<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2018/11/robert-m-lees-and-jeff-hass-little-bobby-comics-its-not-a-light-switch/</loc>
		<lastmod>2018-11-05T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/akamai-mentors-next-generations-of-girls-in-tech/</loc>
		<lastmod>2018-11-05T00:36:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-pros-and-cons-to-outsourcing-incident-response/</loc>
		<lastmod>2018-11-05T02:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-joey-marescas-driving-away-social-anxiety/</loc>
		<lastmod>2018-11-05T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/big-data-is-big-business-a-growing-trend-of-user-data-abuse-and-how-to-protect-yourself/</loc>
		<lastmod>2018-11-05T04:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/radiation-isnt-the-only-risk-associated-with-medical-imaging-devices/</loc>
		<lastmod>2018-11-05T04:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/microsoft-and-apple-security-updates-signals-sealed-sender-girl-scouts-data-breach-wb41/</loc>
		<lastmod>2018-11-05T05:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/guest-essay-did-you-know-these-5-types-of-digital-services-are-getting-rich-off-your-private-data/</loc>
		<lastmod>2018-11-05T09:43:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/managing-fraud-in-the-age-of-omnichannel-banking/</loc>
		<lastmod>2018-11-05T11:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/almost-half-of-organizations-have-no-security-operation-center-hindering-detection-of-advanced-threats/</loc>
		<lastmod>2018-11-05T11:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/software-monitoring-for-nerc-cip-compliance-part-1/</loc>
		<lastmod>2018-11-05T12:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/untangle-accelerates-growth-adding-new-partnerships-cloud-based-offerings-and-awards/</loc>
		<lastmod>2018-11-05T13:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/keeping-your-boat-afloat-with-a-cloud-access-security-broker/</loc>
		<lastmod>2018-11-05T13:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cisco-webex-meetings-server-xml-external-entity-cve-2018-18895/</loc>
		<lastmod>2018-11-05T13:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/deeper-down-the-rabbit-hole-second-stage-attack-and-a-fileless-finale/</loc>
		<lastmod>2018-11-05T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-specialized-security-concerns-of-ot-networks/</loc>
		<lastmod>2018-11-05T14:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/clearswift-endpoint-data-loss-prevention/</loc>
		<lastmod>2018-11-05T15:16:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/bgp-route-hijacking/</loc>
		<lastmod>2018-11-05T15:19:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/enhancing-network-performance-with-packet-pacing/</loc>
		<lastmod>2018-11-05T15:37:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/defenseones-why-havent-terrorists-hit-the-us-with-a-devastating-cyber-attack/</loc>
		<lastmod>2018-11-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/isc2-security-congress-2018/</loc>
		<lastmod>2018-11-05T16:10:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-you-need-to-know-about-cryptographic-key-attacks/</loc>
		<lastmod>2018-11-05T17:06:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/10000-twitter-accounts-deleted-for-discouraging-voting-in-us-mid-terms/</loc>
		<lastmod>2018-11-05T18:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/week-44-cyberattack-digest-2018-pakistani-bank-radisson-hotel-group-u-s-geological-survey-and-others/</loc>
		<lastmod>2018-11-05T18:50:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/travel-hacking-for-the-successful-infosec-pro/</loc>
		<lastmod>2018-11-05T19:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-iot-laws-codes-of-practice-could-be-the-new-norm-avast/</loc>
		<lastmod>2018-11-05T19:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/report-monday-04-november-2018/</loc>
		<lastmod>2018-11-05T19:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/russia-sends-mps-to-monitor-accuracy-of-us-midterms/</loc>
		<lastmod>2018-11-05T19:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-justin-hermans-off-grid-coms-and-power/</loc>
		<lastmod>2018-11-05T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/uks-information-commissioners-office-ico-slap-fines-on-facebook-and-equifax/</loc>
		<lastmod>2018-11-05T20:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-pending-u-s-data-breach-prevention-and-compensation-act-of-2018/</loc>
		<lastmod>2018-11-05T21:36:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-wordpress-security-email-course/</loc>
		<lastmod>2018-11-05T21:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/overcoming-cloud-security-challenges/</loc>
		<lastmod>2018-11-05T21:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/keeping-your-data-and-applications-safe-in-the-cloud/</loc>
		<lastmod>2018-11-05T22:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/black-duck-by-synopsys-flight-east-2018-presentations/</loc>
		<lastmod>2018-11-05T22:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-joy-of-techs-makes-his-pitch/</loc>
		<lastmod>2018-11-06T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/smart-home-hacking-at-web-summit-2018-avast/</loc>
		<lastmod>2018-11-06T00:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/11-5-18-dtex-insider-threat-privacy-news-insider-threat-matures-china-intel-officers-recruit-insiders-sen-wyden-disrupts-privacy-again/</loc>
		<lastmod>2018-11-06T00:32:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/securing-your-vote-are-the-2018-elections-protected-it-depends/</loc>
		<lastmod>2018-11-06T01:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-alex-flores-ctfs-leveling-up-through-competition/</loc>
		<lastmod>2018-11-06T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/statistics-canada-asks-for-banking-information-of-500000-canadians/</loc>
		<lastmod>2018-11-06T04:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/watch-out-for-the-programmer-who-cracked-your-email-bitcoin-scam/</loc>
		<lastmod>2018-11-06T04:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/make-sure-you-trust-your-third-party-vendor/</loc>
		<lastmod>2018-11-06T08:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/improving-pipeline-operational-visibility-avoids-costly-downtime/</loc>
		<lastmod>2018-11-06T08:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/old-malware-on-usb-drives-still-pose-potent-threat-to-industrial-facilities-research-shows/</loc>
		<lastmod>2018-11-06T08:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/best-practices-for-containers/</loc>
		<lastmod>2018-11-06T09:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/pci-pal-announces-ninzi-connect-as-first-south-african-channel-partner/</loc>
		<lastmod>2018-11-06T11:05:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hacking-democracy-vulnerable-voting-infrastructure-and-the-future-of-election-security/</loc>
		<lastmod>2018-11-06T11:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/inheriting-psd2-the-constant-struggle-of-are-you-ready/</loc>
		<lastmod>2018-11-06T12:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/qubes-os-4-0-1-rc1-has-been-released/</loc>
		<lastmod>2018-11-06T12:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-cost-of-a-data-breach/</loc>
		<lastmod>2018-11-06T12:38:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/europes-largest-bank-just-got-hacked/</loc>
		<lastmod>2018-11-06T12:41:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ransomware-victims-rights/</loc>
		<lastmod>2018-11-06T12:46:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-online-revolution-of-digital-trends-in-education-technology-2/</loc>
		<lastmod>2018-11-06T12:51:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/are-your-local-elections-at-risk-of-being-hacked/</loc>
		<lastmod>2018-11-06T13:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hsbc-bank-notifies-customers-of-data-breach/</loc>
		<lastmod>2018-11-06T13:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/us-supreme-court-ends-the-net-neutrality-debate-by-rejecting-the-2015-net-neutrality-repeal-allowing-the-internet-to-be-free-and-open-again/</loc>
		<lastmod>2018-11-06T13:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/avast-business-antivirus-pro-plus-awarded-top-product-by-av-test-avast-business/</loc>
		<lastmod>2018-11-06T14:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/protecting-what-matters-defining-data-guardrails-and-behavioral-analytics/</loc>
		<lastmod>2018-11-06T15:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/researchers-crack-disk-encryption-in-popular-samsung-and-crucial-ssds/</loc>
		<lastmod>2018-11-06T15:34:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/your-most-important-task-today/</loc>
		<lastmod>2018-11-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/china-telecom-misdirected-internet-traffic-says-oracle-report/</loc>
		<lastmod>2018-11-06T16:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/buying-open-source/</loc>
		<lastmod>2018-11-06T16:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/negative-impact-of-incorrect-csp-implementations/</loc>
		<lastmod>2018-11-06T16:25:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/data-security-and-nist-compliance/</loc>
		<lastmod>2018-11-06T16:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tcg-recognizes-2018-industry-experts-and-leaders-for-global-security-standards-and-elects-board-members-from-ge-and-seagate/</loc>
		<lastmod>2018-11-06T16:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/teaching-an-old-dog-new-tricks/</loc>
		<lastmod>2018-11-06T17:06:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/secure-and-compliant-grid-modernization/</loc>
		<lastmod>2018-11-06T17:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/visit-akamai-at-aws-reinvent-2018/</loc>
		<lastmod>2018-11-06T17:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/report-tuesday-05-november-2018/</loc>
		<lastmod>2018-11-06T19:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/facebook-shuts-down-115-accounts-possibly-linked-to-bad-actors/</loc>
		<lastmod>2018-11-06T19:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/when-the-unlimited-vacation-policy-doesnt-work/</loc>
		<lastmod>2018-11-06T19:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-chris-elgees-extending-burp-to-find-struts-and-xxe-vulnerabilities/</loc>
		<lastmod>2018-11-06T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/shifting-devops-models-and-their-impact-on-application-security-tools-and-strategies/</loc>
		<lastmod>2018-11-06T20:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/3-security-budgeting-insights-for-secops-2/</loc>
		<lastmod>2018-11-06T20:41:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/restrict-the-file-types-uploaded-to-your-ebs-application/</loc>
		<lastmod>2018-11-06T21:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/shared-responsibility-model-who-owns-cloud-security/</loc>
		<lastmod>2018-11-06T22:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/if-the-machines-are-winning-whos-losing/</loc>
		<lastmod>2018-11-06T23:12:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ssd-encryption-from-crucial-and-samsung-is-not-secure-exposes-data/</loc>
		<lastmod>2018-11-06T23:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/information-commissioner-calls-for-regulation-of-social-media-following-cambridge-analytica-scandal/</loc>
		<lastmod>2018-11-06T23:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ruby2-3-security-update-cve-2018-16395-cve-2018-16396/</loc>
		<lastmod>2018-11-06T23:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/xkcd-election-night/</loc>
		<lastmod>2018-11-07T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-pci-dss-saq-you-putting-the-self-in-self-assessment-questionnaire/</loc>
		<lastmod>2018-11-07T02:50:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-dazzlecatduos-introduction-to-x86-assembly/</loc>
		<lastmod>2018-11-07T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/turning-malware-trends-into-proactive-behaviors/</loc>
		<lastmod>2018-11-07T04:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/busting-sim-swappers-and-sim-swap-myths/</loc>
		<lastmod>2018-11-07T05:49:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/signed-sealed-delivered-code-signing-makes-software-yours/</loc>
		<lastmod>2018-11-07T08:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/join-us-at-next-london-to-discuss-survival-in-hci/</loc>
		<lastmod>2018-11-07T08:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-safe-and-secure-are-wearables/</loc>
		<lastmod>2018-11-07T09:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/latin-america-report-q4-18-mexico/</loc>
		<lastmod>2018-11-07T11:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/police-crack-encrypted-chat-service-ironchat-and-read-258000-messages-from-suspected-criminals/</loc>
		<lastmod>2018-11-07T11:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/we-crypto-now/</loc>
		<lastmod>2018-11-07T11:50:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/whose-role-is-it-to-tackle-cyber-security/</loc>
		<lastmod>2018-11-07T11:57:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/37-of-ransomware-attacks-targeted-healthcare-organizations-in-q3-cyber-insurer-says/</loc>
		<lastmod>2018-11-07T12:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/iran-says-stuxnet-is-back-claims-israel-tried-to-hack-iranian-infrastructure/</loc>
		<lastmod>2018-11-07T12:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/bitglass-security-spotlight-us-government-breaches-abound/</loc>
		<lastmod>2018-11-07T13:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/office-365-data-protection-part-2-litigation-hold/</loc>
		<lastmod>2018-11-07T13:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cloud-security-how-to-secure-your-sensitive-data-in-the-cloud/</loc>
		<lastmod>2018-11-07T14:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/security-is-a-crucial-sd-wan-differentiator/</loc>
		<lastmod>2018-11-07T14:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/equifax-nemesis-apache-struts-found-vulnerable-to-2-year-old-unpatched-flaw-workaround-available/</loc>
		<lastmod>2018-11-07T14:50:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/of-course-it-was-intentional-and-easy-peazy-too/</loc>
		<lastmod>2018-11-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/our-how-to-operate-and-evolve-a-siem-solution-publishes/</loc>
		<lastmod>2018-11-07T16:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/pipeda-best-practices-achieved-with-mdr/</loc>
		<lastmod>2018-11-07T16:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/pipeda-best-practices-achieved-with-mdr-part-2/</loc>
		<lastmod>2018-11-07T16:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/growing-your-business-security-as-an-expectation/</loc>
		<lastmod>2018-11-07T17:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-voke-impact-note-explores-bromium-protected-app/</loc>
		<lastmod>2018-11-07T18:15:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/unveiling-top-10-rsa-conference-2019-speaking-submission-trends-part-1/</loc>
		<lastmod>2018-11-07T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-s-pacu-attack-and-post-exploitation-in-aws/</loc>
		<lastmod>2018-11-07T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/mitigating-buffer-overflow-attacks-in-linux-unix/</loc>
		<lastmod>2018-11-07T20:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/mac-os-x-security-keychain/</loc>
		<lastmod>2018-11-07T20:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/10-tips-to-improve-your-website-security/</loc>
		<lastmod>2018-11-07T20:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/venafi-research-is-german-election-infrastructure-safe-from-cyber-attackers/</loc>
		<lastmod>2018-11-07T20:36:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/a-guide-to-aws-reinvent-2018-2/</loc>
		<lastmod>2018-11-07T20:37:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/half-a-million-people-potentially-affected-by-data-breach-at-bankers-life/</loc>
		<lastmod>2018-11-07T21:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/rachel-tobac-explains-how-polite-paranoia-can-derail-social-engineering-attacks/</loc>
		<lastmod>2018-11-07T23:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/putins-vote/</loc>
		<lastmod>2018-11-08T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/security-flaws-found-in-widely-used-data-storage-devices-avast/</loc>
		<lastmod>2018-11-08T00:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/data-democracy-shines-in-the-wake-of-the-cloudera-and-hortonworks-merger/</loc>
		<lastmod>2018-11-08T02:19:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-soya-aoyamas-an-inconvenient-truth-evading-the-ransomware-protection-in-windows-10/</loc>
		<lastmod>2018-11-08T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/dont-mix-the-two-up-what-is-the-difference-between-privacy-security/</loc>
		<lastmod>2018-11-08T04:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tripwire-data-collector-increases-operational-technology-visibility-with-enhanced-web-scripting-capability/</loc>
		<lastmod>2018-11-08T04:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/u-s-secret-service-warns-id-thieves-are-abusing-uspss-mail-scanning-service/</loc>
