<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2018/12/first-it-was-marriott-now-quora-has-been-hacked/</loc>
		<lastmod>2018-12-06T16:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/social-engineer-newsletter-vol-08-issue-111/</loc>
		<lastmod>2018-12-06T17:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2019-software-security-predictions/</loc>
		<lastmod>2018-12-06T17:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/business-continuity-and-disaster-recovery-your-organizations-safety-plan/</loc>
		<lastmod>2018-12-06T18:12:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/an-update-from-san-francisco/</loc>
		<lastmod>2018-12-06T18:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/domain-name-consolidation-observations-from-the-field/</loc>
		<lastmod>2018-12-06T18:35:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-isaiah-sarjus-how-online-dating-made-me-better-at-threat-modeling/</loc>
		<lastmod>2018-12-06T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-weaponization-of-puas/</loc>
		<lastmod>2018-12-06T20:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/localization-and-customization-of-credit-card-stealing-malware/</loc>
		<lastmod>2018-12-06T22:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/new-build-updates-deepscan-and-lsr-introduces-support-for-swagger-and-kerberos-auth/</loc>
		<lastmod>2018-12-06T23:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/pauls-security-weekly-episode-insecure-deserialization-in-java-jvm/</loc>
		<lastmod>2018-12-06T23:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/winmill-software-showcase-acunetix-at-nyc-infosec/</loc>
		<lastmod>2018-12-06T23:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-do-i-use-the-acunetix-login-sequence-recorder-on-linux/</loc>
		<lastmod>2018-12-06T23:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/xkcd-middle-latitudes/</loc>
		<lastmod>2018-12-07T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/red-team-assessment-phases-overview/</loc>
		<lastmod>2018-12-07T00:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/deception-vs-analytics-or-can-analytics-catch-true-unknown-unknowns/</loc>
		<lastmod>2018-12-07T00:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/new-machine-identity-protection-solution-from-venafi-and-digicert/</loc>
		<lastmod>2018-12-07T00:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-jamie-murdocks-threat-hunting-with-a-raspberry-pi/</loc>
		<lastmod>2018-12-07T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/intel-releases-draft-federal-privacy-bill/</loc>
		<lastmod>2018-12-07T04:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/drilling-holes-in-atms-card-skimming-and-other-fraud-cyberspeak-podcast/</loc>
		<lastmod>2018-12-07T09:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/australia-passes-a-rushed-anti-encryption-bill-to-make-australians-safe-experts-find-dangerous-loopholes-that-compromise-online-privacy-and-safety/</loc>
		<lastmod>2018-12-07T09:59:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/trade-war-tensions-with-china-rise-following-arrest-of-huawei-cfo-in-canada/</loc>
		<lastmod>2018-12-07T12:19:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ericssons-expired-software-certificate-issue-causes-massive-outages-in-uks-o2-and-japans-softbank-network-services/</loc>
		<lastmod>2018-12-07T12:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hackathon-uses-machine-learning-to-improve-cybersecurity/</loc>
		<lastmod>2018-12-07T14:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/linux-rabbit-and-rabbot-malware-leveraged-to-install-cryptominers/</loc>
		<lastmod>2018-12-07T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/watchguard-technologies-expands-sd-wan-capabilities-to-its-unified-security-platform-2/</loc>
		<lastmod>2018-12-07T15:57:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cybercrime-targets-ios-users-and-50000-execs-avast/</loc>
		<lastmod>2018-12-07T15:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/mastercard-microsoft-questionable-claims-in-the-development-of-universal-identity-management-solutions/</loc>
		<lastmod>2018-12-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/why-does-blockchain-makes-so-much-more-sense-after-gdpr-2/</loc>
		<lastmod>2018-12-07T16:02:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/banks-attacked-through-malicious-hardware-connected-to-the-local-network/</loc>
		<lastmod>2018-12-07T16:50:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ive-been-hacked-what-to-do-after-youve-been-hacked/</loc>
		<lastmod>2018-12-07T17:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/all-i-want-for-christmas-is-a-new-ssl-certificate/</loc>
		<lastmod>2018-12-07T17:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dark-web-phishing-kits-cheap-plentiful-and-ready-to-trick-you/</loc>
		<lastmod>2018-12-07T19:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/5-key-takeaways-from-the-gartner-iam-summit/</loc>
		<lastmod>2018-12-07T19:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-sara-leals-jason-morrows-ma-defense-and-integration-all-that-glitters-is-not-gold/</loc>
		<lastmod>2018-12-07T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ready-player-one-a-synopsis-on-terrible-password-management-in-a-dystopian-future/</loc>
		<lastmod>2018-12-07T20:40:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/december-7-1941/</loc>
		<lastmod>2018-12-07T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/fake-volkswagen-campaign-spreads-through-social-networks/</loc>
		<lastmod>2018-12-07T22:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bomb-threat-hoaxer-ddos-boss-gets-3-years/</loc>
		<lastmod>2018-12-08T01:38:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-april-wrights-social-engineering-at-work-how-to-use-positive-influence-to-gain-management-buy-in-for-anything/</loc>
		<lastmod>2018-12-08T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-eric-watkins-devin-noels-ham-radio-4-hackers/</loc>
		<lastmod>2018-12-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-dan-browders-getting-control-of-your-vendors-before-they-take-you-down/</loc>
		<lastmod>2018-12-08T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-joy-of-techs-the-anti-tech-movement/</loc>
		<lastmod>2018-12-09T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-coleman-kanes-cyber-intelligence-there-are-no-rules-and-no-certainties/</loc>
		<lastmod>2018-12-09T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-russell-nielsens-getting-started-in-ccdc/</loc>
		<lastmod>2018-12-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-andrew-kalats-changing-our-mindset-from-technical-to-psychological-defenses/</loc>
		<lastmod>2018-12-09T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/robert-m-lees-and-jeff-hass-little-bobby-comics-platform/</loc>
		<lastmod>2018-12-10T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/use-these-critical-security-controls-for-a-better-security-posture/</loc>
		<lastmod>2018-12-10T00:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-zach-graces-red-mirror-bringing-telemetry-to-red-teaming/</loc>
		<lastmod>2018-12-10T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/pentest-toolbox-additions-2018/</loc>
		<lastmod>2018-12-10T04:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/17-technology-it-and-engineering-scholarships-for-women-in-2019-2020/</loc>
		<lastmod>2018-12-10T04:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-quora-data-breach-facebooks-private-emails-google-location-tracking-wb46/</loc>
		<lastmod>2018-12-10T05:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/guest-essay-tis-the-season-to-take-proactive-measures-to-improve-data-governance/</loc>
		<lastmod>2018-12-10T08:17:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cybersecurity-investment-to-shoot-up-in-financial-industry-in-2019-top-firms-already-spend-1-billion/</loc>
		<lastmod>2018-12-10T09:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/apple-updates-10th-december-2018/</loc>
		<lastmod>2018-12-10T10:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/10-proven-security-awareness-tips-from-osterman-research-cyberspeak-podcast/</loc>
		<lastmod>2018-12-10T11:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/new-sextortion-scam-campaign-delivering-gandcrab-ransomware/</loc>
		<lastmod>2018-12-10T12:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/iranian-hackers-attack-u-k-cybersecurity-universities/</loc>
		<lastmod>2018-12-10T13:01:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/reflections-from-gartners-iam-summit-2018/</loc>
		<lastmod>2018-12-10T13:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dont-overlook-the-human-element-in-security-training-and-awareness/</loc>
		<lastmod>2018-12-10T13:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/more-encrypted-traffic-than-ever/</loc>
		<lastmod>2018-12-10T14:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/australias-assistance-and-access-aa-bill-popularly-known-as-the-anti-encryption-law-opposed-by-many-including-the-tech-community/</loc>
		<lastmod>2018-12-10T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/new-insights-feature-in-avast-mobile-security-keeps-you-informed-avast/</loc>
		<lastmod>2018-12-10T14:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/tripping-the-jenkins-main-security-circuit-breaker-an-inside-look-at-two-jenkins-security-vulnerabilities/</loc>
		<lastmod>2018-12-10T14:50:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/red-team-assessment-phases-reconnaissance/</loc>
		<lastmod>2018-12-10T15:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/open-source-risk-continues-to-challenge-organizations-software-security/</loc>
		<lastmod>2018-12-10T15:25:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/achieving-the-right-balance-combining-technology-and-human-interaction/</loc>
		<lastmod>2018-12-10T15:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2019-saas-trends-if-the-climates-sunny-whys-the-forecast-mixed/</loc>
		<lastmod>2018-12-10T15:53:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-austin-bakers-doug-bienstocks-two-factor-too-furious-evading-and-protecting-evolving-mfa-schemes/</loc>
		<lastmod>2018-12-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/getting-started-with-appsec-4-best-practices/</loc>
		<lastmod>2018-12-10T16:38:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/holiday-shopping-for-cybercriminals-the-value-of-digital-identity/</loc>
		<lastmod>2018-12-10T17:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/returning-control-of-our-personal-data-hurrah-for-ccpa/</loc>
		<lastmod>2018-12-10T17:25:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/privacy-shield-does-not-equal-gdpr-compliance/</loc>
		<lastmod>2018-12-10T17:34:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/discovery-discovery-discovery-the-rest-is-salad-dressing/</loc>
		<lastmod>2018-12-10T17:39:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/defending-credentials-from-automated-attack-tools/</loc>
