak-havoc-in-corporate-it-infrastructures-cisos-say/</loc>
		<lastmod>2018-10-18T08:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/pci-pal-and-verizon-white-paper-examines-pci-security-compliance-in-contact-centre-environments/</loc>
		<lastmod>2018-10-18T08:50:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-cope-with-the-security-talent-shortage-in-secops-2/</loc>
		<lastmod>2018-10-18T12:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/free-osquery-training-course-now-on-demand/</loc>
		<lastmod>2018-10-18T12:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/rat-author-jailed-for-30-months-ordered-to-hand-over-725k-worth-of-bitcoin/</loc>
		<lastmod>2018-10-18T13:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/meet-the-cyber-security-awareness-team-kimber/</loc>
		<lastmod>2018-10-18T13:33:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-dangers-of-open-git-folders/</loc>
		<lastmod>2018-10-18T14:21:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/using-location-analytics-to-improve-your-business/</loc>
		<lastmod>2018-10-18T14:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bad-email-rising-us-federal-government-fails-to-implement-dmarc/</loc>
		<lastmod>2018-10-18T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/survey-44-of-security-professionals-spend-more-than-20-hours-a-week-responding-to-alerts/</loc>
		<lastmod>2018-10-18T15:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/devsecops-automation-the-roadmap/</loc>
		<lastmod>2018-10-18T15:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/gdpr-in-the-us-after-the-british-airways-hack/</loc>
		<lastmod>2018-10-18T15:39:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/44-of-security-professionals-spend-more-than-20-hours-a-week-responding-to-alerts/</loc>
		<lastmod>2018-10-18T16:04:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/silencing-firefoxs-chattiness-for-web-app-testing/</loc>
		<lastmod>2018-10-18T16:28:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/stop-talking-and-start-helping-challenge-diversity-and-certifications-and-engage/</loc>
		<lastmod>2018-10-18T17:14:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/meet-nfcdrip-a-new-security-concern-for-air-gapped-systems/</loc>
		<lastmod>2018-10-18T18:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-carl-alexanders-lol-they-placed-their-dmz-in-the-cloud-easy-pwnage-or-disruptive-protection/</loc>
		<lastmod>2018-10-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-security-risks-of-ntlm-proceed-with-caution/</loc>
		<lastmod>2018-10-18T19:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/having-the-security-rug-pulled-out-from-under-you/</loc>
		<lastmod>2018-10-18T19:24:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/alexa-top-1-million-analysis-august-2018/</loc>
		<lastmod>2018-10-18T20:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/luke-kingma-and-lou-patrick-mackays-futurism-minecraft/</loc>
		<lastmod>2018-10-18T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/better-passwords-in-california-wont-help-much/</loc>
		<lastmod>2018-10-18T21:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ssh-vulnerability-allows-authentication-without-a-password/</loc>
		<lastmod>2018-10-18T22:44:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/emerging-threat-authentication-bypass-in-libssh-leaves-servers-vulnerable/</loc>
		<lastmod>2018-10-18T22:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/microsoft-ignite-2018-celebrating-the-office-365-community/</loc>
		<lastmod>2018-10-19T01:41:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/u-s-national-cyber-strategy-what-you-need-to-know/</loc>
		<lastmod>2018-10-19T03:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/mikrotik-routers-targeted-by-cryptomining-campaign-avast/</loc>
		<lastmod>2018-10-19T06:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/companies-advanced-in-data-security-are-seeing-solid-revenue-growth/</loc>
		<lastmod>2018-10-19T07:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/slither-a-solidity-static-analysis-framework/</loc>
		<lastmod>2018-10-19T10:50:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/pci-compliance-and-the-contact-centre-the-challenges-and-solutions/</loc>
		<lastmod>2018-10-19T13:04:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/armed-services-social-engineering-and-sensationalist-reporting-cyberspeak-podcast/</loc>
		<lastmod>2018-10-19T14:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/north-carolina-held-for-ransom-and-agent-tesla-becomes-stealthy/</loc>
		<lastmod>2018-10-19T14:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/manager-who-worked-on-equifaxs-breach-website-sentenced-for-insider-trading/</loc>
		<lastmod>2018-10-19T14:40:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/slip-siding-away-a-tune-the-dod-would-like-to-un-hear/</loc>
		<lastmod>2018-10-19T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ransomware-targets-your-red-letter-dates/</loc>
		<lastmod>2018-10-19T16:43:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-are-you-celebrating-national-security-awareness-month/</loc>
		<lastmod>2018-10-19T18:22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/catch-up-on-the-lastest-erp-cybersecurity-best-practices-at-oracle-openworld/</loc>
		<lastmod>2018-10-19T18:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/an-analysis-of-microsoft-edge-chakra-javascriptarray-typeid-handling-memory-corruption-cve-2018-8467/</loc>
		<lastmod>2018-10-19T18:59:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/apple-and-personal-data-plus-android-issues/</loc>
		<lastmod>2018-10-19T18:59:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-michael-roberts-martin-roberts-maintaining-post-exploitation-opsec-in-a-world-with-edr/</loc>
		<lastmod>2018-10-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/retail-joins-the-bsimm-finally/</loc>
		<lastmod>2018-10-19T19:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/creating-a-response-plan-you-can-trust/</loc>
		<lastmod>2018-10-19T19:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/fighting-mobile-banking-threats-with-threat-intelligence-avast/</loc>
		<lastmod>2018-10-19T20:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-joy-of-techs-portal/</loc>
		<lastmod>2018-10-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/election-interference-from-uber-and-lyft/</loc>
		<lastmod>2018-10-19T23:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/inside-the-industry-of-cybercrime-avast/</loc>
		<lastmod>2018-10-20T13:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-lisa-bradley-crobs-hey-i-found-a-vulnerability-now-what/</loc>
		<lastmod>2018-10-20T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-hygrometer/</loc>
		<lastmod>2018-10-20T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-dimitry-snezhkovs-foxtrot-c2-a-journey-of-payload-delivery/</loc>
		<lastmod>2018-10-20T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/common-security-mistakes-when-developing-swift-applications-part-i/</loc>
		<lastmod>2018-10-21T07:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-kaleb-browns-ridesharks/</loc>
		<lastmod>2018-10-21T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/home-network-security-in-the-internet-age/</loc>
		<lastmod>2018-10-21T15:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/robert-m-lee-and-jeff-hass-little-bobby-comics-machine-learning/</loc>
		<lastmod>2018-10-21T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-christopher-hadnagy-cat-murdocks-irs-hr-microsoft-and-your-grandma-what-they-all-have-in-common/</loc>
		<lastmod>2018-10-21T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/tcp-ip-sockets-and-sigpipe/</loc>
		<lastmod>2018-10-21T22:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/converting-challenge-to-opportunity-security-and-privacy-as-advantage/</loc>
		<lastmod>2018-10-21T22:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/training-ideas-for-machine-learning-in-security/</loc>
		<lastmod>2018-10-21T23:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/poaching-the-poachers-prayers-for-the-pachyderms/</loc>
		<lastmod>2018-10-22T01:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/10-22-18-dtex-insider-threat-privacy-in-the-news-gartner-goes-all-in-on-privacy-treasury-official-makes-costly-withdraw-dark-web-voter-records-grabbing-national-attention/</loc>
		<lastmod>2018-10-22T01:39:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/scraping-social-security-numbers-on-the-web/</loc>
		<lastmod>2018-10-22T03:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/choosing-the-right-industrial-cybersecurity-framework/</loc>
		<lastmod>2018-10-22T03:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/hotel-room-security-and-privacy-with-special-guest-patrick-mcneil-wb39/</loc>
		<lastmod>2018-10-22T04:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/widening-cybersecurity-workforce-gap-nears-3-million-globally-says-survey/</loc>
		<lastmod>2018-10-22T07:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-tech-silverfort-extends-adapative-multi-factor-authentication-via-key-partnerships/</loc>
		<lastmod>2018-10-22T08:57:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bitdefender-gandcrab-decryptor-for-syrian-users-now-available/</loc>
		<lastmod>2018-10-22T09:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/a-guide-to-post-quantum-cryptography/</loc>
		<lastmod>2018-10-22T10:50:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/three-ways-to-ensure-we-win-the-ai-cyber-arms-race/</loc>
		<lastmod>2018-10-22T11:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/government-system-breach-affects-personal-information-of-75000-americans/</loc>
		<lastmod>2018-10-22T11:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/continuous-processes-can-complicate-security-but-also-provide-an-answer/</loc>