		<lastmod>2018-11-08T07:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/avoid-managing-a-myriad-of-code-signing-solutions/</loc>
		<lastmod>2018-11-08T08:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/non-eu-countries-work-hard-to-comply-with-gdpr-even-though-they-dont-have-to/</loc>
		<lastmod>2018-11-08T08:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/discovering-critical-data-stored-on-the-endpoint/</loc>
		<lastmod>2018-11-08T11:22:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/social-engineer-newsletter-vol-08-issue-110/</loc>
		<lastmod>2018-11-08T12:12:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/software-monitoring-for-nerc-cip-compliance-part-2/</loc>
		<lastmod>2018-11-08T12:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/beware-of-scams-elon-musk-is-not-giving-away-bitcoin-on-twitter/</loc>
		<lastmod>2018-11-08T12:34:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/victim-blaming-by-any-other-name-still-smells-just-as-bad/</loc>
		<lastmod>2018-11-08T13:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/spam-spewing-iot-botnet-infects-100000-routers-using-five-year-old-flaw/</loc>
		<lastmod>2018-11-08T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/enabling-education-and-security-at-the-2018-cetpa-annual-conference/</loc>
		<lastmod>2018-11-08T14:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ddos-attack-on-cambodias-top-isps-reached-150gbps/</loc>
		<lastmod>2018-11-08T14:40:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/virtualbox-zero-day-flaw-released-on-github-working-exploit-available-but-no-patch/</loc>
		<lastmod>2018-11-08T15:04:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/state-of-software-security-vol-9-top-4-takeaways-for-developers/</loc>
		<lastmod>2018-11-08T15:16:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/managing-the-intersection-of-cryptocurrency-and-compliance/</loc>
		<lastmod>2018-11-08T15:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/directionless-security-and-devops/</loc>
		<lastmod>2018-11-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/data-breaches-how-to-turn-a-negative-into-a-positive/</loc>
		<lastmod>2018-11-08T16:20:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/akamai-identified-as-a-strong-performer-among-zero-trust-extended-ecosystem-providers-by-independent-research-firm/</loc>
		<lastmod>2018-11-08T16:27:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/10-critical-cloud-security-threats-in-2018-and-beyond/</loc>
		<lastmod>2018-11-08T16:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/using-google-bots-as-an-attack-vector/</loc>
		<lastmod>2018-11-08T17:08:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/older-macos-and-ios-versions-vulnerable-to-remote-code-execution-attacks/</loc>
		<lastmod>2018-11-08T18:13:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ecommerce-formjacking-is-attackers-new-kind-of-card-skimming/</loc>
		<lastmod>2018-11-08T18:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/fortigate-ngfw-consistently-delivers-in-nss-labs-2018-dcsg-group-tests/</loc>
		<lastmod>2018-11-08T18:14:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/protecting-applications-in-a-serverless-architecture/</loc>
		<lastmod>2018-11-08T18:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/managing-software-security-10-essential-best-practices-infographic/</loc>
		<lastmod>2018-11-08T19:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-kate-brews-brutal-blogging-go-for-the-jugular/</loc>
		<lastmod>2018-11-08T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/bluetooth-nightmares-bleedingbit-bugs-in-texas-instrument-chips/</loc>
		<lastmod>2018-11-08T20:05:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/canada-post-leaked-personal-data-of-4500-cannabis-customers/</loc>
		<lastmod>2018-11-08T20:44:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ease-me-into-cryptography-part-2-symmetric-ciphers/</loc>
		<lastmod>2018-11-08T22:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/weak-pki-implementation-is-a-major-cyber-risk/</loc>
		<lastmod>2018-11-08T22:35:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/deep-analysis-of-trickbot-new-module-pwgrab/</loc>
		<lastmod>2018-11-08T23:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/luke-kingma-and-lou-patrick-mackays-futurism-political-machine/</loc>
		<lastmod>2018-11-09T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-sebastian-castros-rid-hijacking-maintaining-access-on-windows-machines/</loc>
		<lastmod>2018-11-09T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/complexity-is-the-worst-enemy-of-security-time-for-a-new-approach-with-network-security/</loc>
		<lastmod>2018-11-09T09:39:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/developing-security-champions-within-devops-cyberspeak-podcast/</loc>
		<lastmod>2018-11-09T11:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/canada-post-leaks-sensitive-information-of-thousands-of-cannabis-buyers/</loc>
		<lastmod>2018-11-09T11:45:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/escaping-the-macos-10-14-mojave-filesystem-sandbox-with-r-rstudio/</loc>
		<lastmod>2018-11-09T12:01:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/privacy-and-security-of-data-at-universities/</loc>
		<lastmod>2018-11-09T12:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cloud-security-rises-to-top-of-2019-cybersecurity-budget-priorities/</loc>
		<lastmod>2018-11-09T12:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/chinese-headmaster-fired-after-setting-up-his-own-secret-cryptomining-rig-at-school/</loc>
		<lastmod>2018-11-09T14:03:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/a-microsoft-windows-bug-deactivates-windows-10-pro-licenses-and-downgrades-to-windows-10-home-users-report/</loc>
		<lastmod>2018-11-09T14:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/amazon-addresses-employees-dissent-regarding-the-companys-law-enforcement-policies-at-an-all-staff-meeting-in-a-first/</loc>
		<lastmod>2018-11-09T15:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/time-to-stop-more-intel-tomfoolery-discovered/</loc>
		<lastmod>2018-11-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/gao-report-expired-certificate-allowed-extended-exfiltration/</loc>
		<lastmod>2018-11-09T16:33:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-can-you-get-more-from-your-appsec-education-program/</loc>
		<lastmod>2018-11-09T16:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/infosec-problems-for-2019-and-beyond-patching-bug-bounties-and-hype/</loc>
		<lastmod>2018-11-09T17:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/unveiling-top-10-rsa-conference-2019-speaking-submission-trends-part-2/</loc>
		<lastmod>2018-11-09T17:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/5-whys-of-never-paying-ransomware/</loc>
		<lastmod>2018-11-09T18:19:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/freedom-of-cloud-domain-available/</loc>
		<lastmod>2018-11-09T19:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/mobile-shopping-growth-accelerates-during-diwali/</loc>
		<lastmod>2018-11-09T19:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-ryan-j-ogradys-your-training-data-is-bad-and-you-should-feel-bad/</loc>
		<lastmod>2018-11-09T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/aging-voting-equipment-in-us-faces-added-stress-as-hotly-contested-election-prompts-high-voter-turnout/</loc>
		<lastmod>2018-11-09T20:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/report-wednesday-06-november-2018/</loc>
		<lastmod>2018-11-09T20:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/bug-bounty-hunter-ran-isp-doxing-service/</loc>
		<lastmod>2018-11-09T20:52:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/threats-obvious-but-electronic-voting-systems-remain-insecure/</loc>
		<lastmod>2018-11-09T22:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-democratic-house-majority-elevates-election-security-to-top-of-mind/</loc>
		<lastmod>2018-11-09T23:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/report-thursday-08-november-2018/</loc>
		<lastmod>2018-11-09T23:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hackers-target-bitcoins-and-uscybercom-shares-malware-avast/</loc>
		<lastmod>2018-11-09T23:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-joy-of-techs-sitting-is-bad-for-your-brain/</loc>
		<lastmod>2018-11-10T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/you-failed-your-pen-test-how-can-you-reduce-your-attack-surface/</loc>
		<lastmod>2018-11-10T00:14:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/erealitatea-net-hack-corrupts-websites-with-wp-gdpr-compliance-plugin-vulnerability/</loc>
		<lastmod>2018-11-10T02:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-kevin-bongs-michael-vieaus-so-many-pentesting-tools-from-a-4-arduino/</loc>
		<lastmod>2018-11-10T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-243rd-marine-corps-cmc-birthday-message/</loc>
		<lastmod>2018-11-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-jim-shavers-building-an-empire-with-ironpython/</loc>
		<lastmod>2018-11-10T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/a-costly-convenience-the-dangers-of-free-public-wi-fi/</loc>
		<lastmod>2018-11-10T21:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-judy-towers-saedy-subversion-and-espionage-directed-against-you/</loc>
		<lastmod>2018-11-11T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/veterans-day-2018/</loc>
		<lastmod>2018-11-11T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-choose-the-best-password-manager-avast/</loc>
		<lastmod>2018-11-11T14:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-increase-security-in-your-smart-home/</loc>
		<lastmod>2018-11-11T16:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ten-ways-your-healthcare-org-may-be-violating-hipaa/</loc>
		<lastmod>2018-11-11T21:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hash-hunting-why-file-hashes-are-still-important/</loc>
		<lastmod>2018-11-12T04:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/unearthing-ransomware-characteristics-using-classification-taxonomy/</loc>
		<lastmod>2018-11-12T04:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/midterm-election-security-gait-recognition-surveillance-technology-caller-id-authentication-wb42/</loc>
		<lastmod>2018-11-12T05:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/qa-how-certifying-in-house-it-staffers-as-cyber-analysts-pen-testers-can-boost-smb-security/</loc>
		<lastmod>2018-11-12T08:43:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/dont-be-a-dumb-pipe-you-can-analyze-encrypted-video-traffic/</loc>
		<lastmod>2018-11-12T09:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/u-s-cybersecurity-job-market-cries-for-help-as-demand-for-top-talent-soars/</loc>
		<lastmod>2018-11-12T10:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-uk-public-sector-organizations-can-craft-an-effective-cyber-security-strategy/</loc>
		<lastmod>2018-11-12T12:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/steam-bug-exposes-license-keys-for-every-game-available-on-platform/</loc>
		<lastmod>2018-11-12T13:56:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/veterans-can-help-your-cyber-skills-gap/</loc>
		<lastmod>2018-11-12T14:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/week-45-cyberattack-digest-2018-hsbc-google-play-the-bank-of-england-and-others/</loc>
		<lastmod>2018-11-12T14:25:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/gplv2-and-the-right-to-cure/</loc>
		<lastmod>2018-11-12T14:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/third-party-data-breach-exposes-info-of-alabama-hospital-job-applicants/</loc>
		<lastmod>2018-11-12T15:11:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/mike-rothmans-quick-and-dirty-devsecops-the-talk/</loc>
		<lastmod>2018-11-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/video-general-data-protection-regulation-gdrp-the-law-that-lets-europeans-take-back-their-data-from-big-tech-companies/</loc>
		<lastmod>2018-11-12T16:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/why-you-need-automated-security-for-the-internet-of-things-iot/</loc>
		<lastmod>2018-11-12T16:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/thought-leader/</loc>
		<lastmod>2018-11-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-docker-based-dev-pipeline-microservice-projects-just-got-a-speed-boost/</loc>
		<lastmod>2018-11-12T18:24:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/vulnerabilities-in-ssd-encryption-using-osquery-to-identify-vulnerable-windows-machines/</loc>
		<lastmod>2018-11-12T18:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/moving-critical-applications-to-the-cloud/</loc>
		<lastmod>2018-11-12T18:56:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-amit-serpers-niv-yonas-yuval-chuddys-osx-pirrit-reverse-engineering-mac-osx-malware-and-the-legal-department-of-the-company-who-makes-it/</loc>
		<lastmod>2018-11-12T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/introducing-threat-stacks-new-podcast-your-system-called-2/</loc>
		<lastmod>2018-11-12T20:33:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/another-look-at-virtual-integrity/</loc>
		<lastmod>2018-11-12T22:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/analyzing-the-new-non-beta-version-of-the-kraken-cryptor-ransomware/</loc>
		<lastmod>2018-11-12T22:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/dharma-ransomware-what-its-teaching-us/</loc>
		<lastmod>2018-11-12T22:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/building-cyber-resilience-in-australia-and-beyond/</loc>
		<lastmod>2018-11-12T23:25:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/robert-m-lees-and-jeff-hass-little-bobby-comics-collection-bias/</loc>
		<lastmod>2018-11-13T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/using-third-party-network-devices-or-solutions-on-office-365-traffic/</loc>
		<lastmod>2018-11-13T00:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/11-12-2018-dtex-insider-threat-privacy-news-federal-news-network-taps-dtex-for-insider-threat-insights-phishing-the-underestimated-insider-threat/</loc>
		<lastmod>2018-11-13T00:59:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/lets-get-physical-how-to-comply-with-the-pci-dss-physical-security-requirements/</loc>
		<lastmod>2018-11-13T03:38:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-dr-matthew-millers-how-to-test-network-investigative-techniques-nits-used-by-the-fbi/</loc>
		<lastmod>2018-11-13T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/women-in-information-security-chrissy-morgan/</loc>
		<lastmod>2018-11-13T05:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/achieve-cis-compliance-in-cloud-container-and-devops-environments/</loc>
		<lastmod>2018-11-13T05:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/5-crucial-things-you-need-to-know-for-aws-reinvent/</loc>
		<lastmod>2018-11-13T06:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cloudflares-1-1-1-1-dns-service-is-now-available-as-a-mobile-app-for-ios-and-android/</loc>
		<lastmod>2018-11-13T08:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-tech-cequence-security-launches-platform-to-shield-apps-apis-from-malicious-botnets/</loc>
		<lastmod>2018-11-13T08:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/become-a-budget-hero-use-third-party-maintenance-for-it-assets/</loc>
		<lastmod>2018-11-13T09:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/vigilant-software-expands-risk-and-compliance-product-portfolio-with-data-protection-impact-assessment-dpia-tool/</loc>
		<lastmod>2018-11-13T09:54:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/small-companies-big-security-concerns/</loc>
		<lastmod>2018-11-13T09:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/build-the-capacity-to-hunt-for-publicly-disclosed-indicators-of-compromise/</loc>
		<lastmod>2018-11-13T12:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/jack-dorsey-discusses-the-rumored-edit-tweet-button-and-tells-users-to-stop-caring-about-followers/</loc>
		<lastmod>2018-11-13T12:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-iot-security-regulations/</loc>
		<lastmod>2018-11-13T13:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/whatsapp-overwhelmed-by-volume-of-fake-news-spread-in-india-through-group-messaging-researchers-find/</loc>
		<lastmod>2018-11-13T13:11:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/wp-gdpr-compliance-wordpress-plug-in-exploited/</loc>
		<lastmod>2018-11-13T13:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/security-vulnerabilities-identified-in-washington-georgia-and-north-carolinas-voting-systems/</loc>
		<lastmod>2018-11-13T13:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/kapalya-partners-with-gemalto-to-leverage-their-latest-key-management-solution/</loc>
		<lastmod>2018-11-13T14:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/patched-facebook-vulnerability-could-have-exposed-private-information-about-you-and-your-friends/</loc>
		<lastmod>2018-11-13T14:31:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cyber-security-workshop-stronger-together/</loc>
		<lastmod>2018-11-13T14:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/embarking-on-a-cloud-journey-expect-more-from-your-load-balancer/</loc>