		<lastmod>2018-12-10T17:42:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-rise-of-the-attacker-centric-web-application-firewall-waf/</loc>
		<lastmod>2018-12-10T17:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/seeing-is-believing/</loc>
		<lastmod>2018-12-10T17:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/fraudsters-are-banks-chief-competition/</loc>
		<lastmod>2018-12-10T19:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/command-and-control-over-icmp-chronicles-of-red-team-c2/</loc>
		<lastmod>2018-12-10T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/threat-stack-announces-new-and-enhanced-cloudtrail-rules/</loc>
		<lastmod>2018-12-10T20:33:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-internet-savvy-are-your-leaders/</loc>
		<lastmod>2018-12-10T20:40:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/its-time-to-get-proactive-on-energy-sector-security/</loc>
		<lastmod>2018-12-10T21:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/vulnhub-machines-walkthrough-series-brainpan-part-2/</loc>
		<lastmod>2018-12-10T21:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/9-features-a-modern-phishing-threat-detection-solution-should-have/</loc>
		<lastmod>2018-12-10T22:52:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ottuesday-itv-on-live-streaming-the-world-cup/</loc>
		<lastmod>2018-12-11T14:45:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/xkcd-mercator-projection/</loc>
		<lastmod>2018-12-11T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/marriott-hotels-4-year-hack-impacts-half-a-billion-guests/</loc>
		<lastmod>2018-12-11T01:28:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-darby-mullens-iot-not-even-your-bed-is-safe/</loc>
		<lastmod>2018-12-11T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/achieve-security-through-compliance-in-the-cloud/</loc>
		<lastmod>2018-12-11T05:43:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/artificial-intelligence-and-cybersecurity-attacking-and-defending/</loc>
		<lastmod>2018-12-11T05:43:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/google-affected-by-another-bug-52m-users-compromised-shut-down-within-90-days/</loc>
		<lastmod>2018-12-11T07:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/its-time-to-think-twice-about-retail-loyalty-programs/</loc>
		<lastmod>2018-12-11T08:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/legally-dangerous-attackers/</loc>
		<lastmod>2018-12-11T09:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/netsparker-and-gitlab-integration/</loc>
		<lastmod>2018-12-11T09:03:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/equifax-data-breach-could-have-been-entirely-preventable-says-house-oversight-and-government-reform-committee-staff-report/</loc>
		<lastmod>2018-12-11T11:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bitdefender-top-10-cybersecurity-predictions-for-2019/</loc>
		<lastmod>2018-12-11T11:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-enhanced-network-metadata-resolution-facilitates-network-threat-hunting/</loc>
		<lastmod>2018-12-11T12:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/major-privacy-issues-in-google-force-its-shutdown-earlier-than-planned/</loc>
		<lastmod>2018-12-11T12:37:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bug-affected-52-5-million-users-in-connection-with-a-google-api/</loc>
		<lastmod>2018-12-11T12:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/understanding-the-7-different-types-of-data-breaches/</loc>
		<lastmod>2018-12-11T13:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/third-party-ransomware-attack-compromises-data-of-16000-redwood-eye-care-center-patients/</loc>
		<lastmod>2018-12-11T14:14:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/fortinet-and-symantec-join-forces-to-help-organizations-move-their-security-to-the-cloud/</loc>
		<lastmod>2018-12-11T14:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/take-initiative-in-tech-dissemination/</loc>
		<lastmod>2018-12-11T14:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/facing-the-fear-and-securing-the-internet-of-things-iot/</loc>
		<lastmod>2018-12-11T14:54:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/9-core-specialty-aws-security-certifications/</loc>
		<lastmod>2018-12-11T15:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-appsec-reduces-unplanned-work/</loc>
		<lastmod>2018-12-11T15:12:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/star-wannacry-victim-nhs-to-ban-fax-machines-by-2020/</loc>
		<lastmod>2018-12-11T15:25:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/red-team-assessment-phases-target-identification/</loc>
		<lastmod>2018-12-11T15:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/roles-and-responsibilities-of-information-security-auditor/</loc>
		<lastmod>2018-12-11T15:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/netsparker-announces-new-application-websites-discovery-service/</loc>
		<lastmod>2018-12-11T15:35:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-key-to-turning-your-security-program-into-a-marketing-asset-while-staying-secure/</loc>
		<lastmod>2018-12-11T15:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/beware-of-dishonest-ransomware-recovery-firms/</loc>
		<lastmod>2018-12-11T15:56:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/secure-business-communications-4-things-you-need-to-know/</loc>
		<lastmod>2018-12-11T15:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ensuring-a-secure-cloud-journey-in-a-world-of-containers/</loc>
		<lastmod>2018-12-11T15:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-john-althouses-fingerprinting-encrypted-channels-for-detection/</loc>
		<lastmod>2018-12-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/5-must-read-resources-for-compliance-and-it-leaders-in-investment-firms/</loc>
		<lastmod>2018-12-11T16:15:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/using-encryption-key-management-to-navigate-the-digital-cloud-transformation/</loc>
		<lastmod>2018-12-11T16:32:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/vendercom-future-of-payments-conference/</loc>
		<lastmod>2018-12-11T16:33:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/netsecopen-names-founding-members-appoints-inaugural-board-of-directors/</loc>
		<lastmod>2018-12-11T16:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/get-freebies-by-abusing-the-android-inapp-billing-api/</loc>
		<lastmod>2018-12-11T17:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-the-hack-2018/</loc>
		<lastmod>2018-12-11T17:57:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/deconstructing-data-leak-incident-of-signet-jewelers-parent-company-of-kay-and-jared-jewelers/</loc>
		<lastmod>2018-12-11T19:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/8-must-have-features-in-an-iast-solution/</loc>
		<lastmod>2018-12-11T19:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/sap-security-notes-december-18-high-priority-missing-authorization-check-affecting-sap-s-4hana/</loc>
		<lastmod>2018-12-11T19:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/december-2018-patch-tuesday-39-vulns-workstation-patches-adobe-vulns/</loc>
		<lastmod>2018-12-11T19:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-tracking-of-america-why-are-you-letting-it-happen/</loc>
		<lastmod>2018-12-11T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/webkit-vulnerability-affecting-safari-et-al/</loc>
		<lastmod>2018-12-11T20:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/professionally-evil-cissp-certification-breaking-the-bootcamp-model/</loc>
		<lastmod>2018-12-11T20:39:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/patch-tuesday-december-2018-edition/</loc>
		<lastmod>2018-12-11T21:05:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/rocks-pebbles-shadow-it/</loc>
		<lastmod>2018-12-11T21:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/vert-threat-alert-december-2018-patch-tuesday-analysis/</loc>
		<lastmod>2018-12-11T22:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/pci-ssc-updates-guidance-to-protect-telephone-based-payment-card-data/</loc>
		<lastmod>2018-12-11T22:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/avant-communications-and-alert-logic-partner-to-enable-avants-growing-network-of-trusted-advisors-to-represent-market-leading-security-as-a-service-solution/</loc>
		<lastmod>2018-12-11T22:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/10-simple-tips-to-protect-you-from-an-email-hack-avast/</loc>
		<lastmod>2018-12-11T23:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/owasp-top-10-security-risks-part-iii/</loc>
		<lastmod>2018-12-11T23:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-joy-of-techs-alms-for-the-pedia/</loc>
		<lastmod>2018-12-12T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-shifting-ai-driven-threat-landscape/</loc>
		<lastmod>2018-12-12T00:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/notes-about-hacking-with-drop-tools/</loc>
		<lastmod>2018-12-12T03:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-nick-stephens-on-the-nose-bypassing-huaweis-fingerprint-authentication-by-exploiting-the-trustzone/</loc>
		<lastmod>2018-12-12T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/book-review-hacking-for-dummies-6th-edition/</loc>
		<lastmod>2018-12-12T05:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/guest-essay-why-corporate-culture-plays-such-a-pivotal-role-in-deterring-data-breaches/</loc>
		<lastmod>2018-12-12T08:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-to-avoid-becoming-the-next-equifax-investigation-reveals-breach-was-entirely-preventable/</loc>
		<lastmod>2018-12-12T08:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/torpcap-tor-network-forensics/</loc>
		<lastmod>2018-12-12T09:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/trustworthy-network-segmentation-for-an-untrustworthy-world/</loc>
		<lastmod>2018-12-12T09:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-well-do-email-security-gateways-protect-against-targeted-attacks/</loc>
		<lastmod>2018-12-12T10:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/saipem-identified-a-digital-attack-against-some-of-its-servers/</loc>
		<lastmod>2018-12-12T12:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-the-year-privacy-took-center-stage/</loc>
		<lastmod>2018-12-12T13:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/entrust-datacard-launches-new-managed-services-for-pki/</loc>
		<lastmod>2018-12-12T13:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/data-protection-on-demand-helps-orgs-with-cloud-hsm-encryption-key-management-finds-test/</loc>
		<lastmod>2018-12-12T14:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securing-kubernetes-clusters-by-eliminating-risky-permissions/</loc>
		<lastmod>2018-12-12T15:11:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/red-team-assessment-phases-gaining-access/</loc>
		<lastmod>2018-12-12T15:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/webinar-learning-ai-for-hackers-a-visual-primer-on-dec-20-2018/</loc>