		<lastmod>2018-10-22T12:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/are-all-social-engineers-bad/</loc>
		<lastmod>2018-10-22T12:51:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/avast-partners-with-vodafone/</loc>
		<lastmod>2018-10-22T12:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/project-lakhta-putins-chef-spends-35m-on-social-media-influence/</loc>
		<lastmod>2018-10-22T13:09:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-msp-guide-to-vertical-market-success-10-steps-for-entering-a-vertical-market-avast-business/</loc>
		<lastmod>2018-10-22T14:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-cisos-can-maintain-corporate-privacy-as-employees-adopt-emerging-technologies/</loc>
		<lastmod>2018-10-22T14:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/week-42-cyberattack-digest-2018-anthem-tumblr-argenta-and-others/</loc>
		<lastmod>2018-10-22T14:30:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/gamma-ransomware-compromises-data-on-16000-patients-at-california-hernia-institute/</loc>
		<lastmod>2018-10-22T14:54:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/jos-de-arimatia-da-cruz-and-travis-howards-the-feet-of-the-masters-lessons-on-irregular-cyber-warfare/</loc>
		<lastmod>2018-10-22T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-risks-we-face-with-e-voting-technology/</loc>
		<lastmod>2018-10-22T16:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-pki-certificates-could-help-secure-the-internet-of-things-iot/</loc>
		<lastmod>2018-10-22T16:29:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/securing-cloud-native-infrastructure/</loc>
		<lastmod>2018-10-22T17:54:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/youre-not-imagining-it-civilization-is-flickering-part-1/</loc>
		<lastmod>2018-10-22T16:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/anonymous-guest-post-more-vendor-briefing-advice/</loc>
		<lastmod>2018-10-22T18:28:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-oddvar-moes-lolbins-nothing-to-lol-about/</loc>
		<lastmod>2018-10-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/should-bloomberg-retract/</loc>
		<lastmod>2018-10-22T19:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/who-is-agent-tesla/</loc>
		<lastmod>2018-10-22T19:55:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/some-notes-for-journalists-about-cybersecurity/</loc>
		<lastmod>2018-10-22T20:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-tectonics-game/</loc>
		<lastmod>2018-10-22T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-protect-our-critical-infrastructure-ncsam-at-synopsys/</loc>
		<lastmod>2018-10-22T22:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/samuraiwtf-4-0-finally-released/</loc>
		<lastmod>2018-10-22T23:31:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/emerging-threat-blueimp-jquery-file-upload-crops-up-again/</loc>
		<lastmod>2018-10-22T23:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/incident-response-basics-getting-started-with-dfir/</loc>
		<lastmod>2018-10-23T04:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/women-in-information-security-jennifer-fernick/</loc>
		<lastmod>2018-10-23T04:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-countdown-to-black-friday-has-begun-are-retailers-and-consumers-ready/</loc>
		<lastmod>2018-10-23T07:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bug-spells-doom-for-nearly-vacant-google-network/</loc>
		<lastmod>2018-10-23T07:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/help-i-have-moved-to-containers-and-now-im-blind/</loc>
		<lastmod>2018-10-23T08:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-danger-of-shadow-it-shines-again/</loc>
		<lastmod>2018-10-23T09:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/indiana-national-guard-hit-by-ransomware/</loc>
		<lastmod>2018-10-23T11:20:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/gemaltos-vision-for-next-generation-digital-security/</loc>
		<lastmod>2018-10-23T11:31:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/avast-photo-cleaner-tidies-up-your-library-avast/</loc>
		<lastmod>2018-10-23T12:59:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cleanup-for-pc-declutters-and-improves-performance-avast/</loc>
		<lastmod>2018-10-23T12:59:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/fortinet-acquires-zonefox/</loc>
		<lastmod>2018-10-23T13:29:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/get-started-in-cybersecurity-beginner-tips-certifications-and-career-paths-cyberspeak-podcast/</loc>
		<lastmod>2018-10-23T14:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/enforce-docker-image-cis-policy-compliance-with-tripwire-for-devops/</loc>
		<lastmod>2018-10-23T14:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/machine-learning-for-cybersecurity-101/</loc>
		<lastmod>2018-10-23T14:43:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/where-next-with-cloud-security/</loc>
		<lastmod>2018-10-23T14:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/if-at-first-you-do-not-succeed-try-try-again-russian-vpnfilter-malware/</loc>
		<lastmod>2018-10-23T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/incident-response-and-ensuring-secure-communication/</loc>
		<lastmod>2018-10-23T15:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/combining-threat-detection-with-artificial-intelligence-logz-io-launches-security-analytics-app-for-elk-stack-on-its-continuous-operations-platform/</loc>
		<lastmod>2018-10-24T13:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/indiana-national-guard-suffers-ransomware-attack/</loc>
		<lastmod>2018-10-23T15:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-budgeting-considerations-for-containers-2/</loc>
		<lastmod>2018-10-23T17:02:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/spanning-backup-has-data-protection-covered-for-the-school-of-business-university-of-maryland-copy/</loc>
		<lastmod>2018-10-23T16:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/gandcrab-developers-show-empathy-towards-syrian-ransomware-victims/</loc>
		<lastmod>2018-10-23T17:19:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/credential-stuffing-campaign-targets-financial-services/</loc>
		<lastmod>2018-10-23T17:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/it-will-take-more-than-web-pages-that-load-faster-to-boost-holiday-conversion/</loc>
		<lastmod>2018-10-23T18:24:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/fortinet-recognized-as-a-challenger-in-the-first-gartner-wan-edge-mq/</loc>
		<lastmod>2018-10-23T18:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-paul-asadoorians-everything-else-i-learned-about-security-i-learned-from-hip-hop/</loc>
		<lastmod>2018-10-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/protecting-your-erp-applications/</loc>
		<lastmod>2018-10-23T21:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/threat-intelligence-report-active-webshell-dbs-php/</loc>
		<lastmod>2018-10-23T21:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-evaluation-stage-1-definition-of-the-problem-to-be-solved/</loc>
		<lastmod>2018-10-23T22:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/for-sale-voter-data-unbowed-by-florence-or-ransomware-and-binding-email-security/</loc>
		<lastmod>2018-10-23T22:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/why-do-we-still-have-application-outages-caused-by-expired-certificates/</loc>
		<lastmod>2018-10-23T22:34:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-joy-of-techs-a-lost-pet/</loc>
		<lastmod>2018-10-23T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/multiple-ways-to-inject-the-same-tech-support-scam-malware/</loc>
		<lastmod>2018-10-23T23:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/plusses-and-pitfals-of-repo-stream/</loc>
		<lastmod>2018-10-24T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/masscan-as-a-lesson-in-tcp-ip/</loc>
		<lastmod>2018-10-24T00:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/aws-freertos-riddled-with-security-vulnerabilities-avast/</loc>
		<lastmod>2018-10-24T00:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/introducing-data-guardrails-and-behavioral-analytics-understand-the-mission/</loc>
		<lastmod>2018-10-24T01:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-amanda-berlins-hackers-hugs-drugs-mental-health-in-infosec/</loc>
		<lastmod>2018-10-24T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/survey-nearly-half-of-u-s-adults-experienced-a-data-breach-in-the-past-three-years/</loc>
		<lastmod>2018-10-24T04:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/lack-of-awareness-leaves-consumers-vulnerable-to-cyberattacks-study-finds/</loc>
		<lastmod>2018-10-24T06:54:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/introducing-horizons/</loc>
		<lastmod>2018-10-24T07:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/supermarket-told-it-must-compensate-100000-workers-after-payroll-data-deliberately-leaked-by-rogue-employee/</loc>
		<lastmod>2018-10-24T10:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/beyond-your-bank-account-ten-astounding-finds-uncovered-by-financial-malware/</loc>
		<lastmod>2018-10-24T11:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/yahoo-agrees-to-pay-50-million-in-damages-to-settle-data-breach-lawsuit/</loc>
		<lastmod>2018-10-24T12:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/android-device-firmware-cheats-chinese-ad-networks-avast/</loc>
		<lastmod>2018-10-24T13:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/aws-lambda-security-quick-guide/</loc>
		<lastmod>2018-10-24T13:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-multi-cloud-and-smbs/</loc>
		<lastmod>2018-10-24T13:44:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/yahoo-agrees-to-pay-50-million-to-customers-affected-by-biggest-security-breach-in-history/</loc>