		<lastmod>2018-11-13T14:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-your-customers-need-from-todays-nac-solutions/</loc>
		<lastmod>2018-11-13T14:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/sap-security-notes-november-18-the-mobile-client-side-menace/</loc>
		<lastmod>2018-11-13T15:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tune-in-how-to-build-an-android-application-testing-toolbox/</loc>
		<lastmod>2018-11-13T15:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cequence-security-announces-game-changing-application-security-platform-asp-to-stop-bot-attacks/</loc>
		<lastmod>2018-11-13T15:48:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/pbs-frontline-the-facebook-dilemma-parts-one-and-two/</loc>
		<lastmod>2018-11-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/that-domain-you-forgot-to-renew-yeah-its-now-stealing-credit-cards/</loc>
		<lastmod>2018-11-13T16:26:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/webinar-the-bots-are-coming-a-blue-teamer-survival-guide-on-nov-29-2018/</loc>
		<lastmod>2018-11-13T16:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/sap-cyber-threat-intelligence-report-november-2018/</loc>
		<lastmod>2018-11-13T17:12:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/former-cia-spy-make-no-mistake-russia-is-going-to-keep-interfering-in-us-elections/</loc>
		<lastmod>2018-11-13T17:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hackers-change-wordpress-siteurl-to-pastebin/</loc>
		<lastmod>2018-11-13T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/management-mayhem-part-2-why-machine-identities-are-costing-more-than-youd-think/</loc>
		<lastmod>2018-11-13T17:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/nordstrom-reveals-data-breach-sensitive-employee-data-exposed/</loc>
		<lastmod>2018-11-13T17:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-powerful-resource-of-php-stream-wrappers/</loc>
		<lastmod>2018-11-13T18:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/whats-on-our-minds-for-2019-key-themes-from-the-rsa-conference-speaker-selection-process/</loc>
		<lastmod>2018-11-13T18:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-additions-to-the-rsac-advisory-board/</loc>
		<lastmod>2018-11-13T18:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/diversity-and-inclusion-principles-for-rsac-2019/</loc>
		<lastmod>2018-11-13T18:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/consumer-reports-reviews-wireless-home-security-cameras/</loc>
		<lastmod>2018-11-13T18:20:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/today-i-learned-using-scss-in-your-vue-components/</loc>
		<lastmod>2018-11-13T18:31:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/from-my-gartner-blog-the-new-old-siem-papers-are-out/</loc>
		<lastmod>2018-11-13T18:41:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/empowering-patients-though-increased-engagement/</loc>
		<lastmod>2018-11-13T18:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/total-business-magazine-feature-geoff-forsyth-on-payment-card-security/</loc>
		<lastmod>2018-11-13T19:04:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/november-2018-patch-tuesday-62-vulns-tftp-server-rce-adobe-poc/</loc>
		<lastmod>2018-11-13T19:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-cara-maries-andy-coopers-cloud-computing-therapy-session/</loc>
		<lastmod>2018-11-13T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/black-friday-and-cyber-monday-security-concerns/</loc>
		<lastmod>2018-11-13T22:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-joy-of-techs-submit-to-a-chip/</loc>
		<lastmod>2018-11-14T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-build-an-android-application-testing-toolbox/</loc>
		<lastmod>2018-11-14T00:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cybersecurity-at-aws-reinvent/</loc>
		<lastmod>2018-11-14T01:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/patch-your-microsoft-outlook-fortinet-discovered-four-outlook-remote-code-execution-vulnerabilities/</loc>
		<lastmod>2018-11-14T01:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/wibu-systems-at-electronica-the-future-of-electronics-and-iiot-are-intertwined/</loc>
		<lastmod>2018-11-14T03:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/this-photo-should-not-exist/</loc>
		<lastmod>2018-11-14T03:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-joe-grays-silent-compromise-social-engineering-fortune-500-businesses/</loc>
		<lastmod>2018-11-14T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-right-to-repair-your-electronics-just-got-stronger/</loc>
		<lastmod>2018-11-14T05:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/strategising-for-the-new-year-what-will-it-security-teams-face-in-2019/</loc>
		<lastmod>2018-11-14T05:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/dpias-and-why-every-organisation-needs-to-conduct-them/</loc>
		<lastmod>2018-11-14T07:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/business-mobile-workforce-report-2018-avast-business/</loc>
		<lastmod>2018-11-14T07:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/remote-packet-dumps-from-packetcache/</loc>
		<lastmod>2018-11-14T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/guest-blog-why-its-critical-to-orchestrate-pki-keys-for-iot/</loc>
		<lastmod>2018-11-14T08:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/introducing-firefox-sync-centered-around-user-privacy/</loc>
		<lastmod>2018-11-14T08:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/comparing-the-owasp-top-10-to-the-real-world-top-10/</loc>
		<lastmod>2018-11-14T09:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/vert-threat-alert-november-2018-patch-tuesday-analysis/</loc>
		<lastmod>2018-11-14T09:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/mondays-google-outage-was-a-bgp-route-leak-traffic-redirected-through-nigeria-china-and-russia/</loc>
		<lastmod>2018-11-14T12:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/dont-fall-for-fake-neo-tether-and-metamask-cryptocurrency-wallets-on-google-play/</loc>
		<lastmod>2018-11-14T13:06:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/patch-tuesday-november-2018-edition/</loc>
		<lastmod>2018-11-14T13:25:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/healthcare-survey-finds-abundance-of-medical-device-security-overconfidence/</loc>
		<lastmod>2018-11-14T13:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/use-github-vulnerability-alerts-to-keep-users-of-your-r-packages-safe/</loc>
		<lastmod>2018-11-14T13:47:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/apple-says-nothing-as-apple-id-accounts-mysteriously-locked-down/</loc>
		<lastmod>2018-11-14T14:07:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/microsoft-fixes-62-security-flaws-on-patch-tuesday-and-re-releases-windows-10-version-1809-and-windows-server-2019/</loc>
		<lastmod>2018-11-14T14:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-bricata-comprehensive-network-protection-platform-earns-fips-140-2-validation-for-encryption/</loc>
		<lastmod>2018-11-14T14:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/as-the-holiday-season-draws-near-mobile-malware-attacks-are-prevalent/</loc>
		<lastmod>2018-11-14T14:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tony-smith-featured-on-itweb/</loc>
		<lastmod>2018-11-14T14:53:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/no-malware-necessary-just-malicious-intent/</loc>
		<lastmod>2018-11-14T15:09:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/online-security-concerns-split-uk-black-friday-shoppers/</loc>
		<lastmod>2018-11-14T15:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/using-docker-to-install-openvas-on-centos/</loc>
		<lastmod>2018-11-14T15:44:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/openvas-image-for-docker-on-ubuntu/</loc>
		<lastmod>2018-11-14T15:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/latest-chinese-bgp-redirect-your-bits-are-in-beijing/</loc>
		<lastmod>2018-11-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/catch-me-if-you-can-the-changing-faces-of-malware/</loc>
		<lastmod>2018-11-14T16:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/singles-day-blows-away-its-own-records/</loc>
		<lastmod>2018-11-14T16:15:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/key-considerations-when-purchasing-cybersecurity-time-money/</loc>
		<lastmod>2018-11-14T16:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/google-cloud-functions-security-now-with-functionshield-protection/</loc>
		<lastmod>2018-11-14T16:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/red-team-101-understanding-kali-linux/</loc>
		<lastmod>2018-11-14T16:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/lets-talk-about-social-engineering-small-businesses/</loc>
		<lastmod>2018-11-14T17:13:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/shortcuts-for-understanding-malicious-scripts/</loc>
		<lastmod>2018-11-14T17:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/can-you-mitigate-risk-with-compliance-and-integrity-monitoring-for-hipaa-and-healthcare/</loc>
		<lastmod>2018-11-14T17:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/real-time-fine-tuning-of-the-waf-via-api/</loc>
		<lastmod>2018-11-14T17:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/alert-logic-unveils-new-seamless-threat-management-offerings/</loc>
		<lastmod>2018-11-14T17:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/top-cybersecurity-threats-how-the-waf-must-evolve-to-address-them/</loc>
		<lastmod>2018-11-14T17:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-hayden-parkers-dexter-the-friendly-forensics-expert-on-the-coinbase-security-team/</loc>
		<lastmod>2018-11-14T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/calif-man-pleads-guilty-in-fatal-swatting-case-faces-20-years-in-prison/</loc>
		<lastmod>2018-11-14T20:27:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/more-spectre-meltdown-like-attacks/</loc>
		<lastmod>2018-11-14T21:30:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/venafi-research-do-government-officials-need-cyber-security-training/</loc>
		<lastmod>2018-11-14T21:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/dont-expect-jailed-ceos-but-wyden-at-least-puts-consumer-privacy-on-the-table/</loc>
		<lastmod>2018-11-14T23:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/are-browser-extensions-safe-avast/</loc>
		<lastmod>2018-11-14T23:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/key-takeaways-from-mpower-2018/</loc>
		<lastmod>2018-11-15T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/xkcd-trig-identities/</loc>
		<lastmod>2018-11-15T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-james-edges-going-on-a-printer-safari-hunting-zebra-printers/</loc>
		<lastmod>2018-11-15T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/carpet-it-to-concrete-ot-the-evolution-of-internet-based-malware/</loc>
		<lastmod>2018-11-15T05:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/is-your-vulnerability-management-program-efficient-and-successful/</loc>
		<lastmod>2018-11-15T05:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/uk-publication-names-thales-esecurity-global-ciso-to-2018-top-25-women-in-tech-list/</loc>
		<lastmod>2018-11-15T08:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/artificial-intelligence-system-can-recognise-emotions-from-human-speech-2/</loc>
		<lastmod>2018-11-15T08:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/a-single-data-breach-can-rob-you-of-78-of-your-customers-study-indicates/</loc>
		<lastmod>2018-11-15T09:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/raci-matrix-for-iso-27001-implementation-project-2/</loc>
		<lastmod>2018-11-15T10:14:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/this-fun-mozilla-tool-rates-products-on-a-creepy-meter-to-help-you-shop-safely-this-holiday-season/</loc>
		<lastmod>2018-11-15T10:14:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/open-invention-network-expands-its-patent-non-aggression-coverage-in-linux-system/</loc>
		<lastmod>2018-11-15T10:14:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/santas-little-helpers-the-surge-of-seasonal-workers-brings-additional-risk/</loc>
		<lastmod>2018-11-15T12:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/3d-secure-2-0-be-ready-to-make-it-work-to-your-advantage/</loc>
		<lastmod>2018-11-15T12:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/14-malware-families-targeting-e-commerce-brands-ahead-of-black-friday/</loc>
		<lastmod>2018-11-15T12:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/san-diego-school-improves-security-with-avast-business-avast-business/</loc>
		<lastmod>2018-11-15T12:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/deepmasterprints-master-key-fingerprints-made-by-a-neural-network-can-now-fake-fingerprints/</loc>
		<lastmod>2018-11-15T12:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-is-facebook-hiding-new-york-times-reveals-facebooks-insidious-crisis-management-strategy/</loc>
		<lastmod>2018-11-15T12:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/seven-new-spectre-and-meltdown-attacks-found/</loc>
		<lastmod>2018-11-15T12:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-do-the-impossible-and-secure-byod/</loc>
		<lastmod>2018-11-15T13:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/shape-honored-as-fastest-growing-company-in-silicon-valley-by-deloittes-2018-technology-fast-500/</loc>
		<lastmod>2018-11-15T13:16:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/managing-critical-file-transfers-across-email/</loc>
		<lastmod>2018-11-15T14:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/navigation-apps-leading-the-way-or-following-you/</loc>
		<lastmod>2018-11-15T14:44:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/predictions-ai-fuzzing-and-machine-learning-poisoning/</loc>
		<lastmod>2018-11-15T14:44:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-maintain-pki-high-assurance-in-the-cloud-for-the-first-time/</loc>
		<lastmod>2018-11-15T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/akamai-takes-home-three-streaming-media-readers-choice-awards/</loc>
		<lastmod>2018-11-15T15:24:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hadoop-yarn-an-assessment-of-the-attack-surface-and-its-exploits/</loc>
		<lastmod>2018-11-15T15:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/chinese-company-zte-corp-to-assist-the-venezuelan-government-to-monitor-citizen-behavior-using-fatherland-card/</loc>
		<lastmod>2018-11-15T15:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/nihons-nist/</loc>
		<lastmod>2018-11-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/five-tips-to-secure-devops/</loc>
		<lastmod>2018-11-15T16:17:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/20-of-magecart-compromised-merchants-get-reinfected-within-days/</loc>
		<lastmod>2018-11-15T16:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/its-hard-to-find-android-malware-in-the-google-play-store/</loc>
		<lastmod>2018-11-15T16:46:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-digicert-poll-shows-companies-taking-monetary-hits-due-to-iot-related-security-missteps/</loc>
		<lastmod>2018-11-15T16:48:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/over-the-hill-and-through-the-woods-how-to-protect-your-safety-and-finances-on-road-trips/</loc>
		<lastmod>2018-11-15T16:51:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hey-criminals-dont-trust-your-shady-encryption-providers/</loc>
		<lastmod>2018-11-15T16:57:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-botnet-targets-unpatched-router-vulnerability-because-of-course/</loc>
		<lastmod>2018-11-15T17:06:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-are-the-benefits-of-partnering-with-pci-pal/</loc>
		<lastmod>2018-11-15T17:30:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/why-you-need-more-than-certificate-authority-management-solutions/</loc>
		<lastmod>2018-11-15T17:40:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cryptomove-launches-private-beta-for-tholos-key-vault-to-secure-cloud-native-development/</loc>
		<lastmod>2018-11-15T17:41:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/making-pci-requirement-8-3-bulletproof-and-simple/</loc>
		<lastmod>2018-11-15T17:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/wpa2-encryption-bypass-using-defensics-to-uncover-behavioral-vulnerabilities/</loc>
		<lastmod>2018-11-15T18:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cyrc-analysis-cve-2018-18907-authentication-bypass-vulnerability-in-d-link-dir-850l-wireless-router/</loc>
		<lastmod>2018-11-15T18:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/imperva-and-amazon-partner-to-help-mitigate-risks-associated-with-cloud-migration/</loc>
		<lastmod>2018-11-15T18:29:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/identify-good-ueba-data-with-feature-analysis/</loc>
		<lastmod>2018-11-15T18:51:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-loki-variant-being-spread-by-phishing-email/</loc>
		<lastmod>2018-11-15T19:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-open-source-conundrum/</loc>
		<lastmod>2018-11-15T19:33:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/veritas-predictive-insights-uses-artificial-intelligence-and-machine-learning-to-predict-and-prevent-unplanned-service/</loc>