		<lastmod>2018-12-12T15:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-gabriel-ryans-bypassing-port-security-in-2018-defeating-macsec-and-802-1x-2010/</loc>
		<lastmod>2018-12-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-in-review-healthcare-under-attack/</loc>
		<lastmod>2018-12-12T16:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/comptia-cloud-certification-an-overview/</loc>
		<lastmod>2018-12-12T17:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/sec-getting-more-aggressive-on-financial-cyber-lapses/</loc>
		<lastmod>2018-12-12T17:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/we-have-a-lot-of-wood-to-cut/</loc>
		<lastmod>2018-12-12T17:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dont-be-fooled-by-the-padlock-phishing-sites-can-be-https-too-2/</loc>
		<lastmod>2018-12-12T19:10:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/new-nist-tls-management-guidelines-for-infosec-expert-advice-2/</loc>
		<lastmod>2018-12-12T19:24:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/scanning-for-flaws-scoring-for-security/</loc>
		<lastmod>2018-12-12T19:25:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cellular-outage-for-32-million-brits-caused-by-expired-certificate-2/</loc>
		<lastmod>2018-12-12T19:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/nothing-to-see-here-move-along/</loc>
		<lastmod>2018-12-12T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/were-on-the-cusp-of-the-4th-industrial-revolution-or-industry-4-0-2/</loc>
		<lastmod>2018-12-12T20:16:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/3-predictions-what-will-happen-to-machine-identities-in-2019/</loc>
		<lastmod>2018-12-12T20:29:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/3-reasons-why-apptega-is-the-perfect-cybersecurity-holiday-gift/</loc>
		<lastmod>2018-12-12T20:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/read-new-attack-analytics-dashboard-streamlines-security-investigations/</loc>
		<lastmod>2018-12-12T21:26:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/an-avoidable-breach-that-could-happen-to-any-organization/</loc>
		<lastmod>2018-12-12T21:51:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/4-big-security-lessons-from-the-marriott-starwood-data-breach/</loc>
		<lastmod>2018-12-12T21:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-goodbye-obfuscation-omer-yairs-hello-invisi-shell-hiding-your-powershell-script-in-plain-sight/</loc>
		<lastmod>2018-12-13T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/xkcd-fdr/</loc>
		<lastmod>2018-12-13T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/why-you-need-a-concrete-incident-response-plan-not-strategy/</loc>
		<lastmod>2018-12-13T04:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/tis-the-season-to-be-a-prudent-retailer/</loc>
		<lastmod>2018-12-13T04:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/above-and-below-decks/</loc>
		<lastmod>2018-12-13T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/building-a-foundation-of-trust-for-the-internet-of-things/</loc>
		<lastmod>2018-12-13T08:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/an-open-letter-to-our-customers-and-partners/</loc>
		<lastmod>2018-12-13T08:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-theoretical-riskicists-guide-to-the-universe/</loc>
		<lastmod>2018-12-13T12:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/corporate-boards-navigate-new-data-privacy-regulations-digital-transformation-and-cyber-security-risks/</loc>
		<lastmod>2018-12-13T12:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/microsoft-announces-windows-dns-server-heap-overflow-vulnerability-users-dissatisfied-with-patch-details/</loc>
		<lastmod>2018-12-13T13:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/marriott-breach-points-to-issue-in-security-reporting-in-ma-deals/</loc>
		<lastmod>2018-12-13T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/security-considerations-for-aws-lambda-runtime-api-and-layers/</loc>
		<lastmod>2018-12-13T14:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cybersecurity-as-a-selling-point-retailers-take-note/</loc>
		<lastmod>2018-12-13T14:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-is-the-latest-consumer-data-protection-act-that-everyone-is-talking-about/</loc>
		<lastmod>2018-12-13T15:07:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2019-will-see-cybercriminals-eye-opportunities-in-cryptocurrency-and-iot-to-launch-their-attacks/</loc>
		<lastmod>2018-12-13T15:13:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/red-team-assessment-phases-establishing-foothold-and-maintaining-presence/</loc>
		<lastmod>2018-12-13T15:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/threat-stack-introduces-bulk-data-export-feature/</loc>
		<lastmod>2018-12-13T15:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cybersecurity-agenda-breaking-down-stereotypes/</loc>
		<lastmod>2018-12-13T15:57:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-brandon-shermans-cloud-forensics-putting-the-bits-back-together/</loc>
		<lastmod>2018-12-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/machine-identity-protection-development-fund-our-first-three-developers/</loc>
		<lastmod>2018-12-13T16:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/f5-labs-2018-phishing-fraud-report/</loc>
		<lastmod>2018-12-13T17:46:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/its-past-time-to-pay-much-more-attention-to-api-security/</loc>
		<lastmod>2018-12-13T18:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/unlocking-android-phones-with-a-3d-printed-head/</loc>
		<lastmod>2018-12-13T19:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/recovery-a-critical-aspect-of-data-protection/</loc>
		<lastmod>2018-12-13T20:19:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/spammed-bomb-threat-hoax-demands-bitcoin/</loc>
		<lastmod>2018-12-13T20:24:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/gsa-simplifies-categories-for-it-70-hacs-sins/</loc>
		<lastmod>2018-12-13T20:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/preparing-for-tomorrows-threats/</loc>
		<lastmod>2018-12-13T21:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/trusted-computing-group-at-electronica-2018/</loc>
		<lastmod>2018-12-13T22:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ami-presents-on-tpm-usage-at-uefi-plugfest/</loc>
		<lastmod>2018-12-13T22:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-francisco-donosos-killsuit-the-equation-groups-swiss-army-knife-for-persistence-evasion-and-data-exfil/</loc>
		<lastmod>2018-12-14T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/lampiao-1-ctf-walkthrough/</loc>
		<lastmod>2018-12-14T00:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-joy-of-techs-some-suggestions-to-increase-iphone-sales/</loc>
		<lastmod>2018-12-14T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/tis-the-season-to-be-a-prudent-shopper/</loc>
		<lastmod>2018-12-14T05:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/former-senior-vps-take-on-the-mariott-data-breach-nyt-reports-suspects-chinese-hacking-ties/</loc>
		<lastmod>2018-12-14T08:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/nfcdrip-data-exfiltration-research-in-near-field-communication/</loc>
		<lastmod>2018-12-14T08:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-a-year-of-data-breaches-in-review/</loc>
		<lastmod>2018-12-14T09:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/third-party-breach-affects-credit-card-info-of-47000-patients/</loc>
		<lastmod>2018-12-14T10:27:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/save-the-children-federation-tricked-into-sending-1-million-to-scammers/</loc>
		<lastmod>2018-12-14T12:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bitcoin-scammers-launch-international-bomb-threat-hoax-across-us-canada-australia-new-zealand/</loc>
		<lastmod>2018-12-14T12:57:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-is-cloud-workload-security/</loc>
		<lastmod>2018-12-14T13:56:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/civica-exchange-2019/</loc>
		<lastmod>2018-12-14T14:47:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/malware-removal-and-security-tips-with-malwarebytes-cyberspeak-podcast/</loc>
		<lastmod>2018-12-14T14:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/why-using-a-vpn-is-a-good-idea-and-how-to-get-over-the-drawbacks/</loc>
		<lastmod>2018-12-14T15:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/our-2018-update-for-endpoint-detection-and-response-architecture-and-operations-practices-publishes/</loc>
		<lastmod>2018-12-14T15:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-stan-hegts-pieter-ceelens-the-ms-office-magic-show/</loc>
		<lastmod>2018-12-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/automating-cyber-defense/</loc>
		<lastmod>2018-12-14T16:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/android-malware-the-starwood-breach-and-more-avast/</loc>
		<lastmod>2018-12-14T16:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/healthcare-email-cybersecurity/</loc>
		<lastmod>2018-12-14T16:35:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/why-i-joined-verodin-by-colby-derodeff/</loc>
		<lastmod>2018-12-14T16:35:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/instrumenting-splunk-with-verodin-sip/</loc>
		<lastmod>2018-12-14T16:35:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/leveraging-evidence-to-get-left-of-boom/</loc>
		<lastmod>2018-12-14T16:35:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/does-your-leadership-leverage-security-metrics-for-business-decisions/</loc>
		<lastmod>2018-12-14T16:35:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/instrumenting-network-segmentation-with-verodin-sip/</loc>
		<lastmod>2018-12-14T16:35:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/black-hat-verodin-shaking-it-up/</loc>
		<lastmod>2018-12-14T16:35:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cybersecurity-execs-do-you-know-what-youre-missing/</loc>
		<lastmod>2018-12-14T16:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/most-common-cybersecurity-questions-from-executive-leadership-and-boards/</loc>
		<lastmod>2018-12-14T16:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/happy-ada-lovelace-day-from-verodin/</loc>
		<lastmod>2018-12-14T16:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybersecurity-is-an-embarrassment-of-riches/</loc>
		<lastmod>2018-12-14T16:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/instrumenting-arcsight-with-verodin-sip/</loc>
		<lastmod>2018-12-14T16:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/validating-your-mssps-technical-effectiveness-and-slas/</loc>
		<lastmod>2018-12-14T16:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/threatx-recognized-as-a-finalist-for-best-web-application-solution/</loc>
		<lastmod>2018-12-14T16:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2019-could-be-the-worst-year-yet-for-cyber-breaches/</loc>
		<lastmod>2018-12-14T17:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-initial-rsa-conference-2019-keynote-line-up/</loc>