		<lastmod>2018-10-24T13:56:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/encryption-and-the-fight-against-threats-from-emerging-data-driven-technologies/</loc>
		<lastmod>2018-10-24T14:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/facebook-deletes-fake-pages-spam-accounts-that-lead-to-ad-farms-amid-presidential-elections-in-brazil/</loc>
		<lastmod>2018-10-24T14:01:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/what-is-pci-dss-compliance-and-why-does-it-matter/</loc>
		<lastmod>2018-10-24T14:25:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-delta-airlines-security-breach-a-case-study-in-how-to-respond-to-a-data-breach/</loc>
		<lastmod>2018-10-24T14:29:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybering-the-rus/</loc>
		<lastmod>2018-10-24T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/we-have-answers-questions-the-how-virtualization-protects-your-high-value-assets-webinar/</loc>
		<lastmod>2018-10-24T15:45:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/soss-volume-9-reveals-how-devsecops-can-overcome-the-volume-and-persistence-of-software-flaws/</loc>
		<lastmod>2018-10-24T16:09:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/inner-circle-podcast-episode-015-dr-galina-datskovsky-talks-about-secure-messaging/</loc>
		<lastmod>2018-10-24T17:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/zero-trust-why-implementation-doesnt-have-to-mean-painful-surgery-on-your-network-pt-2/</loc>
		<lastmod>2018-10-24T17:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-architecture-frameworks-yay-or-nay/</loc>
		<lastmod>2018-10-24T17:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/youre-not-imagining-it-civilization-is-flickering-part-2/</loc>
		<lastmod>2018-10-24T17:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/antisocial-android-apps/</loc>
		<lastmod>2018-10-24T18:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-joff-thyer-derek-bankss-android-app-penetration-testing-101/</loc>
		<lastmod>2018-10-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/dlp-strategies-protect-human-identities-but-ignore-machine-identities/</loc>
		<lastmod>2018-10-24T19:02:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/check-point-software-to-acquire-dome9-to-transformcloud-security/</loc>
		<lastmod>2018-10-24T19:23:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/webinar-secure-your-containers-with-github-and-synopsys/</loc>
		<lastmod>2018-10-24T22:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/lance-spitzner-how-to-secure-the-human-operating-system-ncsam-at-synopsys/</loc>
		<lastmod>2018-10-24T22:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-barnards-star/</loc>
		<lastmod>2018-10-24T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/three-c-words-of-web-app-security-part-2-csrf/</loc>
		<lastmod>2018-10-24T23:42:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-cheryl-biswass-draw-a-bigger-circle-infosec-evolves/</loc>
		<lastmod>2018-10-25T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-steps-to-gdpr-compliance/</loc>
		<lastmod>2018-10-25T03:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/soulmate-a-dating-app-that-spies-on-you/</loc>
		<lastmod>2018-10-25T04:24:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/devops-days-pdx-2018-review/</loc>
		<lastmod>2018-10-25T04:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/tripwire-visibility-for-ics-getting-from-data-mountains-to-event-nuggets/</loc>
		<lastmod>2018-10-25T04:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/staying-secure-when-online-shopping-getting-the-basics-right/</loc>
		<lastmod>2018-10-25T04:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybersecurity-awareness-month-blog-series-using-technology-to-safeguard-the-nations-critical-infrastructure/</loc>
		<lastmod>2018-10-25T07:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/gandcrab-ransomware-decryption-tool-available-for-free/</loc>
		<lastmod>2018-10-25T08:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bitdefender-law-enforcement-solve-for-multiple-versions-of-gandcrab-with-new-decryptor/</loc>
		<lastmod>2018-10-25T08:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/is-your-organization-cyber-security-ready/</loc>
		<lastmod>2018-10-25T08:59:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/why-customers-dont-trust-your-organisation-with-their-personal-data/</loc>
		<lastmod>2018-10-25T09:50:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/pci-ssc-community-meetings-roundup/</loc>
		<lastmod>2018-10-25T10:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/will-you-miss-your-favorite-passwords/</loc>
		<lastmod>2018-10-25T10:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/android-ad-fraud-scheme/</loc>
		<lastmod>2018-10-25T11:49:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ico-issues-500000-fine-to-facebook-for-cambridge-analytica-data-scandal/</loc>
		<lastmod>2018-10-25T11:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/hackers-steal-personal-data-of-up-to-9-4-million-cathay-pacific-passengers/</loc>
		<lastmod>2018-10-25T11:59:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/building-a-multi-cloud-logging-strategy-introduction/</loc>
		<lastmod>2018-10-25T12:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/hong-kong-airline-hacked-9-4-million-customers-affected/</loc>
		<lastmod>2018-10-25T12:57:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/3-questions-to-ask-when-youre-ready-to-operationalize-your-security-2/</loc>
		<lastmod>2018-10-25T13:57:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/hacker-creates-seven-new-variants-of-the-mirai-botnet-avast/</loc>
		<lastmod>2018-10-25T13:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/facing-the-facebook-breach-why-simple-sso-is-not-enough/</loc>
		<lastmod>2018-10-25T14:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/netsparkers-web-security-scan-statistics-for-2018/</loc>
		<lastmod>2018-10-25T14:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/files-encrypted-by-gandcrab-ransomware-can-now-be-decrypted-for-free/</loc>
		<lastmod>2018-10-25T14:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/rothmans-data-security-reset-what-to-target-and-protect/</loc>
		<lastmod>2018-10-25T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/unveiling-the-threats-you-cant-see-cybersecurity-advice-for-the-trucking-industry/</loc>
		<lastmod>2018-10-25T15:29:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/8-best-wordpress-scanners-to-help-find-security-vulnerabilities/</loc>
		<lastmod>2018-10-25T15:29:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ios-12-adoption-and-performance-what-it-means-for-your-businesss-app/</loc>
		<lastmod>2018-10-25T15:52:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/meet-the-cyber-security-awareness-team-dane/</loc>
		<lastmod>2018-10-25T15:55:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-imperva-java-sdk-greasing-the-wheels-for-active-directory-coding-projects-2/</loc>
		<lastmod>2018-10-25T16:01:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-do-you-fight-a-12b-fraud-problem-one-scammer-at-a-time/</loc>
		<lastmod>2018-10-25T16:11:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/microsoft-is-the-most-spoofed-company-in-phishing-emails/</loc>
		<lastmod>2018-10-25T17:51:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/nation-state-hackers-greyenergy-target-ukraines-power-grid/</loc>
		<lastmod>2018-10-25T17:51:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/lessons-from-the-equation-group-situational-awareness-and-opsec/</loc>
		<lastmod>2018-10-25T17:54:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/mountains-are-to-icebergs-like-user-identities-are-to-machine-identities/</loc>
		<lastmod>2018-10-25T17:01:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/nta-the-big-step-theory/</loc>
		<lastmod>2018-10-25T17:22:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cloudera-and-hortonworks-merge/</loc>
		<lastmod>2018-10-25T17:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-josh-pitts-i-can-be-apple-and-so-can-you/</loc>
		<lastmod>2018-10-25T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-dos-and-donts-of-using-active-directory-in-your-organization/</loc>
		<lastmod>2018-10-25T19:16:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/sans-barclays-webcast-why-trust-is-essential-and-encryption-is-hard/</loc>
		<lastmod>2018-10-25T20:07:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/webinar-automating-security-controls-using-models-and-security-orchestration/</loc>
		<lastmod>2018-10-25T20:16:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/want-to-close-the-software-security-skills-gap-tanya-janca-says-start-mentoring/</loc>
		<lastmod>2018-10-25T21:14:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-demonbot-discovered/</loc>
		<lastmod>2018-10-25T21:14:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/owasp-top-10-security-risks-part-ii/</loc>
		<lastmod>2018-10-25T21:14:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/picture-perfect-how-to-drive-the-best-shopping-experiences-with-the-right-images/</loc>
		<lastmod>2018-10-25T21:31:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ensuring-online-safety-at-work-with-cyber-security-training/</loc>
		<lastmod>2018-10-25T22:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/luke-kingma-and-lou-patrick-mackays-futurism-doorbell-roboringers/</loc>
		<lastmod>2018-10-25T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-sean-metcalfs-from-workstation-to-domain-admin-why-secure-administration-isnt-secure-and-how-to-fix-it/</loc>
		<lastmod>2018-10-26T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/improving-incident-response-time-with-smarter-network-security-tools/</loc>