		<lastmod>2018-11-15T19:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/building-a-strong-security-foundation-with-rapiddeploys-ciso-alex-kreilein/</loc>
		<lastmod>2018-11-15T19:50:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-deral-heilands-hardware-slashing-smashing-and-reconstructing-for-root-access/</loc>
		<lastmod>2018-11-15T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/50-useful-kubernetes-tutorials-for-it-professionals-2/</loc>
		<lastmod>2018-11-15T20:27:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/gone-phishing-everything-you-need-to-know-about-the-ever-present-threat-to-your-data/</loc>
		<lastmod>2018-11-15T21:29:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-joy-of-techs-bezos-bonanza/</loc>
		<lastmod>2018-11-16T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/amazon-aws-inspector/</loc>
		<lastmod>2018-11-16T03:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-oddvar-moes-app-o-lockalypse-now/</loc>
		<lastmod>2018-11-16T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-art-and-science-of-secure-coding-key-practices-that-stand-out/</loc>
		<lastmod>2018-11-16T04:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/under-attack-should-your-company-ever-hack-back/</loc>
		<lastmod>2018-11-16T08:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/an-important-step-toward-peace-and-security-in-the-digital-world/</loc>
		<lastmod>2018-11-16T09:49:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hackers-infect-malaysias-largest-media-company-with-ransomware-then-demand-6-45-million/</loc>
		<lastmod>2018-11-16T10:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/nyt-facebook-expose-fallout-board-defends-zuckerberg-and-sandberg-media-call-and-transparency-report-highlights/</loc>
		<lastmod>2018-11-16T11:14:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/trail-of-bits-devcon-iv-recap/</loc>
		<lastmod>2018-11-16T11:50:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/malaysias-largest-media-company-allegedly-suffers-ransomware-attack/</loc>
		<lastmod>2018-11-16T13:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ssl-review-october-2018/</loc>
		<lastmod>2018-11-16T13:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/fraud-attempts-to-jump-14-during-2018-peak-holiday-shopping-season-benchmark-data-indicates/</loc>
		<lastmod>2018-11-16T13:43:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/securing-the-internet-of-things-iot-cyberspeak-podcast/</loc>
		<lastmod>2018-11-16T13:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/facebook-hacked-again-nordstrom-employee-data-breached-avast/</loc>
		<lastmod>2018-11-16T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/opmd-again/</loc>
		<lastmod>2018-11-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/debunking-the-fallacy-that-paid-certificates-are-better-than-free-certificates-and-other-related-nonsense/</loc>
		<lastmod>2018-11-16T16:04:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/with-the-nasdaq-bell-ceremony-we-kick-off-the-next-leg-of-impervas-incredible-journey/</loc>
		<lastmod>2018-11-16T17:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/pci-for-smb-requirement-9-implement-strong-access-control-measures/</loc>
		<lastmod>2018-11-16T17:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-think-about-container-security/</loc>
		<lastmod>2018-11-16T17:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/veracode-at-black-hat-europe-2018/</loc>
		<lastmod>2018-11-16T18:07:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/u-s-mid-term-elections-and-akamai-enterprise-threat-protector/</loc>
		<lastmod>2018-11-16T18:26:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/why-cloud-security-is-important/</loc>
		<lastmod>2018-11-16T19:16:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/common-gotchas-cloud-security-problems-to-avoid/</loc>
		<lastmod>2018-11-16T19:16:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/two-reasons-poor-cloud-data-protection-is-a-bigger-threat-than-cyber-spies/</loc>
		<lastmod>2018-11-16T19:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/3-ways-cloud-security-can-help-maintain-pci-compliance/</loc>
		<lastmod>2018-11-16T19:16:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-enterprises-should-learn-from-the-heartbleed-openssl-flaw/</loc>
		<lastmod>2018-11-16T19:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/a-few-words-on-cloud-data-protection/</loc>
		<lastmod>2018-11-16T19:22:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/checklist-to-compliance-cloud-encryption-best-practices-for-financial-services/</loc>
		<lastmod>2018-11-16T19:23:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-role-of-it-in-the-era-of-cloud-data-protection/</loc>
		<lastmod>2018-11-16T19:23:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/amazon-aws-guardduty/</loc>
		<lastmod>2018-11-16T19:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-mike-saunders-web-app-101-getting-the-lay-of-the-land/</loc>
		<lastmod>2018-11-16T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/dialing-up-deception-the-new-vishing-scam-2/</loc>
		<lastmod>2018-11-16T20:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/is-encryption-an-nta-nids-nft-apocalypse/</loc>
		<lastmod>2018-11-16T22:42:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/xkcd-evaluating-tech-things/</loc>
		<lastmod>2018-11-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cylanceprotect-product-overview/</loc>
		<lastmod>2018-11-17T00:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-cloud-browser/</loc>
		<lastmod>2018-11-17T00:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/pmp%ef%b8%8f-domain-5-closing-7/</loc>
		<lastmod>2018-11-17T00:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-daniel-bohannons-invoke-dosfuscation-techniques-for-f-in-style-do-s-level-cmd-obfuscation/</loc>
		<lastmod>2018-11-17T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/this-d-link-camera-has-a-huge-security-flaw-according-to-consumer-reports/</loc>
		<lastmod>2018-11-17T14:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-armageddon-of-stupidity-sms-password-management-snafu/</loc>
		<lastmod>2018-11-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tis-the-season-to-check-your-ssl-tls-cipher-list-thrice-rcurl-curl-openssl/</loc>
		<lastmod>2018-11-17T17:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/apple-and-android-updates-17th-november-2018/</loc>
		<lastmod>2018-11-17T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-chris-sistrunks-krypt3ias-synackpwns-we-are-the-artillery-using-google-fu-to-take-down-the-grids/</loc>
		<lastmod>2018-11-17T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/xkcd-kilogram/</loc>
		<lastmod>2018-11-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-david-boyds-just-let-yourself-in/</loc>
		<lastmod>2018-11-18T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/reddy-kilowatt-says-good-luck-with-that/</loc>
		<lastmod>2018-11-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-parker-garrisons-a-crash-course-in-exploiting-buffer-overflows-live-demos/</loc>
		<lastmod>2018-11-18T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/luke-kingma-and-lou-patrick-mackays-futurism-tastes-like-chicken/</loc>
		<lastmod>2018-11-19T00:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/some-notes-about-http-3/</loc>
		<lastmod>2018-11-19T00:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ways-to-reduce-the-exorbitant-costs-of-a-data-breach/</loc>
		<lastmod>2018-11-19T02:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-jack-manninos-living-in-a-secure-container-down-by-the-river/</loc>
		<lastmod>2018-11-19T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/usps-informed-delivery-vulnerabilities-holiday-credit-card-fraud-huge-sms-database-leak-wb43/</loc>
		<lastmod>2018-11-19T05:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/quantum-computing-to-protect-data-will-you-wait-and-see-or-be-an-early-adopter/</loc>
		<lastmod>2018-11-19T05:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cybersecurity-is-still-everyones-job/</loc>
		<lastmod>2018-11-19T05:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/protecting-big-data-while-preserving-analytical-agility/</loc>
		<lastmod>2018-11-19T08:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/guest-essay-the-privacy-implications-of-facial-recognition-systems-rising-to-the-fore/</loc>
		<lastmod>2018-11-19T08:26:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/podcast-ciso-speak-vulnerability-management-in-the-cloud/</loc>
		<lastmod>2018-11-19T09:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ransomware-threat-alarmingly-high-for-smbs-as-they-place-security-on-the-back-burner/</loc>
		<lastmod>2018-11-19T09:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/discovering-managed-cloud-based-next-generation-cybersecurity/</loc>
		<lastmod>2018-11-19T09:30:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/black-friday-cyber-monday-wordpress-security-deals-2018/</loc>
		<lastmod>2018-11-19T11:51:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/week-46-cyberattack-digest-2018-instagram-facebook-kars4kids-and-others/</loc>
		<lastmod>2018-11-19T12:13:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-hacker-wish-list/</loc>
		<lastmod>2018-11-19T12:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-more-you-say-you-know-about-phishing-the-more-vulnerable-you-are-until-youre-hoodwinked/</loc>
		<lastmod>2018-11-19T12:16:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/dirtycow-bug-drives-attackers-to-a-backdoor-in-vulnerable-drupal-web-servers/</loc>
		<lastmod>2018-11-19T12:30:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/fraudsters-targeting-uk-university-students-with-fake-tax-refund-emails/</loc>
		<lastmod>2018-11-19T12:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-happened-to-cyber-9-11/</loc>
		<lastmod>2018-11-19T12:50:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/latest-security-tests-introduce-attack-chain-scoring/</loc>
		<lastmod>2018-11-19T13:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-fcc-seeks-to-aggressively-stem-fraudulent-robocalls-with-stir-and-shaken/</loc>
		<lastmod>2018-11-19T13:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/adaptive-media-player-named-readers-choice-finalist/</loc>
		<lastmod>2018-11-19T14:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/microsofts-move-towards-ads-on-the-mail-app-in-windows-10-sparks-privacy-concerns/</loc>
		<lastmod>2018-11-19T14:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hackers-claim-to-have-compromised-protonmail-but-protonmail-calls-it-a-hoax-and-failed-extortion-attempt/</loc>
		<lastmod>2018-11-19T14:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/virtual-kidnap-an-evolving-crime-with-cases-on-the-rise/</loc>
		<lastmod>2018-11-19T14:48:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/join-the-most-secure-one-per-cent-of-internet-users-in-minutes/</loc>
		<lastmod>2018-11-19T14:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-prevent-connected-carjacking/</loc>
		<lastmod>2018-11-19T14:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cybercriminals-and-the-holidays/</loc>
		<lastmod>2018-11-19T14:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-treat-technology-vendors/</loc>
		<lastmod>2018-11-19T14:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/msps-experience-abundant-growth-with-changing-market-demands/</loc>
		<lastmod>2018-11-19T15:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/acunetix-vulnerability-scanner-now-also-on-linux/</loc>
		<lastmod>2018-11-19T15:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/avast-business-managed-workplace-wins-two-industry-awards-for-best-rmm-avast-business/</loc>
		<lastmod>2018-11-19T15:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/novembers-feet-of-clay-award-intel-corporation/</loc>
		<lastmod>2018-11-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/return-of-the-blockchain-security-empire-hacking/</loc>
		<lastmod>2018-11-19T16:20:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-happens-if-you-lose-your-key-in-an-encrypted-blockchain/</loc>
		<lastmod>2018-11-19T16:33:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/not-all-phishing-programs-are-created-equal/</loc>
		<lastmod>2018-11-19T17:15:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/bromium-secure-platform-4-1-4-adds-threat-intelligence-firefox-browsing-and-more/</loc>
		<lastmod>2018-11-19T17:17:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cve-2018-15454-cisco-sip-exploit-information/</loc>
		<lastmod>2018-11-19T18:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cyberark-version-10-6-is-here-just-in-time/</loc>
		<lastmod>2018-11-19T18:49:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/image-management-101-the-web-developers-guide/</loc>
		<lastmod>2018-11-19T19:19:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/why-the-georgia-cyber-center-is-special-2/</loc>
		<lastmod>2018-11-19T19:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-carrie-roberts-kirk-sayres-and-harold-ogdens-vba-stomping-advanced-malware-techniques/</loc>
		<lastmod>2018-11-19T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/a-scam-free-cyber-monday-for-online-businesses/</loc>
		<lastmod>2018-11-19T21:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/having-a-grown-up-conversation-about-the-results-of-your-oracle-ebs-assessment/</loc>
		<lastmod>2018-11-19T21:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/robert-m-lees-and-jeff-hass-little-bobby-comics-2-biases-and-a-fallacy/</loc>
		<lastmod>2018-11-20T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/11-19-18-dtex-insider-threat-privacy-news-blog-trump-signs-cisa-legislation-defending-against-culture-surveillance-freedoms-killer/</loc>
		<lastmod>2018-11-20T00:03:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/save-the-internet-with-zero-trust/</loc>
		<lastmod>2018-11-20T00:09:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-sean-gallaghers-steve-ragans-and-paul-wagenseils-media-hacks-an-infosec-guide-to-dealing-with-journalists/</loc>
		<lastmod>2018-11-20T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/iot-purchasing-checklist/</loc>
		<lastmod>2018-11-20T04:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/fuzzing-php-for-fun-and-profit/</loc>
		<lastmod>2018-11-20T04:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/zscaler-threatlabz-phishing-roundup/</loc>
		<lastmod>2018-11-20T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/digital-assistant-security-during-the-holiday-shopping-season/</loc>
		<lastmod>2018-11-20T08:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/lax-employee-cybersecurity-habits-pose-growing-danger-to-businesses/</loc>
		<lastmod>2018-11-20T08:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-mixed-forecast-for-cybersecurity-during-black-friday-and-cyber-monday/</loc>
		<lastmod>2018-11-20T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/a-multi-factor-authentication-outage-strikes-microsoft-office-365-and-azure-users/</loc>
		<lastmod>2018-11-20T12:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tim-cook-criticizes-google-for-their-user-privacy-scandals-but-admits-to-taking-billions-from-google-search/</loc>
		<lastmod>2018-11-20T12:14:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/infosec-team-this-thanksgiving-give-thanks-for-zero-trust/</loc>
		<lastmod>2018-11-20T12:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ivanka-trump-used-personal-account-for-government-business-posing-security-risk-to-white-house/</loc>
		<lastmod>2018-11-20T12:59:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/two-friends-jailed-for-talktalk-hack-plot/</loc>
		<lastmod>2018-11-20T13:04:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/worst-case-thinking-breeds-fear-and-irrationality/</loc>
		<lastmod>2018-11-20T13:04:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/susceptibility-to-phishing/</loc>
		<lastmod>2018-11-20T13:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/two-young-men-jailed-for-involvement-in-talktalk-data-breach/</loc>
		<lastmod>2018-11-20T14:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-select-a-casb-according-to-gartner/</loc>
		<lastmod>2018-11-20T14:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/we-are-all-service-providers/</loc>
		<lastmod>2018-11-20T15:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/three-old-school-network-security-tips-that-still-work-for-modern-infrastructure/</loc>
		<lastmod>2018-11-20T15:13:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/finding-threats-that-go-undetected/</loc>
		<lastmod>2018-11-20T15:16:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-end-of-the-telephone/</loc>
		<lastmod>2018-11-20T15:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/analyzing-the-greyenergy-malware-from-maldoc-to-backdoor/</loc>
		<lastmod>2018-11-20T15:54:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cynet-wants-to-help-resource-constrained-organizations-with-a-holistic-saas-security-platform/</loc>
		<lastmod>2018-11-20T15:56:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Screen-Shot-2018-11-20-at-10.54.11-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/food-security-targeting-end-product-detection-tools-for-consumers/</loc>