		<lastmod>2018-12-14T17:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-look-into-xpc-internals-reverse-engineering-the-xpc-objects/</loc>
		<lastmod>2018-12-14T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-holiday-shopping-reminded-me-about-email-security/</loc>
		<lastmod>2018-12-14T18:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dont-panic-its-a-hoax/</loc>
		<lastmod>2018-12-14T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/naughty-or-nice-websites/</loc>
		<lastmod>2018-12-14T20:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/achieving-a-security-conscious-work-culture/</loc>
		<lastmod>2018-12-14T20:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-better-audit-process-for-oracle-ebs-2/</loc>
		<lastmod>2018-12-14T20:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/oracle-ebs-remediation-on-your-own-schedule-2/</loc>
		<lastmod>2018-12-14T20:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/apklab-io-discovers-patche-netflix-fake-app-scam-avast/</loc>
		<lastmod>2018-12-14T23:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/want-a-more-secure-more-effective-cloud-watch-your-machine-identities/</loc>
		<lastmod>2018-12-14T23:45:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-adam-reisers-living-off-the-land-enterprise-post-exploitation/</loc>
		<lastmod>2018-12-15T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-joy-of-techs-ask-a-stupid-question/</loc>
		<lastmod>2018-12-15T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hackers-are-our-societys-immune-system-keren-elazari-on-the-future-of-cybersecurity/</loc>
		<lastmod>2018-12-15T13:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-adam-comptons-hillbilly-storytime-pentest-fails/</loc>
		<lastmod>2018-12-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-jacob-baines-bug-hunting-in-routeros/</loc>
		<lastmod>2018-12-15T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-tim-roberts-brent-whites-breaking-into-your-building-a-hackers-guide-to-unauthorized-access/</loc>
		<lastmod>2018-12-16T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/notes-on-build-hardening/</loc>
		<lastmod>2018-12-16T03:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-bryce-soen-bearchells-the-making-of-an-ios-11-jailbreak-kiddie-to-kernel-hacker-in-14-sleepless-nights/</loc>
		<lastmod>2018-12-16T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bogus-bomb-threats-demand-bitcoin-disrupt-businesses/</loc>
		<lastmod>2018-12-16T05:10:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/five-ways-to-identify-phishing-emails/</loc>
		<lastmod>2018-12-16T07:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/setting-up-an-email-server-for-the-direct-email-spooling-attack-how-to-guide/</loc>
		<lastmod>2018-12-16T07:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/discovering-hidden-email-gateways-with-osint-techniques/</loc>
		<lastmod>2018-12-16T07:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-evade-expensive-phishing-filters-with-one-simple-trick/</loc>
		<lastmod>2018-12-16T07:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/phishing-is-the-top-reason-behind-australian-data-breaches/</loc>
		<lastmod>2018-12-16T07:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/your-definitive-guide-to-information-security-conferences-in-2019/</loc>
		<lastmod>2018-12-16T07:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-phishing-campaigns-have-in-common-with-cocos-islands/</loc>
		<lastmod>2018-12-16T07:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-tomasz-tuzels-who-watches-the-watcher/</loc>
		<lastmod>2018-12-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/normal-service-suspended-indefinitely/</loc>
		<lastmod>2018-12-16T17:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-adam-golds-danny-chrastils-pwning-in-the-sandbox-osx-macro-exploitation-beyond/</loc>
		<lastmod>2018-12-16T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-to-enable-a-culture-of-devops-in-security/</loc>
		<lastmod>2018-12-16T21:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/derbycon-2018-katie-kusjanovics-matthew-sheltons-iocs-today-intelligence-led-security-tomorrow/</loc>
		<lastmod>2018-12-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/5-key-components-every-company-should-have-in-their-privacy-policy/</loc>
		<lastmod>2018-12-17T04:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-is-smart-metering-uses-benefits-and-dangers/</loc>
		<lastmod>2018-12-17T04:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/equifax-data-breach-details-released-more-google-api-bugs-supermicro-strikes-back-wb47/</loc>
		<lastmod>2018-12-17T05:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ssd-advisory-ios-macos-kernel-task_inspect-information-leak/</loc>
		<lastmod>2018-12-17T07:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/guest-essay-the-true-cost-of-complacency-when-it-comes-to-protecting-data-content/</loc>
		<lastmod>2018-12-17T08:34:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bandwidth-security-is-critical-in-wake-of-rogue-iot-botnets-targeting-telecom-sector/</loc>
		<lastmod>2018-12-17T08:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/pci-pal-outlines-its-2019-payment-security-and-call-centre-predictions/</loc>
		<lastmod>2018-12-17T09:55:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-is-web-cache-poisoning/</loc>
		<lastmod>2018-12-17T10:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/which-linux-distributions-can-acunetix-be-installed-on/</loc>
		<lastmod>2018-12-17T10:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-is-the-difference-between-acunetix-for-windows-and-acunetix-for-linux/</loc>
		<lastmod>2018-12-17T10:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/whats-the-problem-with-smb-1-and-should-you-worry-about-smb-2-and-3/</loc>
		<lastmod>2018-12-17T11:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/csaw-ctf-crypto-challenge-breaking-dsa/</loc>
		<lastmod>2018-12-17T11:50:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/on-data-breaches-beware-of-professional-it-pride-leading-to-a-fall/</loc>
		<lastmod>2018-12-17T12:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/an-sqlite-magellan-rce-vulnerability-exposes-billions-of-apps-including-all-chromium-based-browsers/</loc>
		<lastmod>2018-12-17T12:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/office-365-phishing-attack-using-fake-non-delivery-notifications/</loc>
		<lastmod>2018-12-17T13:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bitglass-security-spotlight-quora-and-healthcare-breaches/</loc>
		<lastmod>2018-12-17T13:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-year-ahead-cybersecurity-trends-to-look-out-for-in-2019/</loc>
		<lastmod>2018-12-17T14:07:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/common-sd-wan-security-mistakes/</loc>
		<lastmod>2018-12-17T14:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/these-silent-fixes-are-silent-killers-in-open-source-security/</loc>
		<lastmod>2018-12-17T14:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-market-of-billions-are-you-prepared-for-the-peaks/</loc>
		<lastmod>2018-12-17T15:21:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-ignorant-human-datas-biggest-threat/</loc>
		<lastmod>2018-12-17T15:21:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/red-team-assessment-phases-completing-objectives/</loc>
		<lastmod>2018-12-17T15:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-to-measure-the-success-of-your-security-awareness-program/</loc>
		<lastmod>2018-12-17T15:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bsidesrdu-welcome-opening-remarks/</loc>
		<lastmod>2018-12-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/key-trends-in-software-infrastructure-in-2019-observability-chaos-and-cloud-complexity/</loc>
		<lastmod>2018-12-17T17:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cyberark-adds-the-privileged-access-security-solution-v10-4-to-the-dodin-apl/</loc>
		<lastmod>2018-12-17T17:58:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/millions-billions-zillions-defending-yourself-in-a-world-of-too-many/</loc>
		<lastmod>2018-12-17T17:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bmds-the-failed-audit/</loc>
		<lastmod>2018-12-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-proof-based-scanningtm-technology-in-netsparker-web-vulnerability-scanners/</loc>
		<lastmod>2018-12-17T18:21:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/robert-m-lees-jeff-hass-little-bobby-comics-manel/</loc>
		<lastmod>2018-12-17T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/aws-lambda-security-best-practices-ebook/</loc>
		<lastmod>2018-12-17T20:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-future-of-remote-work/</loc>
		<lastmod>2018-12-17T20:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bsidesrdu-2018-keynote-shahid-buttar-eff-director-of-grassroots-advocacy/</loc>
		<lastmod>2018-12-17T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/clever-seo-spam-injection/</loc>
		<lastmod>2018-12-17T23:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/why-tls-1-3-is-a-huge-improvement/</loc>
		<lastmod>2018-12-17T23:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-deep-analysis-of-the-microsoft-outlook-vulnerability-cve-2018-8587/</loc>
		<lastmod>2018-12-18T00:43:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ottuesday-five-technologies-shaping-the-future-of-ott/</loc>
		<lastmod>2018-12-18T14:45:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-do-you-measure-your-investment-in-security/</loc>
		<lastmod>2018-12-18T05:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/9-key-players-for-a-winning-security-team/</loc>
		<lastmod>2018-12-18T07:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/simplifying-the-ics-cyber-security-vendor-selection-process/</loc>
		<lastmod>2018-12-18T07:50:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2019-predictions-information-security-will-be-given-a-seat-at-the-table-without-asking/</loc>
		<lastmod>2018-12-18T08:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-is-dharma-ransomware-and-how-to-remove-it-guide/</loc>
		<lastmod>2018-12-18T08:17:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/us-couldnt-handle-catastrophic-cyberattack-on-power-grid-government-warns/</loc>
		<lastmod>2018-12-18T08:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/first-steps-into-cloud-migration/</loc>
		<lastmod>2018-12-18T09:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/could-messy-data-put-your-merger-or-acquisition-in-doubt/</loc>
		<lastmod>2018-12-18T10:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/an-interview-with-juan-munoz-analysing-the-risk-environment-for-spanish-companies/</loc>
		<lastmod>2018-12-18T10:01:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dns-based-security-who-are-you-kidding/</loc>
		<lastmod>2018-12-18T10:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/managing-call-center-access-to-a-windows-network/</loc>