		<lastmod>2018-10-26T04:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/securing-the-future-of-blockchain-in-asia-pacific/</loc>
		<lastmod>2018-10-26T07:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/setting-up-a-free-tls-ssl-certificate-with-lets-encrypt/</loc>
		<lastmod>2018-10-26T07:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/what-are-the-challenges-of-using-open-source-cybersecurity-tools/</loc>
		<lastmod>2018-10-26T07:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/hack-naked-news-episode-british-airways-and-newegg-hacks/</loc>
		<lastmod>2018-10-26T07:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-build-adds-detection-for-csp-sri-node-js-source-disclosure-and-ghostscript-rce-vulnerabilities/</loc>
		<lastmod>2018-10-26T07:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/acunetix-v12-review-for-enterprise-customers-on-firewall-cx/</loc>
		<lastmod>2018-10-26T07:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-alert-lack-of-trust-comes-with-a-high-price-tag-for-u-s-businesses/</loc>
		<lastmod>2018-10-26T08:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/healthcare-gov-detects-significant-breach-on-enrollment-exchanges/</loc>
		<lastmod>2018-10-26T08:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-good-the-bad-and-the-weird/</loc>
		<lastmod>2018-10-26T10:50:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/apple-graykey-google/</loc>
		<lastmod>2018-10-26T11:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-minutes-with-andy-smith-intercity-security-operations-centre-manager-isoc/</loc>
		<lastmod>2018-10-26T11:57:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/23-year-old-woman-charged-with-stealing-320000-worth-of-cryptocurrency/</loc>
		<lastmod>2018-10-26T13:41:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/us-counters-russian-influence-magecart-hacks-magento-avast/</loc>
		<lastmod>2018-10-26T13:44:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/fortinet-to-sponsor-the-mef18-global-networking-event/</loc>
		<lastmod>2018-10-26T13:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ddos-for-hire-service-powered-by-bushido-botnet/</loc>
		<lastmod>2018-10-26T13:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/detecting-deep-fakes/</loc>
		<lastmod>2018-10-26T14:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-phishing-trends-old-tactics-and-security-awareness-cyberspeak-podcast/</loc>
		<lastmod>2018-10-26T14:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-data-industrial-complex/</loc>
		<lastmod>2018-10-26T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/politics-themed-spam-spikes-weeks-ahead-of-elections/</loc>
		<lastmod>2018-10-26T15:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/russian-woman-is-first-charged-with-interference-in-2018-midterm-elections/</loc>
		<lastmod>2018-10-26T15:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/west-haven-connecticut-pays-2000-ransom-to-recover-encrypted-data/</loc>
		<lastmod>2018-10-26T15:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/experts-fear-voting-machines-already-infected-with-malware/</loc>
		<lastmod>2018-10-26T15:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/election-system-hack-attempts-accelerate-ahead-of-us-midterms-according-to-us-homeland-security/</loc>
		<lastmod>2018-10-26T15:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/progress-securing-elections-in-2018-us-still-using-outdated-machines/</loc>
		<lastmod>2018-10-26T15:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cylance-report-reveals-malware-and-tactics-of-oceanlotus-group-and-weakness-of-traditional-av/</loc>
		<lastmod>2018-10-26T15:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/3-hack-attacks-that-are-scarier-than-the-lame-halloween-costume-youre-wearing-to-work-next-week/</loc>
		<lastmod>2018-10-26T15:33:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-data-analytics-courses/</loc>
		<lastmod>2018-10-26T16:43:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ba-website-hijacked-by-magecart-again-avast/</loc>
		<lastmod>2018-10-26T16:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/best-practices-for-ultra-low-latency-streaming-using-chunked-encoded-and-chunk-transferred-cmaf/</loc>
		<lastmod>2018-10-26T17:19:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/from-mainframes-to-connected-cars-how-software-drives-the-automotive-industry/</loc>
		<lastmod>2018-10-26T17:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-ways-ops-can-help-before-during-and-after-a-breach/</loc>
		<lastmod>2018-10-26T17:47:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/turning-the-tables-on-hackers-with-mdr/</loc>
		<lastmod>2018-10-26T17:51:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-zerosum0x0s-ms17-010/</loc>
		<lastmod>2018-10-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/more-on-the-bloomberg-claims/</loc>
		<lastmod>2018-10-26T19:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/saskmade-net-redirects/</loc>
		<lastmod>2018-10-26T19:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/mirai-co-author-gets-6-months-confinement-8-6m-in-fines-for-rutgers-attacks/</loc>
		<lastmod>2018-10-26T20:36:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ioactive-highlights-security-issues-and-concerns-for-smart-cities/</loc>
		<lastmod>2018-10-26T20:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/6-best-computer-forensic-analysis-tools/</loc>
		<lastmod>2018-10-26T22:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-carnot-cycle/</loc>
		<lastmod>2018-10-26T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-strategies-to-lock-hackers-out-of-your-website/</loc>
		<lastmod>2018-10-26T23:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/analysis-inspecting-mach-messages-in-macos-kernel-mode-part-ii-sniffing-the-received-mach-messages/</loc>
		<lastmod>2018-10-27T01:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/analysis-inspecting-mach-messages-in-macos-kernel-mode-part-i-sniffing-the-sent-mach-messages/</loc>
		<lastmod>2018-10-27T01:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-maturity-models-part-1-of-2/</loc>
		<lastmod>2018-10-27T01:24:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-lee-christensen-will-schroeder-and-matt-nelsons-the-unintended-risks-of-trusting-active-directory/</loc>
		<lastmod>2018-10-27T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/systemd-is-bad-parsing-and-should-feel-bad/</loc>
		<lastmod>2018-10-27T11:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-key-benefits-of-upgrading-your-companys-cybersecurity/</loc>
		<lastmod>2018-10-27T13:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/join-the-club/</loc>
		<lastmod>2018-10-27T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/on-aging-software/</loc>
		<lastmod>2018-10-27T16:53:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-aaron-d-campbells-lessons-learned-by-the-wordpress-security-team/</loc>
		<lastmod>2018-10-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-joy-of-techs-talking-about-drugs/</loc>
		<lastmod>2018-10-27T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-marcello-salvatis-ironpython-omfg/</loc>
		<lastmod>2018-10-28T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/architectural-paths-for-evolving-the-dns/</loc>
		<lastmod>2018-10-28T13:39:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/isoc-paper-targeting-border-gateway-protocl-routing-and-trust/</loc>
		<lastmod>2018-10-28T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-walter-legowskis-invoke-empirehound-merging-bloodhound-and-empire-for-enhanced-red-team-workflow/</loc>
		<lastmod>2018-10-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/robert-m-lee-and-jeff-hass-little-bobby-comics-like-the-shake-weight/</loc>
		<lastmod>2018-10-28T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/stretching-your-security-budget-dollars/</loc>
		<lastmod>2018-10-29T00:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-richie-cyrus-when-macs-come-under-attck/</loc>
		<lastmod>2018-10-29T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/spy-apps-and-stalkerware-with-special-guest-jeff-tang-wb40/</loc>
		<lastmod>2018-10-29T04:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-insights-from-the-2018-verizon-dbir/</loc>
		<lastmod>2018-10-29T04:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/if-firm-implies-secure-does-that-imply-my-firmware-is-secure/</loc>
		<lastmod>2018-10-29T04:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/directory-traversal-dubbed-zipslip-vulnerability-discovered-in-deeplearning4j-archiveutils/</loc>
		<lastmod>2018-10-29T04:24:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/state-of-the-states-for-tech-and-cyber/</loc>
		<lastmod>2018-10-29T06:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/executive-commentary-the-cathay-pacific-data-breach/</loc>
		<lastmod>2018-10-29T07:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/uks-ico-fines-facebook-500000-for-cambridge-analytica-scandal/</loc>
		<lastmod>2018-10-29T07:47:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/guest-essay-a-guide-to-implementing-best-security-practices-before-the-inevitable-breach/</loc>
		<lastmod>2018-10-29T08:56:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ssd-advisory-chrome-appcache-subsystem-sbx-by-utilizing-a-use-after-free/</loc>
		<lastmod>2018-10-29T10:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ssd-advisory-chrome-type-confusion-in-jscreateobject-operation-to-rce/</loc>
		<lastmod>2018-10-29T10:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-contract-migration-works/</loc>
		<lastmod>2018-10-29T10:50:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/what-is-fileless-malware/</loc>
		<lastmod>2018-10-29T10:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/man-ordered-to-pay-8-6-million-for-launching-ddos-attacks-against-rutgers-university/</loc>