		<lastmod>2018-11-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/promoting-business-enablement-through-cloud-security-at-aws-reinvent-2018/</loc>
		<lastmod>2018-11-20T16:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/web-browser-address-bar-spoofing/</loc>
		<lastmod>2018-11-20T16:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cybersecurity-burnout-what-it-is-why-it-matters-and-what-to-do-about-it/</loc>
		<lastmod>2018-11-20T18:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/utility-depends-on-untangle-for-network-protection-and-compliance/</loc>
		<lastmod>2018-11-20T18:16:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/instagram-bug-accidentally-reveals-user-passwords/</loc>
		<lastmod>2018-11-20T18:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/preventing-man-in-the-middle-attacks/</loc>
		<lastmod>2018-11-20T19:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/choosing-the-right-cloud-hsm/</loc>
		<lastmod>2018-11-20T19:25:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-kevin-gennusos-deploying-deceptive-systems-luring-attackers-from-the-shadows/</loc>
		<lastmod>2018-11-20T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/should-i-include-csrf-protection-on-a-login-form/</loc>
		<lastmod>2018-11-20T20:15:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/why-banks-should-encrypt-for-security-rather-than-compliance/</loc>
		<lastmod>2018-11-20T21:57:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/both-consumers-and-retailers-need-to-up-their-cyber-security-to-make-holidays-happy/</loc>
		<lastmod>2018-11-20T23:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/xkcd-airplanes-and-spaceships/</loc>
		<lastmod>2018-11-21T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/spanning-backup-for-office-365-q3-updates/</loc>
		<lastmod>2018-11-21T00:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-arian-evans-the-money-laundering-cannon-real-cash-real-criminals-and-real-layoffs/</loc>
		<lastmod>2018-11-21T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/countering-espionage-an-enterprise-risk-management-view/</loc>
		<lastmod>2018-11-21T05:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/security-vs-compliance-whats-the-difference/</loc>
		<lastmod>2018-11-21T05:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/holiday-tips-how-to-choose-iot-gifts-avast/</loc>
		<lastmod>2018-11-21T05:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/red-team-102-understanding-metasploit/</loc>
		<lastmod>2018-11-21T05:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/driving-security-transformation-at-james-cook-university/</loc>
		<lastmod>2018-11-21T05:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/smart-bulb-offers-light-color-music-and-data-exfiltration/</loc>
		<lastmod>2018-11-21T07:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/why-skepticism-is-important-in-computer-security-watch-james-mickens-at-usenix-2018-argue-for-thinking-over-blindly-shipping-code/</loc>
		<lastmod>2018-11-21T07:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/guest-essay-california-pioneers-privacy-law-at-state-level-va-vt-co-nj-take-steps-to-follow/</loc>
		<lastmod>2018-11-21T08:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/microsofts-data-collection-approach-violates-gdpr-hefty-fine-awaits/</loc>
		<lastmod>2018-11-21T09:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cyber-security-the-biggest-challenges-and-how-to-overcome-them/</loc>
		<lastmod>2018-11-21T09:30:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/transform-your-organization-with-a-security-champion-cyberspeak-podcast/</loc>
		<lastmod>2018-11-21T10:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-clean-a-hacked-installation-of-nginx/</loc>
		<lastmod>2018-11-21T11:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hackers-target-critical-wordpress-plugin-flaw-to-install-backdoors-and-create-admin-accounts/</loc>
		<lastmod>2018-11-21T13:23:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/fileaudit-reviewed-and-recognized-as-a-leading-cyber-security-software/</loc>
		<lastmod>2018-11-21T13:27:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/information-attacks-against-democracies/</loc>
		<lastmod>2018-11-21T13:48:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/aws-security-best-practices-lambda-dos-mitigation-strategies/</loc>
		<lastmod>2018-11-21T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/avast-introduces-free-mobile-security-for-ios-avast/</loc>
		<lastmod>2018-11-21T14:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/declared-data-breaches-remain-steady-quarter-on-quarter/</loc>
		<lastmod>2018-11-21T15:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/keeping-your-organization-safe-from-mobile-threats-during-the-holidays/</loc>
		<lastmod>2018-11-21T15:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/miscreant-competition-the-olympics-of-theft/</loc>
		<lastmod>2018-11-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/execute-this-i-know-you-have-it/</loc>
		<lastmod>2018-11-21T16:17:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/key-considerations-when-purchasing-cybersecurity-building-a-business-case/</loc>
		<lastmod>2018-11-21T16:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/usps-site-exposed-data-on-60-million-users/</loc>
		<lastmod>2018-11-21T17:10:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/kubernetes-the-cloud-native-operating-system/</loc>
		<lastmod>2018-11-21T17:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/black-friday-cyber-monday-deals-phishing-and-site-skimmers/</loc>
		<lastmod>2018-11-21T19:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-ian-coldwaters-perfect-storm-taking-the-helm-of-kubernetes/</loc>
		<lastmod>2018-11-21T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/navigating-data-responsibility/</loc>
		<lastmod>2018-11-21T20:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cookie-maker-inside-the-google-docs-malicious-network/</loc>
		<lastmod>2018-11-21T21:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-difference-between-a-compliance-officer-and-a-data-protection-officer/</loc>
		<lastmod>2018-11-21T22:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-joy-of-techs-zuckerbergs-pet/</loc>
		<lastmod>2018-11-22T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/could-your-pki-deployment-affect-your-organizations-cybersecurity/</loc>
		<lastmod>2018-11-22T00:03:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-is-an-information-security-business-manager/</loc>
		<lastmod>2018-11-22T00:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/common-continuous-monitoring-cm-challenges/</loc>
		<lastmod>2018-11-22T00:15:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/developments-around-cloud-tap-capability/</loc>
		<lastmod>2018-11-22T00:15:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/top-30-chief-security-officer-cso-interview-questions-and-answers-for-2018/</loc>
		<lastmod>2018-11-22T00:15:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/w-2-phishing-scams-will-they-affect-you-and-how-can-you-protect-yourself/</loc>
		<lastmod>2018-11-22T00:15:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-benny-karnes-john-moores-rick-hayes-matt-perrys-bill-gardners-justin-rogoskys-mike-frys-steve-truaxs-how-to-put-on-a-con-for-fun-and-non-profit/</loc>
		<lastmod>2018-11-22T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/5-reasons-why-your-business-needs-penetration-testing/</loc>
		<lastmod>2018-11-22T05:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/happy-thanksgiving/</loc>
		<lastmod>2018-11-22T08:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/preventing-data-disasters-with-matt-johnson-chief-technology-officer/</loc>
		<lastmod>2018-11-22T09:30:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/email-and-names-of-amazon-customers-exposed-due-to-technical-error-number-of-affected-users-unknown/</loc>
		<lastmod>2018-11-22T09:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-debt-we-owe-to-arron-banks/</loc>
		<lastmod>2018-11-22T11:21:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/not-a-new-technique-in-operation-shaheen-attack/</loc>
		<lastmod>2018-11-22T11:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/mozilla-criticizes-eus-terrorist-content-regulation-proposal-says-its-a-threat-to-user-rights/</loc>
		<lastmod>2018-11-22T12:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/payment-security-tips-to-be-thankful-for-this-black-friday/</loc>
		<lastmod>2018-11-22T12:56:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/like-share-and-destroy-how-to-protect-your-business-from-the-social-media-threat/</loc>
		<lastmod>2018-11-22T13:08:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/happy-thanksgiving-to-our-marine-corps-army-coast-guard-navy-air-force/</loc>
		<lastmod>2018-11-22T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/clearswift-wins-dlp-award-at-computing-security-excellence-awards/</loc>
		<lastmod>2018-11-22T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/sim-swap-man-charged-after-million-dollar-cryptocurrency-theft/</loc>
		<lastmod>2018-11-22T14:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/make-sure-your-network-security-is-ready-for-the-holiday-shopping-season/</loc>
		<lastmod>2018-11-22T16:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/businesses-are-losing-customers-from-the-misuse-of-keys-and-certificates/</loc>
		<lastmod>2018-11-23T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/lack-of-political-leadership-in-uk-jeopardizes-cyber-security-of-critical-sectors-report-says/</loc>
		<lastmod>2018-11-23T08:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/black-friday-data-breach-raises-concern/</loc>
		<lastmod>2018-11-23T10:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/synthetic-identity-fraud-to-drive-48-billion-in-annual-losses-by-2023-juniper-research/</loc>
		<lastmod>2018-11-23T10:53:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/using-machine-learning-to-create-fake-fingerprints/</loc>
		<lastmod>2018-11-23T12:11:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/researchers-discover-a-new-rowhammer-attack-eccploit-that-bypasses-error-correcting-code-protections/</loc>
		<lastmod>2018-11-23T12:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/russian-hackers-at-work-3rd-gmail-glitch-magento-sites-at-risk-avast/</loc>
		<lastmod>2018-11-23T14:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/u-s-postal-service-patches-an-api-exploit-that-impacted-60-million-usps-users-data/</loc>
		<lastmod>2018-11-23T14:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/facebookery-sandberg-prevaricates-zuckerberg-begs-ignorance/</loc>
		<lastmod>2018-11-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/facebook-plans-to-change-its-algorithm-to-demote-borderline-content-that-promotes-misinformation-and-hate-speech-on-the-platform/</loc>
		<lastmod>2018-11-23T16:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-push-for-more-women-in-cybersecurity-baby-steps-need-to-give-way-to-bigger-leaps/</loc>
		<lastmod>2018-11-23T19:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-lee-neelys-chelle-clements-james-mcmurrys-web-app-testing-classroom-in-a-box-the-good-the-bad-and-the-ugly/</loc>
		<lastmod>2018-11-23T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-shop-online-like-a-security-pro/</loc>
		<lastmod>2018-11-23T23:24:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/luke-kingma-and-lou-patrick-mackays-futurism-mission-impossible/</loc>
		<lastmod>2018-11-24T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-brent-cooks-aaron-sotos-adam-cammacks-cody-pierces-metasploit-town-hall-0x4/</loc>
		<lastmod>2018-11-24T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/sans-dfir-summit-2018-cindy-murphys-digital-forensics-truths-that-turn-out-to-be-wrong/</loc>
		<lastmod>2018-11-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-kathleen-smiths-magen-wus-cindy-jones-kathryn-seymours-kirsten-renners-community-based-career-development/</loc>
		<lastmod>2018-11-24T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/xkcd-update-your-address/</loc>
		<lastmod>2018-11-25T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/top-5-best-practices-for-third-party-security/</loc>
		<lastmod>2018-11-25T03:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-security-champions-can-build-an-alliance-with-developers/</loc>
		<lastmod>2018-11-25T03:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-jose-quinones-carlos-perez-disaster-strikes-a-hackers-cook-book/</loc>
		<lastmod>2018-11-25T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/threat-hunting-maturity-model/</loc>
		<lastmod>2018-11-25T05:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/a-brief-introduction-to-the-nessus-vulnerability-scanner/</loc>
		<lastmod>2018-11-25T05:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/vulnerability-mapping-with-kali-linux/</loc>
		<lastmod>2018-11-25T05:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/behold-the-quantum-compass/</loc>
		<lastmod>2018-11-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-infojanitor-s-ninja-looting-like-a-pirate/</loc>
		<lastmod>2018-11-25T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/threat-hunting-detecting-threats/</loc>
		<lastmod>2018-11-25T23:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/10-tips-for-effective-threat-hunting/</loc>
		<lastmod>2018-11-25T23:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-conduct-a-threat-hunt-10-steps/</loc>
		<lastmod>2018-11-25T23:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/robert-m-lees-and-jeff-hass-little-bobby-comics-internecine-wafare/</loc>
		<lastmod>2018-11-26T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/consider-these-factors-when-calculating-the-cost-of-a-data-breach/</loc>
		<lastmod>2018-11-26T03:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-david-courseys-hacking-mobile-applications-with-frida/</loc>
		<lastmod>2018-11-26T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/vehicle-infotainment-privacy-instagrams-accidental-password-exposure-firefox-monitor-wb44/</loc>
		<lastmod>2018-11-26T05:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/rooted-in-security-basics-the-four-pillars-of-cyber-hygiene/</loc>
		<lastmod>2018-11-26T06:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/paris-call-a-missed-call-or-a-great-opportunity/</loc>
		<lastmod>2018-11-26T06:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/more-than-half-of-consumers-would-consider-legal-action-if-their-data-was-compromised-during-a-breach/</loc>
		<lastmod>2018-11-26T08:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/building-a-multi-cloud-strategy-be-sure-to-address-the-security-and-management-challenges/</loc>
		<lastmod>2018-11-26T08:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/my-take-michigans-cybersecurity-readiness-initiatives-provide-roadmap-others-should-follow/</loc>
		<lastmod>2018-11-26T08:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/introducing-native-integration-with-aws-tags-for-ssh-access-management/</loc>
		<lastmod>2018-11-26T11:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/week-46-cyberattack-digest-2018-cozy-bear-talktalk-make-a-wish-foundation-and-others/</loc>
		<lastmod>2018-11-26T12:17:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/bitglass-and-the-rise-of-cloud-security-posture-management/</loc>
		<lastmod>2018-11-26T12:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-surveillance-inhibits-freedom-of-expression/</loc>
		<lastmod>2018-11-26T12:54:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/german-social-media-provider-fined-e20k-for-data-breach/</loc>
		<lastmod>2018-11-26T12:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/loyalty-points-fraud-why-reward-programs-are-a-growing-target/</loc>
		<lastmod>2018-11-26T12:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/why-new-dharma-ransomware-is-more-dangerous-than-ever/</loc>
		<lastmod>2018-11-26T13:56:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/half-of-all-phishing-sites-now-have-the-padlock/</loc>
		<lastmod>2018-11-26T14:57:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/11-26-18-dtex-insider-threat-privacy-news-its-national-critical-infrastructure-security-and-resilience-month-dtex-insider-threat-specialist-asks-are-we-chasing-the-wrong-zero-d-2/</loc>
		<lastmod>2018-11-26T15:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cloud-native-and-hybrid-cloud-organizations-need-security-best-practices/</loc>
		<lastmod>2018-11-26T15:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/5-best-practices-to-harden-your-human-firewall-cyberspeak-podcast/</loc>
		<lastmod>2018-11-26T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/usps-the-exposure/</loc>
		<lastmod>2018-11-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/get-the-message-your-shopper-data-is-trying-to-tell-you-something/</loc>
		<lastmod>2018-11-26T16:18:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/make-a-wish-website-victim-of-cryptojacking-attack/</loc>
		<lastmod>2018-11-26T16:23:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/onlinecurrencies.jpg</image:loc>