		<lastmod>2018-12-18T10:52:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/amid-ai-and-machine-learning-the-human-touch-remains-crucial-to-cybersecurity-in-2019-new-network-security-survey-finds/</loc>
		<lastmod>2018-12-18T12:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/malware-using-memes-posted-on-twitter-as-cc-service/</loc>
		<lastmod>2018-12-18T12:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/russian-trolls-manipulated-top-social-networks-to-influence-election/</loc>
		<lastmod>2018-12-18T13:12:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securing-the-industrial-internet-of-things-in-ot-networks/</loc>
		<lastmod>2018-12-18T14:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/it-teams-spacecrafts-escaping-the-black-holes-of-cyber-threats/</loc>
		<lastmod>2018-12-18T14:58:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/red-team-assessment-phases-reporting/</loc>
		<lastmod>2018-12-18T14:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-ira-hacked-american-democracy-using-social-media-and-meme-warfare-to-promote-disinformation-and-polarization-a-new-report-to-senate-intelligence-committee/</loc>
		<lastmod>2018-12-18T15:13:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bsidesrdu-2018-matts-approaching-parity/</loc>
		<lastmod>2018-12-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/untangle-and-malwarebytes-partner-to-offer-a-simplified-approach-to-layered-security-for-smbs/</loc>
		<lastmod>2018-12-18T16:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/end-of-support-for-php-5-and-php-7-0/</loc>
		<lastmod>2018-12-18T16:09:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/is-your-organization-at-risk-because-a-local-administrator-has-a-weak-password/</loc>
		<lastmod>2018-12-18T16:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hunting-for-evil-launch-daemons-identifying-suspicious-behavior-with-osquery/</loc>
		<lastmod>2018-12-18T16:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/top-6-threat-discoveries-of-2018/</loc>
		<lastmod>2018-12-18T16:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ahead-of-the-curve-university-incident-response-plans-and-communications/</loc>
		<lastmod>2018-12-18T17:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/security-lessons-from-the-house-oversight-and-government-reform-committee/</loc>
		<lastmod>2018-12-18T17:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-deep-disingenuousness-of-the-leviathan-of-redmond/</loc>
		<lastmod>2018-12-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/threatscape-predictions-for-2019/</loc>
		<lastmod>2018-12-18T18:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/zero-trust-is-the-infosec-trend-of-2018-heres-why/</loc>
		<lastmod>2018-12-18T18:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/owasp-serverlessgoat-a-vulnerable-demo-serverless-application/</loc>
		<lastmod>2018-12-18T18:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/sqlite-vulnerability-may-be-putting-your-applications-at-risk/</loc>
		<lastmod>2018-12-18T18:34:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/xkcd-arxiv/</loc>
		<lastmod>2018-12-18T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/racecars-satellites-and-robots-our-take-on-the-aws-reinvent-2018-conference/</loc>
		<lastmod>2018-12-18T21:13:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-chief-security-concern-for-executive-teams/</loc>
		<lastmod>2018-12-18T21:23:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bsidesrdu-2018-sleepz3r0s-ha12tl3ys-movement-after-initial-compromise/</loc>
		<lastmod>2018-12-18T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/sucuri-named-december-2018-gartner-customers-choice-for-web-application-firewalls/</loc>
		<lastmod>2018-12-18T22:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-a-soar-platforms-case-management-capability-should-include/</loc>
		<lastmod>2018-12-19T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/lets-talk-about-murphys-law-for-ssl-tls-x-509-certificate-outages/</loc>
		<lastmod>2018-12-19T00:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/top-30-web-developer-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2018-12-19T01:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/from-gdpr-to-meltdown-a-look-back-at-memorable-infosec-events-in-2018-part-1/</loc>
		<lastmod>2018-12-19T05:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dont-let-dns-flag-day-become-your-dns-doomsday/</loc>
		<lastmod>2018-12-19T05:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/5-data-breaches-that-could-have-been-avoided-in-2018-2/</loc>
		<lastmod>2018-12-19T09:08:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/half-of-ceos-believe-a-data-breach-is-a-matter-of-when-not-if/</loc>
		<lastmod>2018-12-19T09:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/huawei-wants-us-to-show-clear-evidence-to-back-security-allegations/</loc>
		<lastmod>2018-12-19T09:55:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/pci-compliance-this-christmas-naughty-or-nice/</loc>
		<lastmod>2018-12-19T11:10:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/in-2019-test-impersonation-attacks/</loc>
		<lastmod>2018-12-19T11:38:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/creating-a-secure-data-workflow-with-sde/</loc>
		<lastmod>2018-12-19T12:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/nyt-says-facebook-has-been-disclosing-personal-data-to-amazon-microsoft-apple-and-other-tech-giants-facebook-denies-claims-with-obfuscating-press-release/</loc>
		<lastmod>2018-12-19T13:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/download-for-a-data-breach-how-to-avoid-unwanted-data-acquisition-in-downloadable-documents-2/</loc>
		<lastmod>2018-12-19T13:55:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/nasa-notifies-employees-of-potential-data-breach/</loc>
		<lastmod>2018-12-19T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-in-review-schools-under-attack/</loc>
		<lastmod>2018-12-19T14:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/enterprises-continue-to-suffer-from-poor-password-hygiene-and-a-lack-of-visibility-control-over-privileged-users/</loc>
		<lastmod>2018-12-19T14:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ict-provider-turns-to-avast-rmm-for-security-avast-business/</loc>
		<lastmod>2018-12-19T14:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/proactively-addressing-new-cyberthreat-trends-in-healthcare/</loc>
		<lastmod>2018-12-19T14:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-annual-digest-of-identity-and-access-management/</loc>
		<lastmod>2018-12-19T15:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/why-other-hotel-chains-could-fall-victim-to-a-marriott-style-data-breach/</loc>
		<lastmod>2018-12-19T15:01:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/beyond-scanning-dont-let-appsec-ignorance-become-negligence/</loc>
		<lastmod>2018-12-19T15:06:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/saas-apps-and-the-need-for-specialized-security/</loc>
		<lastmod>2018-12-19T15:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/twitter-memes-are-being-used-to-hide-malware/</loc>
		<lastmod>2018-12-19T15:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bsidesrdu-2018-joel-lathrops-our-docker-app-got-hacked-now-what/</loc>
		<lastmod>2018-12-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-post-compliant-world-part-1/</loc>
		<lastmod>2018-12-19T16:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/information-security-manager-salary-and-job-outlook/</loc>
		<lastmod>2018-12-19T16:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/definitive-guide-to-corporate-ransomware-response-protection-best-practices/</loc>
		<lastmod>2018-12-19T16:33:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/aws-security-groups-what-they-are-and-how-to-get-the-most-out-of-them/</loc>
		<lastmod>2018-12-19T17:36:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/avast-ranked-top-free-antivirus-avast/</loc>
		<lastmod>2018-12-19T17:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/next-generation-audit-reports-enhanced-visibility-into-open-source-risks-in-ma-transactions/</loc>
		<lastmod>2018-12-19T17:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/decembers-feet-of-clay-award-verizon-aol-is-selling-ours-kids-personal-data/</loc>
		<lastmod>2018-12-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-dichotomy-of-the-iot-huge-business-opportunities-but-even-bigger-cyber-security-holes/</loc>
		<lastmod>2018-12-19T18:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/notpetya-the-russian-wiper/</loc>
		<lastmod>2018-12-19T18:41:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-is-an-insider-threat-and-how-do-we-detect-them/</loc>
		<lastmod>2018-12-19T19:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/better-together-partnering-with-okta/</loc>
		<lastmod>2018-12-19T19:35:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/zero-trust-security-protects-businesses-while-enabling-growth/</loc>
		<lastmod>2018-12-19T19:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-joy-of-techs-facebook-knows-where-youre-going/</loc>
		<lastmod>2018-12-19T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/it-administrators-give-the-gift-of-secure-easy-access/</loc>
		<lastmod>2018-12-19T20:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/microsoft-issues-emergency-fix-for-ie-zero-day/</loc>
		<lastmod>2018-12-19T21:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bsidesrdu-2018-aaron-lancasters-sky-high-ir-ir-at-cloud-scale-aarondlancaster/</loc>
		<lastmod>2018-12-19T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/deep-packet-inspection-in-the-cloud/</loc>
		<lastmod>2018-12-19T23:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/from-gdpr-to-meltdown-a-look-back-at-memorable-infosec-events-in-2018-part-2/</loc>
		<lastmod>2018-12-20T04:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/using-attck-as-a-teacher/</loc>
		<lastmod>2018-12-20T04:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/android-webview-are-secure-coding-practices-being-followed/</loc>
		<lastmod>2018-12-20T07:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/chinese-hackers-allegedly-snooped-on-eu-diplomatic-cables-for-years/</loc>
		<lastmod>2018-12-20T07:34:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/microsoft-urgently-releases-out-of-band-patch-for-an-active-internet-explorer-remote-code-execution-zero-day-vulnerability/</loc>
		<lastmod>2018-12-20T07:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2019-may-not-be-the-year-of-quantum-but-it-should-be-the-year-of-preparation/</loc>
		<lastmod>2018-12-20T08:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/email-security-how-basic-frameworks-help-wordpress-site-owners/</loc>
		<lastmod>2018-12-20T08:41:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/guest-essay-top-cybersecurity-developments-that-can-be-expected-to-fully-play-out-in-2019/</loc>
		<lastmod>2018-12-20T08:51:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/fake-tsunami-alert-brings-malware-to-japan/</loc>