		<lastmod>2018-10-29T12:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/what-skiing-taught-me-about-managing-digital-risk-be-prepared/</loc>
		<lastmod>2018-10-29T12:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/league-of-legends-gamers-targeted-by-phishing-scam-avast/</loc>
		<lastmod>2018-10-29T13:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/data-encryption-from-good-to-have-to-must-have/</loc>
		<lastmod>2018-10-29T14:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/a-book-review-of-pentesting-azure-applications-by-matt-burrough-2/</loc>
		<lastmod>2018-10-29T14:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-security-priorities-for-government-agencies-as-tic-3-0-is-announced/</loc>
		<lastmod>2018-10-29T14:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/pci-london-january-2019/</loc>
		<lastmod>2018-10-29T14:57:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/my-thoughts-exactly/</loc>
		<lastmod>2018-10-29T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/2018-issa-international-conference/</loc>
		<lastmod>2018-10-29T15:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/customer-engagement-summit-2018/</loc>
		<lastmod>2018-10-29T15:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/a-book-review-of-learning-malware-analysis-by-monnappa-ka-2/</loc>
		<lastmod>2018-10-29T15:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/phishing-with-invisible-ink/</loc>
		<lastmod>2018-10-29T16:36:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/search-for-chrome-on-bing-and-you-might-get-a-nasty-surprise/</loc>
		<lastmod>2018-10-29T15:54:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/connected-shopping-carts-create-convenience-new-cybersecurity-challenges-for-grocery-stores/</loc>
		<lastmod>2018-10-29T15:55:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/week-43-cyberattack-digest-2018-wife-lovers-cathay-pacific-airways-obamacare-and-others/</loc>
		<lastmod>2018-10-29T16:26:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/breaking-down-drive-by-phishing-attacks/</loc>
		<lastmod>2018-10-29T16:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/getting-buy-in-for-your-security-awareness-program/</loc>
		<lastmod>2018-10-29T16:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-hire-a-data-protection-officer/</loc>
		<lastmod>2018-10-29T16:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/tcg-member-infineon-announces-first-tpm-for-auto-security/</loc>
		<lastmod>2018-10-29T17:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/video-blockchain-hacking-for-investigating-cryptocurrencies/</loc>
		<lastmod>2018-10-29T17:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/what-does-it-mean-to-be-dfars-compliant-in-2018/</loc>
		<lastmod>2018-10-29T18:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-create-an-employee-cybersecurity-awareness-strategy/</loc>
		<lastmod>2018-10-29T18:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/dam-not-moving-to-the-cloud/</loc>
		<lastmod>2018-10-29T18:26:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-nick-delewskis-and-saurabh-harits-abusing-iot-medical-devices-for-your-precious-health-records/</loc>
		<lastmod>2018-10-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/greyenergy-malware-targets-industrial-critical-infrastructure/</loc>
		<lastmod>2018-10-29T20:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/web-marketers-should-learn-security/</loc>
		<lastmod>2018-10-29T19:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-center-for-internet-security-cis-top-20-critical-security-controls/</loc>
		<lastmod>2018-10-29T22:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cpni-customer-proprietary-network-information-overview-and-key-takeaways/</loc>
		<lastmod>2018-10-29T22:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/what-are-the-benefits-of-c-tpat-in-2018/</loc>
		<lastmod>2018-10-29T22:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/xkcd-im-a-car/</loc>
		<lastmod>2018-10-29T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/10-29-2018-dtex-insider-threat-privacy-news-wyatt-wilcox-provide-fed-with-insider-threat-risk-reduction-advice-nist-privacy-risk-framework-catching-on/</loc>
		<lastmod>2018-10-29T23:42:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/503-million-stolen-by-criminals-through-authorized-and-unauthorized-fraud/</loc>
		<lastmod>2018-10-30T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bromium-announces-capture-the-flag-byom-challenge/</loc>
		<lastmod>2018-10-30T00:37:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-michael-goughs-detecting-wmi-exploitation/</loc>
		<lastmod>2018-10-30T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/why-organizations-should-use-a-soar-solution-for-roi-and-mttr-tracking/</loc>
		<lastmod>2018-10-30T03:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/women-in-information-security-claire-reckless/</loc>
		<lastmod>2018-10-30T03:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-masquerade-ball-train-yourself-to-detect-spoofed-files/</loc>
		<lastmod>2018-10-30T03:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/public-sector-tech-security-take-care-before-a-catastrophe-occurs/</loc>
		<lastmod>2018-10-30T08:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/82-of-it-execs-fear-criminals-will-soon-adopt-machine-learning-to-create-more-advanced-threats/</loc>
		<lastmod>2018-10-30T09:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/immediate-steps-organizations-need-to-do-now-post-ncsam/</loc>
		<lastmod>2018-10-30T11:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cell-phone-security-and-heads-of-state/</loc>
		<lastmod>2018-10-30T11:38:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/why-traditional-security-isnt-enough/</loc>
		<lastmod>2018-10-30T12:49:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/is-it-a-phish-halloween-edition/</loc>
		<lastmod>2018-10-30T12:49:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/browser-isolation-eliminates-risk-in-context/</loc>
		<lastmod>2018-10-30T13:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-create-a-threat-model-for-cloud-infrastructure-security-2/</loc>
		<lastmod>2018-10-30T14:10:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-russian-troll-farms-infiltrated-american-society-and-destabilized-politics/</loc>
		<lastmod>2018-10-30T13:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-cyber-world-is-scary-enough-have-you-built-security-in-all-the-right-places/</loc>
		<lastmod>2018-10-30T13:44:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/complying-with-pci-standards-why-risk-losing-customers-via-stolen-pci/</loc>
		<lastmod>2018-10-30T14:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/hold-all-alerts-with-do-not-disturb-mode-avast/</loc>
		<lastmod>2018-10-30T14:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/securing-iiot-requires-extra-care/</loc>
		<lastmod>2018-10-30T14:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/gandcrab-the-most-popular-multi-million-dollar-ransomware-of-the-year/</loc>
		<lastmod>2018-10-30T14:59:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/malware-infection-at-usgs-traced-to-employees-habit-of-viewing-adult-content/</loc>
		<lastmod>2018-10-30T14:59:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/us-intelligence-tells-russian-agents-in-direct-messages-to-stop-seeding-discord-ahead-of-2018-midterms/</loc>
		<lastmod>2018-10-30T14:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/us-election-security-central-daily-report-thursday-25-october-2018/</loc>
		<lastmod>2018-10-30T14:59:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/trump-says-china-meddling-in-midterm-elections-social-networks-say-theres-no-proof/</loc>
		<lastmod>2018-10-30T14:59:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/us-election-security-central-daily-report-wednesday-24-october-2018/</loc>
		<lastmod>2018-10-30T14:59:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bitdefender-identifies-major-fake-news-website-farm-ramping-up-social-traffic/</loc>
		<lastmod>2018-10-30T14:59:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/greg-ross-a-modest-proposal/</loc>
		<lastmod>2018-10-30T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-ins-and-outs-of-insider-threats/</loc>
		<lastmod>2018-10-30T15:13:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/office-365-and-the-long-tail-of-saas-apps-at-gartner-symposium/</loc>
		<lastmod>2018-10-30T15:13:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bitglass-golden-bridge-winner-and-sinet-16-innovator/</loc>
		<lastmod>2018-10-30T15:13:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-next-gen-casb-securing-office-365-and-outlasting-the-competition/</loc>
		<lastmod>2018-10-30T15:13:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bitglass-security-spotlight-uber-apollo-chegg/</loc>
		<lastmod>2018-10-30T15:13:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/msft-azure-ad-conditional-access-vs-casb/</loc>
		<lastmod>2018-10-30T15:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/data-breaches-on-the-rise-in-financial-services/</loc>
		<lastmod>2018-10-30T15:13:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cloud-access-security-brokers-and-cyber-security-chicago/</loc>
		<lastmod>2018-10-30T15:13:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bitglass-security-spotlight-veeam-mongo-lock-password-theft/</loc>
		<lastmod>2018-10-30T15:13:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-protect-data-in-a-byod-world/</loc>
		<lastmod>2018-10-30T15:13:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-million-dollar-question-of-cyber-risk-invest-now-or-pay-later/</loc>