			<image:title><![CDATA[onlinecurrencies]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/reviewing-renewing-rethinking-security-strategy-and-architecture/</loc>
		<lastmod>2018-11-26T18:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/buried-under-a-mountain-of-support-tickets-we-can-help/</loc>
		<lastmod>2018-11-26T19:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-jason-langs-stuart-mcintoshs-victor-or-victim-strategies-for-avoiding-an-infosec-cold-war/</loc>
		<lastmod>2018-11-26T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-safe-are-private-keys-in-the-cloud/</loc>
		<lastmod>2018-11-26T20:15:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/credential-theft-threats-facing-smbs/</loc>
		<lastmod>2018-11-26T20:25:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/sharing-best-practices-at-cybersecurity-for-sap-customers/</loc>
		<lastmod>2018-11-26T20:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/launching-certificate-based-security-shouldnt-be-intimidating/</loc>
		<lastmod>2018-11-26T22:08:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/demystifying-server-certificate-validation/</loc>
		<lastmod>2018-11-26T22:19:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/top-3-mistakes-when-setting-up-a-wpa2-enterprise-network/</loc>
		<lastmod>2018-11-26T22:24:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/luke-kingma-and-lou-patrick-mackays-futurism-lifes-a-hustle-kid/</loc>
		<lastmod>2018-11-27T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/fear-uncertainty-and-doubt/</loc>
		<lastmod>2018-11-27T00:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-jon-gorenflos-ubiquitous-shells/</loc>
		<lastmod>2018-11-27T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/catching-configuration-changes-that-can-lead-to-data-exposure/</loc>
		<lastmod>2018-11-27T04:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/nist-framework-for-critical-infrastructure-cybersecurity/</loc>
		<lastmod>2018-11-27T04:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/casb-tales-from-the-darkside/</loc>
		<lastmod>2018-11-27T06:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/making-the-case-for-an-it-ot-security-operations-center-soc/</loc>
		<lastmod>2018-11-27T08:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/nydfs-cybersecurity-regulations-a-glimpse-into-the-future/</loc>
		<lastmod>2018-11-27T08:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/7-ways-social-media-sabotages-your-cybersecurity/</loc>
		<lastmod>2018-11-27T09:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/guest-essay-5-anti-phishing-training-tools-that-can-reduce-employees-susceptibility-to-scams/</loc>
		<lastmod>2018-11-27T09:05:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/avast-improves-phishing-detection-avast/</loc>
		<lastmod>2018-11-27T09:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/pci-pal-achieves-pci-dss-certification-for-seventh-consecutive-year/</loc>
		<lastmod>2018-11-27T09:25:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-byod-paradox-personal-devices-expose-businesses-to-cyber-risk-but-employees-dont-want-bosses-controlling-their-gadgets/</loc>
		<lastmod>2018-11-27T09:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/facebook-to-pay-ethical-hackers-40000-for-reporting-a-single-account-takeover-bug/</loc>
		<lastmod>2018-11-27T10:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/10-rules-for-the-secure-use-of-cryptocurrency-hardware-wallets/</loc>
		<lastmod>2018-11-27T11:50:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/here-is-how-open-source-diy-fatigue-saps-cybersecurity-resources/</loc>
		<lastmod>2018-11-27T12:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/worm-using-removable-drives-to-distribute-bladabindi-backdoor/</loc>
		<lastmod>2018-11-27T13:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/retailers-fix-software-flaws-quickly-despite-continued-code-quality-issues/</loc>
		<lastmod>2018-11-27T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/irisscon-2018-recap/</loc>
		<lastmod>2018-11-27T14:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/spredfast-protects-salesforce-data-with-spanning-backup/</loc>
		<lastmod>2018-11-27T14:55:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ccw-2019-berlin/</loc>
		<lastmod>2018-11-27T14:59:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/phishing-the-most-common-attack-on-australian-organizations-in-q3-2018-finds-oaic/</loc>
		<lastmod>2018-11-27T15:04:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cisco-live-barcelona-2019/</loc>
		<lastmod>2018-11-27T15:05:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/3-hurdles-security-will-need-to-clear-to-succeed-in-a-devops-world/</loc>
		<lastmod>2018-11-27T15:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/exposing-the-public-ips-of-tor-services-through-ssl-certificates/</loc>
		<lastmod>2018-11-27T15:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/prc-begins-crspr-editing-of-human-embryonic-tissues/</loc>
		<lastmod>2018-11-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/compliance-is-not-security/</loc>
		<lastmod>2018-11-29T14:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/vulnerability-assessments-an-essential-component-to-your-cyber-security-program/</loc>
		<lastmod>2018-11-27T16:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/2019-cybersecurity-predictions/</loc>
		<lastmod>2018-11-27T16:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cybersecurity-for-the-business-traveler-a-tale-of-two-internets/</loc>
		<lastmod>2018-11-27T16:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-policies-prevent-peril-for-machine-identities/</loc>
		<lastmod>2018-11-27T17:07:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/indias-startup-story-the-future-of-indias-digital-economy/</loc>
		<lastmod>2018-11-27T17:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/going-to-rsa-2019-register-to-win-an-rsa-full-conference-pass/</loc>
		<lastmod>2018-11-27T17:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-big-zbang-theory-a-new-open-source-tool/</loc>
		<lastmod>2018-11-27T18:11:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/introducing-an-mdm-solution-for-smbs/</loc>
		<lastmod>2018-11-27T19:41:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/alert-logic-achieves-aws-container-security-competency-status/</loc>
		<lastmod>2018-11-27T19:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-john-askews-99-reasons-your-perimeter-is-leaking-evolution-of-cc/</loc>
		<lastmod>2018-11-27T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/responding-quickly-law-enforcement-and-secure-communications/</loc>
		<lastmod>2018-11-27T20:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-new-protecting-telephone-based-payment-card-data-guidance/</loc>
		<lastmod>2018-11-27T21:11:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/from-dev-to-infosec-part-4-buffer-overflows-made-my-brain-hurt/</loc>
		<lastmod>2018-11-27T23:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/qotd-yoda-on-security/</loc>
		<lastmod>2018-11-28T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/chip-implants-the-next-big-privacy-debate-2/</loc>
		<lastmod>2018-11-28T01:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-brian-satiras-brian-olsons-ship-hacking-a-primer-for-todays-pirate/</loc>
		<lastmod>2018-11-28T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/privacy-law-is-growing-more-extensive-heres-what-that-means-for-healthcare/</loc>
		<lastmod>2018-11-28T04:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-challenges-of-managing-third-party-vendor-security-risk/</loc>
		<lastmod>2018-11-28T04:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/fortinet-to-serve-as-a-founding-partner-of-the-world-economic-forums-centre-for-cybersecurity/</loc>
		<lastmod>2018-11-28T05:43:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/5-strategies-for-protecting-sensitive-content-in-a-dangerously-connected-world/</loc>
		<lastmod>2018-11-28T06:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/my-take-michigans-cyber-range-hubs-provide-career-paths-to-high-schoolers-underutilized-adults/</loc>
		<lastmod>2018-11-28T08:55:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/red-team-103-understanding-sqlmap/</loc>
		<lastmod>2018-11-28T09:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/propaganda-and-the-weakening-of-trust-in-government/</loc>
		<lastmod>2018-11-28T09:47:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/two-thirds-of-organisations-uninsured-against-a-data-breach/</loc>
		<lastmod>2018-11-28T10:30:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ransomware-a-growing-menace-for-healthcare-providers/</loc>
		<lastmod>2018-11-28T10:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/eight-individuals-indicted-for-perpetrating-digital-advertising-fraud/</loc>
		<lastmod>2018-11-28T12:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/headless-chrome-devops-love-it-so-do-hackers-heres-why/</loc>
		<lastmod>2018-11-28T13:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/bringing-pci-compliance-solutions-to-south-africa/</loc>
		<lastmod>2018-11-28T14:17:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/school-district-fails-to-reclaim-120000-wired-by-bank-to-scammer/</loc>
		<lastmod>2018-11-28T14:47:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/3-cybersecurity-tests-and-tools-for-protecting-your-small-business-avast-business/</loc>
		<lastmod>2018-11-28T14:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/uk-fine-against-uber-for-2016-data-breach-would-be-200-times-bigger-in-2018/</loc>
		<lastmod>2018-11-28T15:13:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-top-cyber-security-threats-facing-enterprises-in-2019/</loc>
		<lastmod>2018-11-28T15:17:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/evolving-cyberthreats-its-time-to-enhance-your-it-security-mechanisms/</loc>
		<lastmod>2018-11-28T15:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-the-biggest-ad-fraud-rented-datacenter-servers-and-used-botnet-malware-to-infect-1-7m-systems/</loc>
		<lastmod>2018-11-28T15:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/malicious-code-in-npm-event-stream-package-targets-a-bitcoin-wallet-and-causes-8-million-downloads-in-two-months/</loc>
		<lastmod>2018-11-28T15:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/voting-security-2020/</loc>
		<lastmod>2018-11-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/anti-exfil-the-is-self-not-self-solution/</loc>
		<lastmod>2018-11-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/air-gaps-in-ics-going-going-and-so-is-security/</loc>
		<lastmod>2018-11-28T17:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/best-tool-for-protecting-holiday-shoppers-data-basic-common-sense/</loc>
		<lastmod>2018-11-28T17:59:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/alert-logic-announces-support-for-new-aws-security-hub/</loc>
		<lastmod>2018-11-28T17:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ocsp-must-staple-revocation-solution/</loc>
		<lastmod>2018-11-28T18:23:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-evaluation-stage-2-definition-of-success-criteria/</loc>
		<lastmod>2018-11-28T18:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-isolate-sensitive-data-from-compromised-pcs-and-networks/</loc>
		<lastmod>2018-11-28T19:13:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/on-operational-excellence/</loc>
		<lastmod>2018-11-28T19:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-brett-hawkins-code-execution-with-jdk-scripting-tools-nashorn-javascript-engine/</loc>
		<lastmod>2018-11-28T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/spring-break-without-breaking-the-bank-hands-on-training/</loc>
		<lastmod>2018-11-28T20:27:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/imperva-integration-with-aws-security-hub-expanding-customer-security-visibility/</loc>
		<lastmod>2018-11-28T20:40:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/fortinet-selected-to-join-the-aws-consulting-partner-private-offer-program/</loc>
		<lastmod>2018-11-28T20:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/fortinet-and-aws-offer-new-integrated-security-solutions/</loc>
		<lastmod>2018-11-28T20:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/fortinet-expands-cloud-services-hub-integrated-with-aws-transit-gateway/</loc>
		<lastmod>2018-11-28T20:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/protecting-against-man-in-the-browser-attacks/</loc>
		<lastmod>2018-11-28T20:44:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/check-point-software-integrates-with-new-amazon-web-services-security-hub-bringing-enhanced-cloud-protection-to-its-consolidated-security-platform/</loc>
		<lastmod>2018-11-28T21:08:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-endless-cycle-of-erp-security/</loc>
		<lastmod>2018-11-28T21:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cyberark-achieved-advanced-tier-partner-status-with-amazon-web-services/</loc>
		<lastmod>2018-11-28T22:01:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/uk-and-amsterdam-fine-uber-900000-avast/</loc>
		<lastmod>2018-11-28T22:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/why-weve-built-swimlane-the-way-we-have-reflecting-back-and-looking-forward/</loc>
		<lastmod>2018-11-29T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/xkcd-heist/</loc>
		<lastmod>2018-11-29T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/why-weve-built-swimlane-the-way-we-have/</loc>
		<lastmod>2018-11-29T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-mark-milhouses-phonopticon-leveraging-low-rent-mobile-ad-services-to-achieve-state-actor-level-mass-surveillance-on-a-shoestring-budget/</loc>
		<lastmod>2018-11-29T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tripwire-products-quick-reference-guide/</loc>
		<lastmod>2018-11-29T04:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cybercrime-there-is-no-end-in-sight/</loc>
		<lastmod>2018-11-29T04:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/european-consumer-groups-accuse-google-of-tracking-its-users-location-calls-it-a-breach-of-gdpr/</loc>
		<lastmod>2018-11-29T07:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/perspectives-on-the-paris-call/</loc>
		<lastmod>2018-11-29T08:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/study-ranks-healthcare-and-insurance-as-worst-custodians-of-personal-data/</loc>
		<lastmod>2018-11-29T08:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/security-breaches-come-with-a-high-price-tag-for-uk-businesses/</loc>
		<lastmod>2018-11-29T10:56:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tripwire-patch-priority-index-for-november-2018/</loc>
		<lastmod>2018-11-29T11:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/uber-fined-by-british-ico-and-dutch-dpa-for-nearly-1-2m-over-a-data-breach-from-2016/</loc>
		<lastmod>2018-11-29T11:43:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-state-of-mozilla-2017-report-focuses-on-internet-health-and-user-privacy/</loc>
		<lastmod>2018-11-29T11:43:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/strong-customer-authentication-for-psd2-a-fairytale-or-reality/</loc>
		<lastmod>2018-11-29T12:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/dell-discloses-digital-security-event-involving-customer-information/</loc>
		<lastmod>2018-11-29T13:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-the-ofac-sanctions-on-samsam-ransomware-impacts-future-victims-of-ransomware/</loc>
		<lastmod>2018-11-29T13:48:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/venafi-secures-100m-financing-round-led-by-tcv/</loc>
		<lastmod>2018-11-29T14:16:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/us-charges-iranian-hackers-for-samsam-ransomware-attacks/</loc>
		<lastmod>2018-11-29T14:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-3-glitches-in-azure-active-directory-mfa-caused-a-14-hour-long-multi-factor-authentication-outage-in-office-365-azure-and-dynamics-services/</loc>
		<lastmod>2018-11-29T14:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/fragmented-sql-injection-attacks-the-solution/</loc>
		<lastmod>2018-11-29T14:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-securityorb-show-an-interview-with-dr-elizabeth-milovidov-esq-founder-of-digitalparentingcoach-com-11-27-2018/</loc>
		<lastmod>2018-11-29T14:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/out-of-many-none/</loc>
		<lastmod>2018-11-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/packt-has-put-together-a-new-cybersecurity-bundle-for-humble-bundle/</loc>
		<lastmod>2018-11-29T16:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/your-active-directory-was-compromised-is-it-all-lost/</loc>
		<lastmod>2018-11-29T16:17:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/2019-predictions-will-cyber-serenity-soon-be-a-thing-of-the-past/</loc>
		<lastmod>2018-11-29T16:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cryptojacking-attack-targets-make-a-wish-foundation/</loc>
		<lastmod>2018-11-29T16:38:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/6-tips-for-living-a-healthy-digital-life-and-avoiding-credential-theft-this-holiday-season/</loc>