		<lastmod>2018-12-20T09:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/spooked-by-a-speaking-security-camera-polite-hacker-tells-owner-how-to-fix-his-iot-security/</loc>
		<lastmod>2018-12-20T10:08:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bitdefender-team-captures-podium-at-prestigious-capture-the-flag-competition-in-japan/</loc>
		<lastmod>2018-12-20T10:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hackers-breach-nasa-employee-data-may-have-been-exposed/</loc>
		<lastmod>2018-12-20T10:39:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/fraudulent-tactics-on-amazon-marketplace/</loc>
		<lastmod>2018-12-20T12:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/10-of-the-biggest-data-breaches-in-2018-avast/</loc>
		<lastmod>2018-12-20T14:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-in-review-the-top-four-takeaways-in-security/</loc>
		<lastmod>2018-12-20T14:21:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hackers-playing-secret-santa/</loc>
		<lastmod>2018-12-20T14:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/10000-research-fellowships-for-underrepresented-talent/</loc>
		<lastmod>2018-12-20T15:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-container-hackers-guide-to-living-off-of-the-land/</loc>
		<lastmod>2018-12-20T15:06:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/sven-morgenroth-talks-about-php-object-injection-vulnerabilities-on-pauls-security-weekly-podcast/</loc>
		<lastmod>2018-12-20T15:12:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/top-30-supervisory-control-and-data-acquisition-scada-technician-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2018-12-20T15:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-post-compliant-world-part-2/</loc>
		<lastmod>2018-12-20T15:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hack-the-box-htb-machines-walkthrough-series-lazy/</loc>
		<lastmod>2018-12-20T15:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/3-reasons-osquery-should-be-on-every-incident-responders-christmas-list/</loc>
		<lastmod>2018-12-20T15:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/it-leaders-are-concerned-about-sd-wan-security/</loc>
		<lastmod>2018-12-20T15:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/digital-risk-management-a-working-definition/</loc>
		<lastmod>2018-12-20T15:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/coveware-joins-no-more-ransom-partner-organization/</loc>
		<lastmod>2018-12-20T15:54:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bsidesrdu-2018-sam-grangers-when-it-rains-it-pours/</loc>
		<lastmod>2018-12-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-in-review-memcache-and-drupalgeddon/</loc>
		<lastmod>2018-12-20T16:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2019-and-beyond-the-expanded-rsac-advisory-board-weighs-in-on-whats-next/</loc>
		<lastmod>2018-12-20T17:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/can-we-please-drive-passwords-into-extinction-now/</loc>
		<lastmod>2018-12-20T17:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/quantum-computation-the-looming-dish-of-doom/</loc>
		<lastmod>2018-12-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/feds-charge-three-in-mass-seizure-of-attack-for-hire-services/</loc>
		<lastmod>2018-12-20T19:11:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/indictment-of-chinese-hackers-underscores-need-for-stronger-cybersecurity/</loc>
		<lastmod>2018-12-20T19:20:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/flaws-and-vulnerabilities-and-exploits-oh-my/</loc>
		<lastmod>2018-12-20T19:27:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/new-delegated-administration-feature-in-enterprise-threat-protector/</loc>
		<lastmod>2018-12-20T19:40:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/xkcd-history-department/</loc>
		<lastmod>2018-12-20T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/20-developers-and-kubernetes-experts-reveal-the-biggest-mistakes-people-make-during-the-transition-to-kubernetes/</loc>
		<lastmod>2018-12-20T20:26:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/australias-new-encryption-laws-are-disappointing/</loc>
		<lastmod>2018-12-20T21:23:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bsidesrdu-2018-neal-humphreys-rise-of-the-advisor/</loc>
		<lastmod>2018-12-20T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/facebook-users-share-cartoon-malware-avast/</loc>
		<lastmod>2018-12-20T22:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/privacy-protection-in-five-steps-avast/</loc>
		<lastmod>2018-12-20T22:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/too-little-too-late-threatx-predicts-cyber-vulnerabilities-will-go-largely-unaddressed-with-dire-consequences/</loc>
		<lastmod>2018-12-20T23:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/tripwire-patch-priority-index-for-december-2018/</loc>
		<lastmod>2018-12-21T04:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/latest-version-of-tripwire-ip360-now-certified-to-meet-most-current-common-criteria-certification-standards/</loc>
		<lastmod>2018-12-21T04:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-bleak-picture-of-two-factor-authentication-adoption-in-the-wild/</loc>
		<lastmod>2018-12-21T05:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/fbi-takes-down-some-ddos-for-hire-websites-just-before-christmas/</loc>
		<lastmod>2018-12-21T09:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dns-exploits-concerns-and-easy-fixes-cyberspeak-podcast/</loc>
		<lastmod>2018-12-21T09:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/healthcare-cybersecurity-in-intensive-care/</loc>
		<lastmod>2018-12-21T10:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/happy-holidays-from-the-acunetix-team/</loc>
		<lastmod>2018-12-21T10:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/new-build-checks-for-vulnerabilities-in-apache-products-coldfusion-acme-mini_httpd-and-spring-security/</loc>
		<lastmod>2018-12-21T10:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/why-scoping-cookies-to-parent-domains-is-a-bad-idea/</loc>
		<lastmod>2018-12-21T10:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cutting-out-the-false-positive-with-lexical-expression-qualifiers/</loc>
		<lastmod>2018-12-21T11:18:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ieee-computer-society-predicts-top-ten-tech-trends-for-2019-assisted-transportation-chatbots-and-deep-learning-accelerators-among-others/</loc>
		<lastmod>2018-12-21T11:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/sieren-a-new-dos-bot/</loc>
		<lastmod>2018-12-21T12:23:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/phishers-bypassing-2fa-to-compromise-google-and-yahoo-accounts/</loc>
		<lastmod>2018-12-21T13:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/justice-departments-indictment-report-claims-chinese-hackersbreached-business-and-government-network/</loc>
		<lastmod>2018-12-21T14:43:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/connecting-passengers-to-their-perfect-cruise-experience/</loc>
		<lastmod>2018-12-21T15:59:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bsidesrdu-2018-ron-burketts-no-network-needed/</loc>
		<lastmod>2018-12-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/intels-three-ways-of-being-that-led-to-inclusion-success/</loc>
		<lastmod>2018-12-21T17:44:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/nyt-reports-facebookery-of-the-highest-order/</loc>
		<lastmod>2018-12-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/phishing-scam-quiz-and-malware-laced-memes-avast/</loc>
		<lastmod>2018-12-21T18:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/carnegie-mellons-software-engineering-institute-report-shows-efficacy-of-static-application-security-testing/</loc>
		<lastmod>2018-12-21T18:17:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/instrumenting-cloud-security-with-verodin-sip/</loc>
		<lastmod>2018-12-21T19:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/luke-kingma-and-lou-patrick-mackays-futurism-otterly-addicted/</loc>
		<lastmod>2018-12-21T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securing-containers-understanding-and-mitigating-vulnerabilities/</loc>
		<lastmod>2018-12-21T20:25:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hacking-security-episode-3-ossra-report-findings/</loc>
		<lastmod>2018-12-21T20:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bsidesrdu-2018-justin-hoeckles-wargames/</loc>
		<lastmod>2018-12-21T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/all-i-want-for-christmas-a-cisos-wishlist/</loc>
		<lastmod>2018-12-22T02:38:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/federal-council-not-deciding-again-switzerland-falling-behind-on-cybersecurity/</loc>
		<lastmod>2018-12-22T13:21:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/magellan-and-the-security-pitfalls-of-third-party-code/</loc>
		<lastmod>2018-12-22T15:20:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-benny-karnes-welcome-to-securewv-hack3rcon/</loc>
		<lastmod>2018-12-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/wsj-facial-recognition/</loc>
		<lastmod>2018-12-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/126-arrests-the-emergence-of-indias-cyber-crime-detectives-fighting-call-center-scams/</loc>
		<lastmod>2018-12-22T18:35:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/xkcd-rocket-launch/</loc>
		<lastmod>2018-12-22T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-amanda-berlins-keynote-hackers-hugs-drugs-part-ii/</loc>
		<lastmod>2018-12-22T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/drone-denial-of-service-attack-against-gatwick-airport/</loc>
		<lastmod>2018-12-23T08:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-security-checklist-for-financial-services-organizations/</loc>
		<lastmod>2018-12-23T09:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/alert-traffic-patrolman-unveils-romanian-skimming-ring/</loc>
		<lastmod>2018-12-23T15:57:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewvhack3rcon-2018-brian-martins-why-the-legal-system-needs-your-help/</loc>
		<lastmod>2018-12-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewvhack3rcon-2018-detective-jeremy-m-thompsons-mobile-devices-and-you/</loc>
		<lastmod>2018-12-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/twelve-days-of-xssmas/</loc>
		<lastmod>2018-12-23T18:18:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewvhack3rcon-2018-allan-liskas-the-new-age-of-ransomware-cybercriminals-adopt-nation-state-techniques/</loc>
		<lastmod>2018-12-23T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/serial-swatter-and-stalker-mir-islam-arrested-for-allegedly-dumping-body-in-river/</loc>
		<lastmod>2018-12-23T20:24:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewvhack3rcon-2018-evan-kimes-outside-the-box-how-the-internet-of-things-poses-new-cybersecurity-risks-and-challenges-the-law/</loc>
		<lastmod>2018-12-23T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/certifiably-gone-phishing/</loc>