		<lastmod>2018-10-30T15:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/state-of-software-security-volume-9-top-5-takeaways-for-cisos/</loc>
		<lastmod>2018-10-30T15:29:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/data-loss-isnt-just-an-old-ghost-story/</loc>
		<lastmod>2018-10-30T15:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/facebook-executives-ignored-ukraines-warnings-about-russian-troll-farms-investigation-reveals/</loc>
		<lastmod>2018-10-30T16:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/chinese-russian-spies-reportedly-monitor-trumps-iphone-conversations/</loc>
		<lastmod>2018-10-30T16:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/innovation-doesnt-do-well-in-a-vacuum/</loc>
		<lastmod>2018-10-30T16:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/to-err-is-human-cybersecurity-training-your-employees/</loc>
		<lastmod>2018-10-30T16:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/report-friday-26-october-2018/</loc>
		<lastmod>2018-10-30T17:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-matthew-toussains-gryffindor-pure-javascript-covert-exploitation/</loc>
		<lastmod>2018-10-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/2019-planning-guide-for-security-and-risk-management/</loc>
		<lastmod>2018-10-30T19:05:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/management-mayhem-part-1-how-many-machine-identities-do-you-need-to-protect/</loc>
		<lastmod>2018-10-30T19:37:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/observations-from-openworld-2018/</loc>
		<lastmod>2018-10-30T19:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/symantec-endpoint-protection-product-review/</loc>
		<lastmod>2018-10-30T20:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/pmp%ef%b8%8f-domain-4-monitoring-and-controlling/</loc>
		<lastmod>2018-10-30T20:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/pmp-domain-3-executing/</loc>
		<lastmod>2018-10-30T20:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/pmp-domain-1-initiating/</loc>
		<lastmod>2018-10-30T20:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-red-teaming-and-blue-teaming-complement-each-other/</loc>
		<lastmod>2018-10-30T20:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/everything-you-need-to-know-about-red-teaming-in-2018/</loc>
		<lastmod>2018-10-30T20:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/letsencrypt-the-free-https-certificate-generator-product-overview/</loc>
		<lastmod>2018-10-30T22:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/a-brief-introduction-to-the-openvas-vulnerability-scanner/</loc>
		<lastmod>2018-10-30T22:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-dangers-of-https-and-extended-validation-certificates/</loc>
		<lastmod>2018-10-30T22:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/taking-an-identity-selfie-self-sovereign-identity-and-the-blockchain/</loc>
		<lastmod>2018-10-30T22:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/top-10-endpoint-protection-software-solutions/</loc>
		<lastmod>2018-10-30T22:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/trend-micro-endpoint-encryption-data-protection-solution-product-overview/</loc>
		<lastmod>2018-10-30T22:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/sophos-endpoint-protection-product-overview/</loc>
		<lastmod>2018-10-30T22:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/crowdstrike-cloud-delivered-endpoint-protection-product-overview/</loc>
		<lastmod>2018-10-30T22:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-joy-of-techs-scary-halloween-costumes/</loc>
		<lastmod>2018-10-30T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cooking-up-digital-privacy-indecent-data-exposure-and-just-another-zero-day/</loc>
		<lastmod>2018-10-30T23:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-magecart-cybercrime-group-is-threatening-e-commerce-websites-worldwide/</loc>
		<lastmod>2018-10-30T23:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/comptia-it-fundamentals-certification-an-overview/</loc>
		<lastmod>2018-10-30T23:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/6-step-security-awareness-checklist-for-college-students/</loc>
		<lastmod>2018-10-30T23:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-sevillage-at-derbycon-was-ah-mazing/</loc>
		<lastmod>2018-10-30T23:34:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bitdefender-finds-hackers-targeting-high-profile-us-election-candidates-using-fake-domains-with-fake-scandals/</loc>
		<lastmod>2018-10-30T23:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/report-monday-29-october-2018/</loc>
		<lastmod>2018-10-30T23:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/building-a-multi-cloud-logging-strategy-issues-and-pitfalls/</loc>
		<lastmod>2018-10-31T01:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-mick-douglas-josh-johnsons-instant-response-making-ir-faster-than-you-thought-possible/</loc>
		<lastmod>2018-10-31T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/protecting-critical-infrastructure-why-cyber-security-is-important/</loc>
		<lastmod>2018-10-31T03:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-types-of-malware-currently-affecting-macos/</loc>
		<lastmod>2018-10-31T03:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/fortnite-scams-google-search-privacy-bloomberg-supermicro-controversy-81/</loc>
		<lastmod>2018-10-31T04:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ransomware-leakware-scareware-oh-my/</loc>
		<lastmod>2018-10-31T07:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ai-helps-enterprises-conquer-it-speed-and-complexity/</loc>
		<lastmod>2018-10-31T08:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/want-to-make-100-million-from-hacking-steal-press-releases/</loc>
		<lastmod>2018-10-31T10:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/protecting-the-nhs-from-the-consequences-of-cybercrime/</loc>
		<lastmod>2018-10-31T11:01:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/kraken-ransomware-now-being-distributed-by-fallout-exploit-kit/</loc>
		<lastmod>2018-10-31T11:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/yes-you-should-update-your-iphone-to-ios-12-1-but-its-lock-screen-is-still-unsafe/</loc>
		<lastmod>2018-10-31T11:57:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/nozomi-networks-accenture-secure-global-industrial-infrastructures/</loc>
		<lastmod>2018-10-31T13:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-hackers-exploit-online-games/</loc>
		<lastmod>2018-10-31T13:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/insider-threats-keeping-the-cyber-boogeyman-out/</loc>
		<lastmod>2018-10-31T13:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/avast-discontinues-support-for-windows-xp-vista-avast/</loc>
		<lastmod>2018-10-31T13:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/premier-one-transforms-patch-management-with-managed-workplace-avast-business/</loc>
		<lastmod>2018-10-31T13:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-opportunity-with-automation-for-mssps-today/</loc>
		<lastmod>2018-10-31T13:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/threat-hunting-and-epp-more-important-now-than-ever/</loc>
		<lastmod>2018-10-31T14:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-revenge-of-the-ai-assistants/</loc>
		<lastmod>2018-10-31T14:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/meanwhile-in-news-of-the-coming-software-apocalypse/</loc>
		<lastmod>2018-10-31T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/digital-transformation-take-advantage-of-application-delivery-in-your-journey/</loc>
		<lastmod>2018-10-31T15:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/bens-book-of-the-month-review-of-security-without-obscurity-a-guide-to-cryptographic-architectures/</loc>
		<lastmod>2018-10-31T16:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/illinois-invests-7-million-in-cybersecurity-to-prevent-election-hacking/</loc>
		<lastmod>2018-10-31T16:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/many-states-reject-dhs-offer-to-check-election-systems-for-flaws-saying-theyre-safe-from-hackers/</loc>
		<lastmod>2018-10-31T16:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/alleged-russian-operative-infiltrated-dc-circles-studied-us-cyber-strategies/</loc>
		<lastmod>2018-10-31T16:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/expert-china-has-both-the-playbook-and-the-capacity-to-interfere-in-us-elections/</loc>
		<lastmod>2018-10-31T16:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/website-security-tips-for-marketers/</loc>
		<lastmod>2018-10-31T17:14:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/report-tuesday-30-october-2018/</loc>
		<lastmod>2018-10-31T17:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/8-things-that-go-bump-in-your-browser-not-only-at-night/</loc>
		<lastmod>2018-10-31T17:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/thwart-money-laundering-with-dimensionality-reduction/</loc>
		<lastmod>2018-10-31T18:42:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cyber-pearl-harbor-unlikely-but-critical-infrastructure-needs-a-major-upgrade-ncsam-at-synopsys/</loc>
		<lastmod>2018-10-31T18:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cyber-security-roundup-for-october-2018/</loc>
		<lastmod>2018-10-31T18:48:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-winn-schwartaus-the-history-of-the-future-of-cyber-education/</loc>
		<lastmod>2018-10-31T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/trusted-computing-group-japan-regional-forum-to-host-discussion-of-blockchain-technology/</loc>
		<lastmod>2018-10-31T19:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/vulnhub-machines-walkthrough-series-vulnosv2/</loc>
		<lastmod>2018-10-31T20:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/guest-blog-introduction-to-the-agile-data-lake/</loc>