		<lastmod>2018-11-29T16:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/browser-security-whats-up-with-wasm/</loc>
		<lastmod>2018-11-29T17:35:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-christmas-season-is-almost-here-and-retail-cyber-defenses-are-lacking/</loc>
		<lastmod>2018-11-29T17:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hard-questions-raised-when-a-software-glitch-takes-down-an-airliner/</loc>
		<lastmod>2018-11-29T18:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/sennheiser-debacle-the-consequences-of-poorly-secured-certificates/</loc>
		<lastmod>2018-11-29T18:22:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-is-phishing/</loc>
		<lastmod>2018-11-29T18:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/</loc>
		<lastmod>2018-11-29T18:52:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/puresec-collaborates-with-amazon-web-services-to-provide-zero-overhead-application-security-for-aws-lambda-customers/</loc>
		<lastmod>2018-11-29T18:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/users-failing-phishing-simulations-thats-ok/</loc>
		<lastmod>2018-11-29T19:05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/new-runtimes-provided-by-alert-logic-widen-the-playing-field-for-aws-lambda/</loc>
		<lastmod>2018-11-29T19:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-cheryl-biswas-patching-show-me-where-it-hurts/</loc>
		<lastmod>2018-11-29T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/aws-security-hub-extends-privileged-access-threat-analytics-capabilities-with-cyberark/</loc>
		<lastmod>2018-11-29T20:11:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/two-iranian-hackers-charged-with-6-million-in-samsam-ransomware-attacks/</loc>
		<lastmod>2018-11-29T20:47:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/top-30-incident-responder-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2018-11-29T22:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/top-30-penetration-tester-pentester-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2018-11-29T22:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/top-30-microsoft-certified-systems-engineer-mcse-interview-questions-and-answers/</loc>
		<lastmod>2018-11-29T22:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cisco-advanced-malware-protection-amp-for-endpoints-product-review/</loc>
		<lastmod>2018-11-29T22:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/mcafee-endpoint-protection-product-review/</loc>
		<lastmod>2018-11-29T22:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/building-a-security-awareness-program-in-the-education-sector/</loc>
		<lastmod>2018-11-29T22:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/building-security-awareness-programs-for-online-education/</loc>
		<lastmod>2018-11-29T22:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/iot-security-in-the-shodan-age/</loc>
		<lastmod>2018-11-29T22:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/best-practices-for-conducting-a-risk-based-internal-audit/</loc>
		<lastmod>2018-11-29T22:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-joy-of-techs-social-media-camaraderie/</loc>
		<lastmod>2018-11-30T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/bug-bounty-programs-the-low-down/</loc>
		<lastmod>2018-11-30T00:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/smart-toys-and-their-cybersecurity-risks-are-our-toys-becoming-a-sci-fi-nightmare/</loc>
		<lastmod>2018-11-30T00:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/threat-hunting-data-collection-and-analysis/</loc>
		<lastmod>2018-11-30T00:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/threat-hunting-detecting-adversaries/</loc>
		<lastmod>2018-11-30T00:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/information-security-in-conflict-zones/</loc>
		<lastmod>2018-11-30T00:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/aws-ec2-instance-userdata/</loc>
		<lastmod>2018-11-30T00:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/introducing-the-12-5-million-machine-identity-protection-development-fund/</loc>
		<lastmod>2018-11-30T02:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tcv-invests-in-machine-identity-protection-provider-venafi-a-pioneer-of-a-vital-new-category-in-cybersecurity/</loc>
		<lastmod>2018-11-30T02:25:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/get-the-best-tools-to-protect-your-privacy-online-avast/</loc>
		<lastmod>2018-11-30T03:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/scamclub-malvertising-targets-ios-users-avast/</loc>
		<lastmod>2018-11-30T03:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-curt-barnards-dawud-gordons-advanced-deception-technology-through-behavioral-biometrics/</loc>
		<lastmod>2018-11-30T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/meet-jfrog-xray-a-binary-analysis-tool-for-performing-security-scans-and-dependency-analyses/</loc>
		<lastmod>2018-11-30T05:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/states-leading-the-way-amongst-national-privacy-law-discussions/</loc>
		<lastmod>2018-11-30T05:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/think-your-organization-has-a-healthy-cybersecurity-culture/</loc>
		<lastmod>2018-11-30T08:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/my-take-why-security-innovations-paving-the-way-for-driverless-cars-will-make-iot-much-safer/</loc>
		<lastmod>2018-11-30T09:11:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/dell-reveals-details-on-its-recent-security-breach/</loc>
		<lastmod>2018-11-30T12:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/sennheiser-opens-up-about-its-major-blunder-that-let-hackers-easily-carry-out-man-in-the-middle-attacks/</loc>
		<lastmod>2018-11-30T12:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/google-bypassed-its-own-security-and-privacy-teams-for-project-dragonfly-reveals-intercept/</loc>
		<lastmod>2018-11-30T12:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/marriott-reveals-security-incident-involving-starwood-reservation-database/</loc>
		<lastmod>2018-11-30T12:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/are-third-party-vendors-your-biggest-cybersecurity-risk-cyberspeak-podcast/</loc>
		<lastmod>2018-11-30T13:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/marriott-data-on-500-million-guests-stolen-in-4-year-breach/</loc>
		<lastmod>2018-11-30T13:47:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/using-secure-messaging-to-improve-resident-engagement-and-satisfaction/</loc>
		<lastmod>2018-11-30T13:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/upnpd-the-litany-of-ports-139-and-445/</loc>
		<lastmod>2018-11-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/marriott-confirms-breach-impacts-as-many-as-500-million-guests/</loc>
		<lastmod>2018-11-30T16:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/why-a-whole-brain-approach-to-secure-devops-is-critical/</loc>
		<lastmod>2018-11-30T16:45:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/special-guest-tanya-janca-devops-and-appsec-women-in-cybersecurity-82/</loc>
		<lastmod>2018-11-30T17:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/aws-reinvent-2018-recap-security-devops-ml-hybrid-cloud-take-center-stage/</loc>
		<lastmod>2018-11-30T17:17:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/5-lessons-public-wi-fi-can-teach-us-about-cybersecurity/</loc>
		<lastmod>2018-11-30T17:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/bens-book-of-the-month-review-of-click-here-to-kill-everybody-security-and-survival-in-a-hyper-connected-world/</loc>
		<lastmod>2018-11-30T17:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/npm-dependencies-supply-chain-attacks-and-bitcoin-wallets/</loc>
		<lastmod>2018-11-30T17:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/starwood-hotels-and-bitpay-breaches-njrat-worm-and-more-avast/</loc>
		<lastmod>2018-11-30T19:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-carla-a-raislers-we-are-all-on-the-spectrum-what-my-10-year-old-taught-me-about-leading-teams/</loc>
		<lastmod>2018-11-30T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-is-malware/</loc>
		<lastmod>2018-11-30T20:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/webinar-cyber-threat-hunting-identify-and-hunt-down-intruders/</loc>
		<lastmod>2018-11-30T20:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/honeypots-in-the-cloud/</loc>
		<lastmod>2018-11-30T20:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/who-is-targeting-industrial-facilities-and-ics-equipment-and-how/</loc>
		<lastmod>2018-11-30T20:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/webinar-red-team-operations-attack-and-think-like-a-criminal/</loc>
		<lastmod>2018-11-30T20:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/information-security-is-auditor-salary-and-job-prospects/</loc>
		<lastmod>2018-11-30T20:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/carbon-black-endpoint-security-product-review/</loc>
		<lastmod>2018-11-30T20:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/starwood-hotels-breach-njrat-worm-and-more-avast/</loc>
		<lastmod>2018-11-30T21:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/vulnhub-machines-walkthrough-series-brainpan-part-1/</loc>
		<lastmod>2018-11-30T22:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/top-5-ways-to-identify-and-address-insider-threats/</loc>
		<lastmod>2018-11-30T22:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/luke-kingma-and-lou-patrick-mackays-futurism-change-is-coming/</loc>
		<lastmod>2018-12-01T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-executives-need-to-know-about-new-nist-guidelines-for-tls-management/</loc>
		<lastmod>2018-12-01T00:30:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/sennheiser-headsets-open-door-to-hackers-avast/</loc>
		<lastmod>2018-12-01T00:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/streamline-investigations-with-link-analysis/</loc>
		<lastmod>2018-12-01T01:45:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/derbycon-2018-john-bullingers-no-place-like-home-real-estate-osint-and-opsec-fails/</loc>
		<lastmod>2018-12-01T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/pmp-domain-2-planning/</loc>
		<lastmod>2018-12-01T04:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-become-an-information-security-is-auditor/</loc>
		<lastmod>2018-12-01T04:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-benefits-of-event-activated-learning-eal-training-how-to-take-advantage-of-teachable-moments/</loc>
		<lastmod>2018-12-01T04:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-rekognition-saga-continues-second-congresional-letter-sent-to-jeffrey-bezos/</loc>
		<lastmod>2018-12-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/does18-las-vegas-brent-chapmans-mastering-outages-with-incident-command-for-devops-learning-from-the-fire-department/</loc>
		<lastmod>2018-12-01T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-the-marriott-breach-says-about-security/</loc>
		<lastmod>2018-12-01T21:16:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/xkcd-alpha-centauri/</loc>
		<lastmod>2018-12-02T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/does2018-hart-rossmans-handling-security-objections-to-devops-aws/</loc>
		<lastmod>2018-12-02T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ssd-advisory-ios-macos-safari-sandbox-escape-via-quartzcore-heap-overflow/</loc>
		<lastmod>2018-12-02T14:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/introducing-the-cybercrime-support-network/</loc>
		<lastmod>2018-12-02T15:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/worlds-first-tpm-for-cybersecurity-in-the-connected-car/</loc>
		<lastmod>2018-12-02T16:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/open-source-tools-new-guides-to-using-trusted-computing-published-on-tcg-developer-site/</loc>
		<lastmod>2018-12-02T16:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-practical-tips-for-media-disposal-according-to-iso-27001-2/</loc>
		<lastmod>2018-12-02T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/does-iso-27001-help-ccpa-compliance-2/</loc>
		<lastmod>2018-12-02T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/more-scraping-ethics-gone-awry-and-why-do-this-when-theres-a-free-api/</loc>
		<lastmod>2018-12-02T19:20:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-key-components-to-an-information-security-policy/</loc>
		<lastmod>2018-12-02T23:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-digital-deciders-and-the-future-of-internet/</loc>
		<lastmod>2018-12-03T04:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-type-of-vulnerabilities-does-a-penetration-test-look-for/</loc>
		<lastmod>2018-12-03T04:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/massive-marriott-data-breach-secure-holiday-shopping-tips-phishing-sites-using-https-wb45/</loc>
		<lastmod>2018-12-03T05:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/pci-pal-welcomes-important-updates-to-payment-card-security-guidance/</loc>
		<lastmod>2018-12-03T07:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/my-take-massive-marriott-breach-continues-seemingly-endless-run-of-successful-hacks/</loc>
		<lastmod>2018-12-03T08:47:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/tis-the-season-for-a-phishing-frenzy/</loc>
		<lastmod>2018-12-03T10:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/reddit-takes-stands-against-the-eu-copyright-directives-greets-eu-redditors-with-warning-box/</loc>
		<lastmod>2018-12-03T11:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/week-48-cyberattack-digest-2018-marriott-international-uber-middle-east-airlines-and-others/</loc>
		<lastmod>2018-12-03T12:04:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/untangle-survey-finds-channel-partners-are-adding-more-security-solutions-to-their-portfolios/</loc>
		<lastmod>2018-12-03T13:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bitglass-securing-smartsheet-from-day-one/</loc>
		<lastmod>2018-12-03T13:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/marriott-suffers-second-biggest-data-breach-in-history-after-2013-yahoo-hack/</loc>
		<lastmod>2018-12-03T14:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/much-ado-about-financial-services-and-compliance/</loc>
		<lastmod>2018-12-03T15:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/marriotts-starwood-guest-database-faces-a-massive-data-breach-affecting-500-million-user-data/</loc>
		<lastmod>2018-12-03T15:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/smarter-security-starts-with-understanding-how-cybercriminals-work/</loc>
		<lastmod>2018-12-03T15:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cybersecurity-skills-report-data-shows-what-cisos-look-for-in-security-architects/</loc>
		<lastmod>2018-12-03T15:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/robert-m-lees-and-jeff-hass-little-bobby-comics-nuclear/</loc>
		<lastmod>2018-12-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/marriotts-costly-mistake-letting-compliance-trump-security/</loc>
		<lastmod>2018-12-03T16:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/as-predicted-mobile-continued-ecommerce-dominance-over-the-holiday-weekend/</loc>
		<lastmod>2018-12-03T16:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cyber-security-roundup-for-november-2018/</loc>
		<lastmod>2018-12-03T17:13:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/jared-kay-jewelers-parent-fixes-data-leak/</loc>
		<lastmod>2018-12-03T17:25:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-chris-mallz-the-layer2-nightmare/</loc>
		<lastmod>2018-12-03T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/why-modern-enterprises-require-risk-based-vulnerability-management/</loc>
		<lastmod>2018-12-03T20:12:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/nonprofits-and-their-approach-to-security-and-access/</loc>
		<lastmod>2018-12-03T20:18:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybersecurity-fall-i-mean-spring-cleaning/</loc>
		<lastmod>2018-12-03T20:18:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-can-nonprofits-deal-with-the-cybersecurity-talent-gap/</loc>
		<lastmod>2018-12-03T20:18:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybersecurity-threats-to-nonprofits-lessons-learned-from-expert-panel/</loc>
		<lastmod>2018-12-03T20:18:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/guess-what-we-learned-from-our-nonprofit-cybersecurity-experts/</loc>
		<lastmod>2018-12-03T20:18:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/shortage-of-security-talent-driving-cybersecurity-automation-at-saas-companies/</loc>
		<lastmod>2018-12-03T20:18:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybersecurity-is-no-longer-a-saas-companys-big-secret/</loc>
		<lastmod>2018-12-03T20:18:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/saas-companies-are-breaking-up-with-excel-for-managing-cybersecurity-heres-why/</loc>
		<lastmod>2018-12-03T20:18:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-reasons-saas-companies-are-automating-cybersecurity-you-wont-believe-reason-number-4/</loc>
		<lastmod>2018-12-03T20:18:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/pass-soc-2-audits-in-one-click-not-possible-until-now/</loc>
		<lastmod>2018-12-03T20:18:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/vulnerability-management-software-an-essential-piece-of-the-security-puzzle/</loc>