		<lastmod>2018-12-23T22:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-to-add-http-security-headers-in-wordpress/</loc>
		<lastmod>2018-12-24T04:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/healthcare-databases-exposed-facebooks-photo-api-bug-signal-speaks-out-wb48/</loc>
		<lastmod>2018-12-24T05:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/managing-and-securing-containers-just-got-easier/</loc>
		<lastmod>2018-12-24T08:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-importance-of-the-content-type-header-in-http-requests/</loc>
		<lastmod>2018-12-24T08:50:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/aclu-files-lawsuit-against-11-federal-criminal-and-immigration-enforcement-agencies-for-disclosure-of-information-on-government-hacking/</loc>
		<lastmod>2018-12-24T12:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/impulsive-personalities-most-likely-to-fall-victim-to-cybercrime-research-shows/</loc>
		<lastmod>2018-12-24T12:31:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-year-in-review/</loc>
		<lastmod>2018-12-24T14:17:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/5-tips-to-take-back-hacked-social-accounts-avast/</loc>
		<lastmod>2018-12-24T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/top-30-a-interview-questions-for-2019/</loc>
		<lastmod>2018-12-24T15:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/red-team-assessment-phases-everything-you-need-to-know/</loc>
		<lastmod>2018-12-24T15:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hack-the-box-htb-machines-walkthrough-series-bank/</loc>
		<lastmod>2018-12-24T15:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-branden-millers-applying-the-principles-of-dodgeball-a-true-underdog-story-to-ctfs/</loc>
		<lastmod>2018-12-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-to-boost-sales-with-content-and-social-selling-2/</loc>
		<lastmod>2018-12-24T16:08:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/happy-holidays-heres-your-business-email-compromise-bec-gift-card-scam/</loc>
		<lastmod>2018-12-24T17:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/latest-tech-support-scam-let-them-eat-cpu/</loc>
		<lastmod>2018-12-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/my-website-was-hacked-on-christmas-eve/</loc>
		<lastmod>2018-12-24T19:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/robert-m-lees-jeff-hass-little-bobby-comics-marketing/</loc>
		<lastmod>2018-12-24T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/go-phish-what-do-thieves-get-from-stealing-our-data/</loc>
		<lastmod>2018-12-24T21:13:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-branden-millers-gun-safety-class/</loc>
		<lastmod>2018-12-24T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/shaun-the-sheep-we-wish-ewe-a-merry-christmas/</loc>
		<lastmod>2018-12-25T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/santa-gets-phished-a-tale-of-holiday-hacking/</loc>
		<lastmod>2018-12-25T17:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/prosegur-reaches-agreement-to-acquire-majority-stake-in-cipher/</loc>
		<lastmod>2018-12-26T02:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/automate-key-and-certificate-management-for-optimized-application-delivery/</loc>
		<lastmod>2018-12-26T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/qr-codes-the-future-with-no-security-shake-up/</loc>
		<lastmod>2018-12-26T08:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/internal-memo-reveals-nasa-suffered-a-data-breach-compromising-employees-social-security-numbers/</loc>
		<lastmod>2018-12-26T08:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/italian-researchers-conduct-an-experiment-to-prove-that-quantum-communication-is-possible-on-a-global-scale/</loc>
		<lastmod>2018-12-26T09:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/guest-essay-the-case-for-engaging-in-threat-hunting-and-how-to-do-it-effectively/</loc>
		<lastmod>2018-12-26T09:53:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/15-cybersecurity-statistics-summarizing-the-intense-year-the-community-had-in-2018/</loc>
		<lastmod>2018-12-26T12:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/human-rights-by-design/</loc>
		<lastmod>2018-12-26T12:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dragonfly-bsd-5-4-1-released-with-new-system-compiler-in-gcc-8-and-more/</loc>
		<lastmod>2018-12-26T13:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/strengthen-security-with-u2f-keys-avast/</loc>
		<lastmod>2018-12-26T14:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/farewell-2018-hello-2019/</loc>
		<lastmod>2018-12-26T15:04:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/comptia-a-renewal-process/</loc>
		<lastmod>2018-12-26T15:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cybersecurity-is-like-a-game-of-chess/</loc>
		<lastmod>2018-12-26T15:23:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/boxing-day-2018/</loc>
		<lastmod>2018-12-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-justin-rogoskys-python-scripting/</loc>
		<lastmod>2018-12-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/9-highlights-from-the-2018-software-integrity-blog/</loc>
		<lastmod>2018-12-26T19:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-post-compliant-world-part-3/</loc>
		<lastmod>2018-12-26T19:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/whats-the-value-of-your-data-and-how-can-you-protect-this-asset/</loc>
		<lastmod>2018-12-26T19:54:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/xkcd-christmas-eve-eve/</loc>
		<lastmod>2018-12-26T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/comptia-a-earning-cpes/</loc>
		<lastmod>2018-12-26T21:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/quick-wins-with-data-guardrails-and-behavioral-analytics/</loc>
		<lastmod>2018-12-26T21:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/context-your-super-weapon-in-vulnerability-management/</loc>
		<lastmod>2018-12-26T21:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-lucy-kerners-roy-williams-red-hat-enterprise-linux-security-technologies-lab/</loc>
		<lastmod>2018-12-26T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/watching-out-for-iot-and-mobile-threats-during-the-holidays/</loc>
		<lastmod>2018-12-27T00:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/doxxing-what-it-is-how-you-can-avoid-it/</loc>
		<lastmod>2018-12-27T05:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/does-iso-27001-certification-give-you-immunity-from-gdpr-fines/</loc>
		<lastmod>2018-12-27T08:43:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-incident-response-army-is-rapidly-growing/</loc>
		<lastmod>2018-12-27T09:23:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-breaches-in-review/</loc>
		<lastmod>2018-12-27T09:29:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/healthcare-data-breaches-associated-with-64-increase-in-advertising-expenditures/</loc>
		<lastmod>2018-12-27T09:43:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bevmo-leaks-credit-card-data-including-cvvs-of-15000-customers/</loc>
		<lastmod>2018-12-27T09:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/aleksei-tiurin-speaker-at-the-owasp-malta-chapter-meeting/</loc>
		<lastmod>2018-12-27T12:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/chinese-hackers-pose-a-serious-threat-to-military-contractors/</loc>
		<lastmod>2018-12-27T12:49:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bitglass-a-one-way-trip-to-secureland/</loc>
		<lastmod>2018-12-27T13:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/10-most-popular-blogs-of-2018/</loc>
		<lastmod>2018-12-27T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/may-the-odds-be-in-your-favor-machines-rebellion-began/</loc>
		<lastmod>2018-12-27T14:37:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securing-todays-increasingly-complex-multi-cloud-environments/</loc>
		<lastmod>2018-12-27T14:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/5-steps-to-mitigate-endpoint-security-incidents/</loc>
		<lastmod>2018-12-27T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-jeremy-mios-automating-security-operations-on-a-budget/</loc>
		<lastmod>2018-12-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/machine-learning-in-cybersecurity-demystifying-buzzwords-getting-to-the-truth/</loc>
		<lastmod>2018-12-27T16:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/cybersecurity-breaches-in-2018-what-we-learned/</loc>
		<lastmod>2018-12-27T16:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/blackberry-debuts-certificate-system-for-ai-driven-cars/</loc>
		<lastmod>2018-12-27T17:10:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/intels-three-ways-of-being-that-led-to-inclusion-success-part-2-of-2/</loc>
		<lastmod>2018-12-27T17:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/51st-mersenne-prime-discovered/</loc>
		<lastmod>2018-12-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-10-most-read-software-integrity-blog-posts-from-2018/</loc>
		<lastmod>2018-12-27T18:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-joy-of-techs-quit-facebook-together/</loc>
		<lastmod>2018-12-27T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-eric-waters-security-automation-for-the-blue-team/</loc>
		<lastmod>2018-12-27T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/hack-the-box-htb-machines-walkthrough-series-haircut/</loc>
		<lastmod>2018-12-27T22:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/top-30-chief-information-security-officer-ciso-interview-questions-and-answers-for-2018/</loc>
		<lastmod>2018-12-27T23:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/join-fortinet-at-nrf-2019-in-new-york/</loc>
		<lastmod>2018-12-28T00:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/blockchain-revolutionizing-the-technology-industry-or-just-hype/</loc>
		<lastmod>2018-12-28T04:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/youre-already-compromised-exposing-ssh-as-an-attack-vector/</loc>
		<lastmod>2018-12-28T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/retail-in-2019-needs-security-precautions/</loc>
		<lastmod>2018-12-28T08:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/whats-it-like-to-be-a-high-end-red-team-member-cyberspeak-podcast/</loc>
		<lastmod>2018-12-28T08:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/200-bitcoins-stolen-from-electrum-wallet-in-an-ongoing-phishing-attack/</loc>
		<lastmod>2018-12-28T10:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-top-five-cybersecurity-incidents-of-2018/</loc>
		<lastmod>2018-12-28T10:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-infosec-tweet-awards/</loc>
		<lastmod>2018-12-28T13:03:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/discover-the-power-of-we-sailpoint-okta-cyberark/</loc>
		<lastmod>2018-12-28T14:41:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/get-to-know-google-smart-lock-for-android-avast/</loc>
		<lastmod>2018-12-28T15:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/data-breaches-hit-nasa-and-san-diego-schools-avast/</loc>