		<lastmod>2018-10-31T20:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-regulatory-impacts-of-phishing-attacks/</loc>
		<lastmod>2018-10-31T21:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/camubot-banking-malware-stands-out-for-its-ability-to-bypass-biometric-authentication/</loc>
		<lastmod>2018-10-31T21:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/vulnhub-machines-walkthrough-series-skytower/</loc>
		<lastmod>2018-10-31T21:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/police-raid-illegal-call-centers-linked-to-cra-phone-scam/</loc>
		<lastmod>2018-10-31T22:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/golden-eye-1-ctf-walkthrough-part-2/</loc>
		<lastmod>2018-10-31T22:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/best-practices-for-threat-hunting-in-large-networks/</loc>
		<lastmod>2018-10-31T22:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/top-30-malware-analyst-interview-questions-and-answers-for-2018/</loc>
		<lastmod>2018-10-31T22:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/daniel-storis-turnoff-us-developer-costumes/</loc>
		<lastmod>2018-10-31T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/major-web-browsers-will-be-dropping-tls-1-0-and-1-1-support-soon/</loc>
		<lastmod>2018-10-31T23:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/a-guide-to-gdpr-compliant-call-recordings/</loc>
		<lastmod>2018-11-01T02:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/derbycon-2018-vishal-chauhans-state-of-win32k-security-revisiting-insecure-design/</loc>
		<lastmod>2018-11-01T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/redefining-the-meaning-of-operational-risk/</loc>
		<lastmod>2018-11-01T04:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/masscan-and-massive-address-lists/</loc>
		<lastmod>2018-11-01T05:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/money20-20-usa-part-i-revolution-or-evolution/</loc>
		<lastmod>2018-11-01T07:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/high-churn-rate-in-healthcare-may-help-explain-sectors-vulnerability-to-phishing-research-suggests/</loc>
		<lastmod>2018-11-01T09:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/part-3-risk-treatment-the-iso-27001-statement-of-applicability/</loc>
		<lastmod>2018-11-01T10:51:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/this-is-america-the-voice-of-the-consumer/</loc>
		<lastmod>2018-11-01T11:46:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-secure-is-your-digital-presence/</loc>
		<lastmod>2018-11-01T11:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tripwire-patch-priority-index-for-october-2018/</loc>
		<lastmod>2018-11-01T12:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/two-firms-fined-220000-by-ico-for-making-600000-nuisance-calls/</loc>
		<lastmod>2018-11-01T12:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/employee-used-us-government-network-for-adult-websites-infected-infrastructure-with-russian-malware/</loc>
		<lastmod>2018-11-01T13:36:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-potential-for-biometric-facial-recognition-and-authentication/</loc>
		<lastmod>2018-11-01T13:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-transformation-the-key-to-successful-digital-transformation/</loc>
		<lastmod>2018-11-01T13:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cloud-compliance-for-financial-companies-requires-a-merger-of-three-disciplines/</loc>
		<lastmod>2018-11-01T13:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/avast-business-cybersecurity-skills-series-are-you-registered-avast-business/</loc>
		<lastmod>2018-11-01T14:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/carnegie-mellons-sei-best-practices-for-security-in-cloud-computing/</loc>
		<lastmod>2018-11-01T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/sfissas-2018-hack-the-flag-and-chili-cookoff/</loc>
		<lastmod>2018-11-01T15:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/synopsys-software-integrity-group-awards-for-2018/</loc>
		<lastmod>2018-11-01T15:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/aws-security-best-practices-aws-lambda-security-design-for-failure/</loc>
		<lastmod>2018-11-01T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/national-encryption-policy-looms-large/</loc>
		<lastmod>2018-11-01T17:02:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/pros-and-cons-of-dns-over-https/</loc>
		<lastmod>2018-11-01T16:12:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/malicious-python-packages-provide-a-backdoor-to-the-careless-coder/</loc>
		<lastmod>2018-11-01T17:16:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-tech-how-adaptive-multi-factor-authentication-is-gaining-traction-via-partnerships/</loc>
		<lastmod>2018-11-01T16:18:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/china-turns-to-insiders-in-latest-move-to-win-economic-cyber-war/</loc>
		<lastmod>2018-11-01T17:25:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cybersecurity-talent-will-your-company-ride-the-wave-or-drown-in-the-tsunami/</loc>
		<lastmod>2018-11-01T16:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/persistence-of-samsam-ransomeware-attacks-highlight-basic-security-flaws/</loc>
		<lastmod>2018-11-01T17:35:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/triton-framework-exposes-russias-craft-in-scada-attacks/</loc>
		<lastmod>2018-11-01T17:36:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/finding-phishing-sites-with-ct/</loc>
		<lastmod>2018-11-01T16:44:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/equifax-has-chosen-experian-wait-what/</loc>
		<lastmod>2018-11-01T16:47:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cta-security-playbook-goblin-panda/</loc>
		<lastmod>2018-11-01T16:59:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/report-wednesday-31-october-2018/</loc>
		<lastmod>2018-11-01T17:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/u-s-intel-prepared-to-sanction-any-company-or-individual-interfering-with-the-2018-midterms/</loc>
		<lastmod>2018-11-01T17:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/bitglass-named-a-leader-in-gartners-2018-magic-quadrant-for-casb/</loc>
		<lastmod>2018-11-01T17:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/meet-the-teen-who-won-technovation-2017/</loc>
		<lastmod>2018-11-01T17:31:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/developer-tooling-a-new-hope/</loc>
		<lastmod>2018-11-01T18:09:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/making-the-philosophical-case-a-privacy-first-security-approach/</loc>
		<lastmod>2018-11-01T18:11:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cta-adversary-playbook-goblin-panda/</loc>
		<lastmod>2018-11-01T18:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-michael-webers-offensive-browser-extension-development/</loc>
		<lastmod>2018-11-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/simple-to-use-link-availability-solutions/</loc>
		<lastmod>2018-11-01T19:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/zero-day-protection-of-ssh-servers-with-zero-trust-access/</loc>
		<lastmod>2018-11-01T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/buzzword-or-security-standard-zero-trust-software-defined-perimeter-beyondcorp/</loc>
		<lastmod>2018-11-01T19:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cisco-and-luminate-partner-to-provide-zero-trust-access-model/</loc>
		<lastmod>2018-11-01T19:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/aws-ec2-tagging-an-overview-2/</loc>
		<lastmod>2018-11-01T20:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/attack-overview-video-2/</loc>
		<lastmod>2018-11-01T20:22:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-securityorb-show-an-interview-with-haiti-cybercon-co-founder-michel-arbrouet/</loc>
		<lastmod>2018-11-01T20:22:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-display-a-warning-banner-before-the-login-prompt/</loc>
		<lastmod>2018-11-01T20:22:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/is-digital-privacy-a-right-or-a-privilege/</loc>
		<lastmod>2018-11-01T20:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/national-cyber-security-awareness-month-week-1-make-your-home-a-haven-for-online-security/</loc>
		<lastmod>2018-11-01T20:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cyberwar-season-1-episode-3-cyber-mercenaries/</loc>
		<lastmod>2018-11-01T20:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/ex-facebook-security-boss-u-s-elections-risk-becoming-world-cup-of-information-warfare/</loc>
		<lastmod>2018-11-01T20:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/book-review-of-practical-cyber-intelligence-by-wilson-bautista-jr/</loc>
		<lastmod>2018-11-01T20:22:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-history-of-javascript-infographic/</loc>
		<lastmod>2018-11-01T20:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-new-age-of-applications-and-what-it-means-for-security/</loc>
		<lastmod>2018-11-01T20:44:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/iot-cloud-portals-a-modern-day-hackers-keys-to-the-kingdom/</loc>
		<lastmod>2018-11-01T20:44:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/api-security-checklist-top-7-requirements/</loc>
		<lastmod>2018-11-01T20:44:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/too-busy-tuning-your-waf-to-realize-you-dont-have-to/</loc>
		<lastmod>2018-11-01T20:44:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-to-adequately-account-for-and-secure-iot-devices/</loc>
		<lastmod>2018-11-01T20:44:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/using-the-web-app-kill-chain-to-identify-neutralize-threats/</loc>
		<lastmod>2018-11-01T20:44:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/facing-the-apache-struts-vulnerability-with-confidence-using-threat-x/</loc>