		<lastmod>2018-12-03T21:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/delta-risk-ceo-scott-kaine-featured-on-insights-intelligence-cloud-security-podcast/</loc>
		<lastmod>2018-12-03T21:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/zero-trust-security-threat-report-for-education/</loc>
		<lastmod>2018-12-03T21:27:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-much-do-financial-service-organizations-struggle-with-machine-identities/</loc>
		<lastmod>2018-12-03T21:30:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/overcoming-openstack-obstacles-for-vcdn-at-the-edge/</loc>
		<lastmod>2018-12-03T21:50:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cyber-monday-the-biggest-day-for-cyberattacks-not-by-a-long-shot/</loc>
		<lastmod>2018-12-03T22:22:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/read-all-about-it-the-breaches-that-wont-make-the-headlines/</loc>
		<lastmod>2018-12-04T05:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/california-iot-security-law-a-nearsighted-toothless-guard-dog-or-a-wolf-in-sheeps-clothing/</loc>
		<lastmod>2018-12-04T05:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/business-email-compromise-putting-a-wisconsin-case-under-the-microscope/</loc>
		<lastmod>2018-12-04T07:41:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2019-predictions-ics-cyber-security-challenges-for-cisos/</loc>
		<lastmod>2018-12-04T08:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-look-back-on-2018-what-was-hype-and-what-was-perhaps-underrated/</loc>
		<lastmod>2018-12-04T08:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/critical-cloud-skills-for-2019-and-beyond/</loc>
		<lastmod>2018-12-04T09:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hackers-breach-quora-to-steal-100-million-user-accounts-if-you-were-logged-out-change-your-password-now/</loc>
		<lastmod>2018-12-04T09:54:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/why-is-an-information-security-policy-so-important/</loc>
		<lastmod>2018-12-04T10:48:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-sees-api-breaches-surge-with-no-relief-in-sight/</loc>
		<lastmod>2018-12-04T10:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-benefits-of-guest-blogging-you-should-know-about-2/</loc>
		<lastmod>2018-12-04T11:19:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/network-visibility-can-you-analyze-encrypted-traffic-for-cybersecurity-threats/</loc>
		<lastmod>2018-12-04T12:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dell-detects-data-breach-informs-customers-after-a-month/</loc>
		<lastmod>2018-12-04T12:20:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bad-consumer-security-advice/</loc>
		<lastmod>2018-12-04T12:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/security-incident-potentially-exposed-100-million-quora-users-personal-data/</loc>
		<lastmod>2018-12-04T14:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/marriott-the-case-for-cybersecurity-due-diligence-during-ma/</loc>
		<lastmod>2018-12-04T14:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/starwood-breach-shows-the-vulnerability-of-the-hospitality-and-travel-industry/</loc>
		<lastmod>2018-12-04T13:33:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/aligning-secops-teams-with-compliance-roadmaps/</loc>
		<lastmod>2018-12-04T14:38:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hey-belfast-impervas-moving-into-the-neighborhood/</loc>
		<lastmod>2018-12-04T14:45:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/quora-hacked-almost-a-100-million-users-data-compromised/</loc>
		<lastmod>2018-12-04T14:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/microsoft-open-sources-seal-simple-encrypted-arithmetic-library-3-1-0-with-aims-to-standardize-homomorphic-encryption/</loc>
		<lastmod>2018-12-04T14:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/blockchain-security-3-ways-to-secure-your-blockchain/</loc>
		<lastmod>2018-12-04T15:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bypass-of-disabled-system-functions/</loc>
		<lastmod>2018-12-04T15:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/video-the-bots-are-coming-a-blue-teamer-survival-guide/</loc>
		<lastmod>2018-12-04T15:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ottuesday-how-to-secure-the-bank-of-ott/</loc>
		<lastmod>2018-12-04T15:32:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-magic-of-education-technology/</loc>
		<lastmod>2018-12-04T15:52:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/blackhat-2018-adam-shostacks-threat-modeling-in-2018/</loc>
		<lastmod>2018-12-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/appsec-is-dead-but-software-security-is-alive-well/</loc>
		<lastmod>2018-12-04T16:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/marriott-breach-encryption-exploited/</loc>
		<lastmod>2018-12-04T17:12:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/government-messaging-solutions-for-the-21st-century-think-beyond-encryption/</loc>
		<lastmod>2018-12-04T17:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-next-wave-of-innovation-for-the-internet-of-things-is-security/</loc>
		<lastmod>2018-12-04T17:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-corporate-compliance-and-oversight-solution-buying-guide/</loc>
		<lastmod>2018-12-04T17:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/securing-the-ai-powered-enterprise/</loc>
		<lastmod>2018-12-04T17:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/4-compliance-and-risk-reports-every-ciso-needs/</loc>
		<lastmod>2018-12-04T17:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/in-review-nist-cybersecurity-risk-management-conference/</loc>
		<lastmod>2018-12-04T17:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-audit-management-solutions-buying-guide/</loc>
		<lastmod>2018-12-04T17:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/shift-to-integrated-risk-management-and-a-risk-based-lens/</loc>
		<lastmod>2018-12-04T17:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-supply-chain-risk-management-solution-buying-guide/</loc>
		<lastmod>2018-12-04T17:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/national-cyber-strategy-signals-changes-to-dfars-mandate/</loc>
		<lastmod>2018-12-04T17:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/california-consumer-privacy-act-and-the-future-of-cyber-regulation-in-the-u-s/</loc>
		<lastmod>2018-12-04T17:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/presidents-cybersecurity-moonshot-transformational-or-pie-in-the-sky/</loc>
		<lastmod>2018-12-04T17:31:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/critical-vulnerability-uncovered-in-kubernetes/</loc>
		<lastmod>2018-12-04T18:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hide-n-seek-botnet-expands-avast/</loc>
		<lastmod>2018-12-04T18:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-new-version-of-sof-elk-is-here-download-turn-on-and-get-going-on-forensics-analysis/</loc>
		<lastmod>2018-12-04T18:59:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/phishing-attacks-expose-companys-weakest-security-link/</loc>
		<lastmod>2018-12-04T19:42:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/mobile-trends-during-the-us-holiday-weekend/</loc>
		<lastmod>2018-12-04T19:48:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/decking-the-halls-for-holiday-traditions/</loc>
		<lastmod>2018-12-04T19:56:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-karl-fosaaens-attacking-azure-environments-with-powershell/</loc>
		<lastmod>2018-12-04T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-breach-or-just-a-forced-password-reset/</loc>
		<lastmod>2018-12-04T21:45:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/getting-more-money-for-cybersecurity-budget-why-its-essential-now/</loc>
		<lastmod>2018-12-04T21:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/using-innocent-roles-to-hide-admin-users/</loc>
		<lastmod>2018-12-04T22:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/xkcd-cohorts-and-age-effects/</loc>
		<lastmod>2018-12-05T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/1-800-flowers-and-quora-report-data-breaches-avast/</loc>
		<lastmod>2018-12-05T00:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/exploiting-an-rce-bug-in-the-udp-protocol-implemented-in-freertos/</loc>
		<lastmod>2018-12-05T00:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ubiquitous-video-surveillance-and-the-policing-paradigm-change-it-brings/</loc>
		<lastmod>2018-12-05T01:02:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/why-are-phishing-attacks-still-so-effective/</loc>
		<lastmod>2018-12-05T03:22:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-lsly-ayyys-blue-blood-injection-transitioning-red-to-purple/</loc>
		<lastmod>2018-12-05T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/getting-creative-with-your-vulnerability-management-strategy/</loc>
		<lastmod>2018-12-05T04:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/lessons-to-learn-from-armored-cars-in-the-era-of-cloud-computing/</loc>
		<lastmod>2018-12-05T04:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/financial-services-data-more-at-risk-than-youd-believe/</loc>
		<lastmod>2018-12-05T08:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/guest-essay-atrium-health-data-breach-highlights-lingering-third-party-exposures/</loc>
		<lastmod>2018-12-05T08:27:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/iso-27001-information-security-event-vs-incident-vs-non-compliance-2/</loc>
		<lastmod>2018-12-05T09:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/one-third-of-all-vulnerabilities-rated-high-risk/</loc>
		<lastmod>2018-12-05T09:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hashicorp-vault-1-0-released-with-batch-tokens-updated-ui-and-more/</loc>
		<lastmod>2018-12-05T10:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/microsoft-and-mastercard-partner-to-build-a-universally-recognized-digital-identity/</loc>
		<lastmod>2018-12-05T10:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/visualize-everyday-workflow-threats-to-prevent-data-breaches/</loc>
		<lastmod>2018-12-05T12:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/good-peoplesoft-news-first/</loc>
		<lastmod>2018-12-05T12:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bitglass-security-spotlight-financial-services-facing-cyberattacks/</loc>
		<lastmod>2018-12-05T12:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/six-lessons-learned-for-mitigating-ddos-attacks/</loc>
		<lastmod>2018-12-05T13:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/data-of-32-million-sky-brasil-customers-easily-accessible-on-unprotected-elasticsearch-server/</loc>
		<lastmod>2018-12-05T14:05:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/network-check-ups/</loc>
		<lastmod>2018-12-05T14:20:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/healthcare-it-services-firm-improves-operations-with-avast-avast-business/</loc>
		<lastmod>2018-12-05T14:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/tracing-aws-sdk-calls-with-no-code-changes-for-aws-lambda-security/</loc>
		<lastmod>2018-12-05T14:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/helping-exponential-e-navigate-the-changing-threat-landscape/</loc>
		<lastmod>2018-12-05T15:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/i-am-alexa-and-i-am-here-to-help-simple-tweaks-to-help-reduce-risk-from-voice-controlled-devices/</loc>
		<lastmod>2018-12-05T15:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cook-speaks-out/</loc>
		<lastmod>2018-12-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/why-customers-trust-bromium-to-let-malware-run-on-their-endpoints/</loc>
		<lastmod>2018-12-05T16:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cyberark-named-a-leader-in-gartners-inaugural-2018-magic-quadrant-for-privileged-access-management/</loc>
		<lastmod>2018-12-05T16:09:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/sentinelone-replaces-any-need-for-legacy-av-suites-with-new-features/</loc>
		<lastmod>2018-12-05T16:11:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/why-your-cybersecurity-process-is-the-problem/</loc>
		<lastmod>2018-12-05T16:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-can-we-learn-about-cybersecurity-from-the-challenger-disaster-everything/</loc>
		<lastmod>2018-12-05T16:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/to-trust-or-not-to-trust-that-is-the-question/</loc>
		<lastmod>2018-12-05T17:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/threat-intelligence-report-information-disclosure-giribaz/</loc>
		<lastmod>2018-12-05T17:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/requiescat-in-pacem-president-george-herbert-walker-bush/</loc>
		<lastmod>2018-12-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/time-series-at-shiftleft/</loc>
		<lastmod>2018-12-05T18:27:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/chenxi-wang-polishes-her-2019-crystal-ball/</loc>
		<lastmod>2018-12-05T18:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-peter-arzamendis-mirai-satori-omg-and-owari-iot-botnets-oh-my/</loc>
		<lastmod>2018-12-05T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-joy-of-techs-the-job-interview/</loc>
		<lastmod>2018-12-06T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/rpc-bug-hunting-case-studies-part-1/</loc>
		<lastmod>2018-12-06T03:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-adam-mathis-comparing-apples-to-apple/</loc>
		<lastmod>2018-12-06T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/marriott-data-breach-and-what-you-need-to-know/</loc>
		<lastmod>2018-12-06T04:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-cyberstalking-is-and-how-to-prevent-it/</loc>
		<lastmod>2018-12-06T04:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/usb-threats-to-cybersecurity-of-industrial-facilities/</loc>
		<lastmod>2018-12-06T04:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-hierarchy-of-data-security-controls/</loc>
		<lastmod>2018-12-06T08:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/guest-essay-5-security-steps-all-companies-should-adopt-from-the-intelligence-community/</loc>
		<lastmod>2018-12-06T08:22:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dont-get-phished-7-tips-to-avoid-this-common-cyber-attack/</loc>
		<lastmod>2018-12-06T08:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/red-team-104-crackmapexec/</loc>
		<lastmod>2018-12-06T10:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/rules-for-real-apts-and-implications-for-those-who-have-to-defend-against-them-part-one/</loc>
		<lastmod>2018-12-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bricata-named-to-the-inaugural-nvtc-tech-100-by-the-northern-virginia-tech-council/</loc>
		<lastmod>2018-12-06T12:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/thaumaturgic-security/</loc>
		<lastmod>2018-12-06T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/10-steps-to-recover-from-a-hacked-website/</loc>
		<lastmod>2018-12-06T14:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-i-became-a-believer-in-consuming-it-security-as-a-service/</loc>
		<lastmod>2018-12-06T14:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/malicious-chrome-extension-which-sloppily-spied-on-academics-believed-to-originate-from-north-korea/</loc>
		<lastmod>2018-12-06T14:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/more-than-100000-pcs-in-china-infected-by-new-ransomware-strain/</loc>
		<lastmod>2018-12-06T14:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/growing-your-business-millennials-and-m-commerce/</loc>
		<lastmod>2018-12-06T14:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/blockchain-christmas-and-police-in-the-cybersecurity-mix/</loc>
		<lastmod>2018-12-06T15:03:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/solving-the-cybersecurity-skills-gap-through-employee-crosswalking/</loc>
		<lastmod>2018-12-06T15:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/tabnabbing-protection-bypass/</loc>
		<lastmod>2018-12-06T15:18:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/providing-improved-security-posture-for-your-customers/</loc>
		<lastmod>2018-12-06T15:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/6-in-10-consumers-feel-social-media-poses-the-greatest-risk-to-their-personal-data-security-finds-survey/</loc>
		<lastmod>2018-12-06T15:33:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/globelmposter-2-0-tor-site-is-broken-and-victims-cant-recover-data/</loc>
		<lastmod>2018-12-06T15:39:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/huawei-cfo-arrested-in-vancouver-bc-to-be-extradited-to-united-states/</loc>
		<lastmod>2018-12-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/detecting-unsafe-data-deserialization-with-threat-stack/</loc>
		<lastmod>2018-12-06T16:03:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/49-percent-of-phishing-sites-now-use-https/</loc>
		<lastmod>2018-12-06T16:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-linux-foundation-to-launch-new-tooling-project-to-improve-open-source-compliance/</loc>
		<lastmod>2018-12-06T16:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dhs-fbi-alert-samsam-ransomware-zeroes-in-on-critical-computer-networks-in-us/</loc>
		<lastmod>2018-12-06T16:58:47+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->