		<lastmod>2018-11-01T20:44:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/google-now-requires-you-to-enable-javascript-to-sign-in-as-part-of-its-enhanced-security-features/</loc>
		<lastmod>2018-11-01T21:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/tim-berners-lees-solid-trick-or-treat/</loc>
		<lastmod>2018-11-01T21:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/apple-t2-security-chip-has-touch-id-security-enclave-hardware-to-prevent-microphone-eavesdropping-amongst-many-other-features/</loc>
		<lastmod>2018-11-01T21:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/machine-generated-videos-like-deepfakes-trick-or-treat/</loc>
		<lastmod>2018-11-01T21:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/twitter-plans-to-disable-the-like-button-to-promote-healthy-conversations-should-retweet-be-removed-instead/</loc>
		<lastmod>2018-11-01T21:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-flock-program-provides-grants-to-aragon-teams-worth-1-million/</loc>
		<lastmod>2018-11-01T21:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/google-launches-score-based-recaptcha-v3-to-filter-abusive-traffic-on-websites/</loc>
		<lastmod>2018-11-01T21:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/signal-to-roll-out-a-new-privacy-feature-in-beta-that-conceals-senders-identity/</loc>
		<lastmod>2018-11-01T21:04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/social-media-platforms-twitter-and-gab-com-accused-of-facilitating-recent-domestic-terrorism-in-the-u-s/</loc>
		<lastmod>2018-11-01T21:04:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/apple-and-amazon-take-punitive-action-against-bloombergs-misinformed-hacking-story/</loc>
		<lastmod>2018-11-01T21:04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/lets-go-fight-it-for-logs-agents-taps/</loc>
		<lastmod>2018-11-01T22:55:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/xkcd-ballot-selfies/</loc>
		<lastmod>2018-11-01T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/node-1-ctf-walkthrough/</loc>
		<lastmod>2018-11-01T23:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/pluses-and-pitfalls-of-repo-stream/</loc>
		<lastmod>2018-11-02T02:55:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-leo-loobeeks-protect-your-payloads-modern-keying-techniques/</loc>
		<lastmod>2018-11-02T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/yapbs-yet-another-password-breach-scam/</loc>
		<lastmod>2018-11-02T03:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-vulnerable-is-the-presidential-alert-system/</loc>
		<lastmod>2018-11-02T03:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/zimperium-zlabs-discloses-a-new-critical-vulnerability-in-multiple-high-privileged-android-services-to-google/</loc>
		<lastmod>2018-11-02T06:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/why-no-cyber-9-11-for-15-years/</loc>
		<lastmod>2018-11-02T06:57:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/money-20-20-usa-part-ii-revolution-or-evolution/</loc>
		<lastmod>2018-11-02T07:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/china-accused-of-running-industrial-cyberespionage-operation-to-steal-us-aviation-and-technological-data/</loc>
		<lastmod>2018-11-02T08:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/devsecops-more-work-ahead/</loc>
		<lastmod>2018-11-02T09:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/return-to-sender-the-threat-of-unwanted-sensitive-data-acquisition-via-email/</loc>
		<lastmod>2018-11-02T10:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/eurostar-resets-customer-passwords-after-hack-attack/</loc>
		<lastmod>2018-11-02T10:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-punish-cybercriminals/</loc>
		<lastmod>2018-11-02T11:01:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/social-engineer-newsletter-vol-08-issue-109/</loc>
		<lastmod>2018-11-02T11:21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/russian-hackers-compromise-120-million-facebook-accounts-private-messages-on-sale-online/</loc>
		<lastmod>2018-11-02T12:17:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/complementing-a-security-management-model-with-the-20-critical-security-controls-academic-paper/</loc>
		<lastmod>2018-11-02T12:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/senator-ron-wydens-data-privacy-law-draft-can-punish-tech-companies-that-misuse-user-data/</loc>
		<lastmod>2018-11-02T13:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/webinar-10-emerging-threats-to-todays-enterprise-applications/</loc>
		<lastmod>2018-11-02T13:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-password-protect-a-folder-or-file-in-windows-avast/</loc>
		<lastmod>2018-11-02T14:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/msft-drops-os-ball-again/</loc>
		<lastmod>2018-11-02T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/sms-phishing-cardless-atm-profit/</loc>
		<lastmod>2018-11-02T15:03:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hackers-actively-exploiting-vulnerabilities-in-cisco-security-appliances/</loc>
		<lastmod>2018-11-02T15:14:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/national-cybersecurity-career-awareness-week/</loc>
		<lastmod>2018-11-02T15:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cve-2018-17914/</loc>
		<lastmod>2018-11-02T15:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/pipeda-mdr-breaches-reporting-and-advice/</loc>
		<lastmod>2018-11-02T15:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/more-common-security-mistakes-when-developing-swift-apps-part-ii/</loc>
		<lastmod>2018-11-02T16:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-guide-defeating-an-android-packer-with-frida/</loc>
		<lastmod>2018-11-02T16:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cybersecurity-career-pathway/</loc>
		<lastmod>2018-11-02T16:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/rumors-of-foreign-election-meddling-may-boost-urge-to-vote-in-40-of-americans/</loc>
		<lastmod>2018-11-02T18:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/report-thursday-01-november-2018/</loc>
		<lastmod>2018-11-02T18:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hackers-love-healthcare-voters-fall-prey-to-the-dark-web-avast/</loc>
		<lastmod>2018-11-02T18:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-top-three-cyber-attack-threats-that-cause-a-financial-ciso-to-lose-sleep/</loc>
		<lastmod>2018-11-02T18:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/edr-application-containment-redefining-the-modern-endpoint-security-stack/</loc>
		<lastmod>2018-11-02T18:49:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-nancy-snokes-phoenix-snokes-jump-into-iot-hacking-with-the-damn-vulnerable-habit-helper-device/</loc>
		<lastmod>2018-11-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cybersecurity-is-increasingly-important-for-ma-dealmakers/</loc>
		<lastmod>2018-11-02T21:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-joy-of-techs-wither-the-mac/</loc>
		<lastmod>2018-11-02T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-is-cybercrime-impacting-the-financial-sector-cyberspeak-podcast/</loc>
		<lastmod>2018-11-03T02:13:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-brian-claire-youngs-tales-from-the-bug-mine-highlights-from-the-android-vrp/</loc>
		<lastmod>2018-11-03T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/armis-discovers-bleedingbit-two-critical-chip-level-vulnerabilities/</loc>
		<lastmod>2018-11-03T05:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/uk-needs-to-talk-to-china-to-ensure-cybersecurity/</loc>
		<lastmod>2018-11-03T05:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/securing-your-vote-are-the-2018-elections-protected/</loc>
		<lastmod>2018-11-03T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/eurostar-customers-reset-passwords-after-security-breach/</loc>
		<lastmod>2018-11-03T18:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/continuous-monitoring-academic-paper/</loc>
		<lastmod>2018-11-03T18:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-emily-shawgos-decision-analysis-applications-in-threat-analysis-frameworks/</loc>
		<lastmod>2018-11-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/luke-kingma-and-lou-patrick-mackays-futurism-real-machine-learning/</loc>
		<lastmod>2018-11-03T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-tazz-threat-intel-on-the-fly/</loc>
		<lastmod>2018-11-04T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-rise-and-fall-and-repeat-of-crypto/</loc>
		<lastmod>2018-11-04T12:39:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ssd-advisory-symfony-framework-forward-remote-code-execution/</loc>
		<lastmod>2018-11-04T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-bill-on-capitol-hill-company-execs-would-be-liable-for-data-privacy-failures/</loc>
		<lastmod>2018-11-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/home-security-cameras-and-monitors-open-homes-to-cyber-crimes-avast/</loc>
		<lastmod>2018-11-04T16:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/whos-in-your-online-shopping-cart/</loc>
		<lastmod>2018-11-04T19:10:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-emma-zaballos-make-me-your-dark-web-personal-shopper/</loc>
		<lastmod>2018-11-04T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-portsmash-side-channel-vulnerability-cve-2018-5407/</loc>
		<lastmod>2018-11-04T20:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/u-boot-verified-boot-bypass-vulnerabilities-cve-2018-18439-cve-2018-18440/</loc>
		<lastmod>2018-11-04T21:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/brian-kemp-is-bad-on-cybersecurity/</loc>
		<lastmod>2018-11-04T23:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/major-browsers-coordinated-on-deprecating-tls-1-0-and-1-1/</loc>
		<lastmod>2018-11-05T00:00:00+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->