		<lastmod>2018-12-28T15:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/qa-with-fortivet-graduate-michael-grams/</loc>
		<lastmod>2018-12-28T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-craig-vincents-derek-banks-home-alone-a-pentester-perspective/</loc>
		<lastmod>2018-12-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/top-5-backup-blog-posts-in-2018/</loc>
		<lastmod>2018-12-28T16:56:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/healthcare-cybersecurity-in-2019-the-time-is-now/</loc>
		<lastmod>2018-12-28T17:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/iot-report-major-flaws-in-guardzilla-cameras-allow-remote-hijack-of-the-security-device/</loc>
		<lastmod>2018-12-28T18:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/inspector-generals-report-the-dod-software-fail/</loc>
		<lastmod>2018-12-28T18:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/docker-security-tools-tips-best-practices/</loc>
		<lastmod>2018-12-28T18:50:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/xkcd-schwarzschilds-cat/</loc>
		<lastmod>2018-12-28T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-roy-williams-simplified-red-hat-enterprise-linux-identity-authentication-and-authorization-management/</loc>
		<lastmod>2018-12-28T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/happy-9th-birthday-krebsonsecurity/</loc>
		<lastmod>2018-12-29T15:51:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-brian-martins-simple-attribution-in-social-media-and-websites/</loc>
		<lastmod>2018-12-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-lucy-kerners-offensive-and-defensive-security-with-ansible/</loc>
		<lastmod>2018-12-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-david-krovichs-developing-a-cloud-based-cyber-security-simulation-portal/</loc>
		<lastmod>2018-12-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/luke-kingma-and-lou-patrick-mackays-futurism-check-you-bots/</loc>
		<lastmod>2018-12-29T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-charleston-area-robotics-teams-high-school-competitive-robotics-why-you-should-care/</loc>
		<lastmod>2018-12-29T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-secure-is-your-phone/</loc>
		<lastmod>2018-12-30T13:37:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018joshua-crumbaughs-guaranteed-failure-awareness-the-greatest-cyber-insanity/</loc>
		<lastmod>2018-12-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-holden-fenners-the-hybrid-home-lab-from-laptop-to-cloud/</loc>
		<lastmod>2018-12-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/sd-wan-security-is-often-overlooked/</loc>
		<lastmod>2018-12-30T18:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/robert-m-lees-jeff-hass-little-bobby-comics-ftw/</loc>
		<lastmod>2018-12-30T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-adam-vincents-securing-your-networks-with-ansible/</loc>
		<lastmod>2018-12-30T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/top-ways-to-mitigate-an-insider-threat/</loc>
		<lastmod>2018-12-30T23:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-top-10-tripwire-blogs-of-2018/</loc>
		<lastmod>2018-12-31T04:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/self-driving-cars-how-automakers-can-overcome-cybersecurity-issues/</loc>
		<lastmod>2018-12-31T04:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/phishing-attack-targeting-two-factor-authentication-amazon-echo-eavesdropping-netflix-email-scam-wb49/</loc>
		<lastmod>2018-12-31T05:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/centurylink-suffers-a-major-outage-affects-911-services-across-several-states-in-the-us/</loc>
		<lastmod>2018-12-31T07:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-ransomware-attack-causes-printing-and-delivery-disruptions-for-several-major-us-newspapers/</loc>
		<lastmod>2018-12-31T08:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/who-is-responsible-for-data-security-avast/</loc>
		<lastmod>2018-12-31T09:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/top-security-challenges-for-the-financial-services-industry-in-2018/</loc>
		<lastmod>2018-12-31T09:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/2018-at-pci-pal-in-review/</loc>
		<lastmod>2018-12-31T10:05:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/eu-to-sponsor-bug-bounty-programs-for-14-open-source-projects-from-january-2019/</loc>
		<lastmod>2018-12-31T10:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/fuzzing-like-its-1989/</loc>
		<lastmod>2018-12-31T11:50:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/exploring-2018-r-bloggers-r-weekly-posts-with-feedly-the-seymour-package/</loc>
		<lastmod>2018-12-31T12:36:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-philip-polstras-a-deep-look-at-stack-buffer-overflows-and-format-string-vulnerabilities/</loc>
		<lastmod>2018-12-31T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-best-cybersecurity-camps-for-kids-in-2019/</loc>
		<lastmod>2018-12-31T16:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/bens-book-of-the-month-review-of-malware-data-science-attack-detection-and-attribution/</loc>
		<lastmod>2018-12-31T17:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/puresec-2018-recap/</loc>
		<lastmod>2018-12-31T17:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/billu-b0x-2-ctf-walkthrough/</loc>
		<lastmod>2018-12-31T17:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/what-are-cipher-suites/</loc>
		<lastmod>2018-12-31T18:11:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/xkcd-million-billion-trillion/</loc>
		<lastmod>2018-12-31T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securing-the-next-generation-of-healthcare-a-preview-of-himss-2019/</loc>
		<lastmod>2018-12-31T20:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-top-10-threatlabz-blogs-from-2018/</loc>
		<lastmod>2018-12-31T21:37:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/new-year-tips-from-security-professionals/</loc>
		<lastmod>2018-12-31T21:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/securewv-hack3rcon-2018-joseph-deplatos-advanced-threat-hunting-with-open-sourcetools-and-no-budget/</loc>
		<lastmod>2018-12-31T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-best-of-shape-security-2018/</loc>
		<lastmod>2018-12-31T23:11:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/happy-new-year-2019/</loc>
		<lastmod>2019-01-01T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bits-and-pieces-money-cant-buy-happiness/</loc>
		<lastmod>2019-01-01T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-a-vpn-increases-your-internet-security/</loc>
		<lastmod>2019-01-01T22:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/new-year-new-security-part-1-iot-use-cases/</loc>
		<lastmod>2019-01-02T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-10-blog-posts-of-2018/</loc>
		<lastmod>2019-01-02T07:31:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cyber-threat-hunting-identify-and-hunt-down-intruders-cyberspeak-podcast/</loc>
		<lastmod>2019-01-02T08:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/red-team-201-your-first-test/</loc>
		<lastmod>2019-01-02T09:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ssh-vs-vpn-whats-the-difference-2/</loc>
		<lastmod>2019-01-02T09:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/deploying-blockchain-and-smart-contract-based-solutions/</loc>
		<lastmod>2019-01-02T10:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-do-la-croix-octonions-and-second-life-have-in-common/</loc>
		<lastmod>2019-01-02T11:50:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/massive-ad-fraud-scheme-relied-on-bgp-hijacking/</loc>
		<lastmod>2019-01-02T12:32:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/private-international-shares-its-findings-on-how-popular-android-apps-send-user-data-to-facebook-without-user-consent/</loc>
		<lastmod>2019-01-02T12:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cornerstone-capabilities-of-cloud-access-security-brokers/</loc>
		<lastmod>2019-01-02T12:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hackers-target-organizations-in-the-naval-and-maritime-sectors/</loc>
		<lastmod>2019-01-02T14:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securewv-hack3rcon-2018-collin-meadows-whats-in-a-domain-name/</loc>
		<lastmod>2019-01-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/qa-securing-sap-erp-systems-with-cyberark/</loc>
		<lastmod>2019-01-02T16:12:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/zero-trust-and-the-case-for-application-microsegmentation/</loc>
		<lastmod>2019-01-02T16:12:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/threat-stack-continues-2018s-momentum-into-2019/</loc>
		<lastmod>2019-01-02T16:18:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/open-source-security-tools-and-threat-hunting-the-10-most-read-bricata-posts-on-cybersecurity-in-2018/</loc>
		<lastmod>2019-01-02T17:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/education-cybersecurity-ups-and-downs/</loc>
		<lastmod>2019-01-02T17:13:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/continuous-integrity-background-screening-why-organizations-should-consider-this-risk-mitigation-tactic/</loc>
		<lastmod>2019-01-02T17:19:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/identifying-and-mitigating-security-risks-of-pre-shared-keys/</loc>
		<lastmod>2019-01-02T17:49:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/reverse-engineering-js-by-example/</loc>
		<lastmod>2019-01-02T17:49:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/artemis-targets-bgp-hijacks/</loc>
		<lastmod>2019-01-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-10-foss-legal-developments-in-2018/</loc>
		<lastmod>2019-01-02T18:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cloud-hosting-provider-dataresolution-net-battling-christmas-eve-ransomware-attack/</loc>
		<lastmod>2019-01-02T18:32:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/i-found-a-gcp-service-account-token-now-what/</loc>
		<lastmod>2019-01-02T19:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/stored-xss-what-is-it/</loc>
		<lastmod>2019-01-02T19:42:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xkcd-consensus-new-year/</loc>
		<lastmod>2019-01-02T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/three-key-strategies-for-securing-digital-business/</loc>
		<lastmod>2019-01-02T20:43:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securewv-hack3rcon-2018-zach-tacketts-monitoring-your-home-lan-with-python/</loc>
		<lastmod>2019-01-02T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/apache-drill-1-15-0-sergeant-0-8-0-pcapng-support-proper-column-types-mounds-of-new-metadata/</loc>
		<lastmod>2019-01-02T22:24:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-marriott-data-breach-5-vital-takeaways-to-keep-your-business-safe/</loc>
		<lastmod>2019-01-02T22:39:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/gao-federal-agencies-still-vulnerable-to-cyber-attacks/</loc>
		<lastmod>2019-01-02T22:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cloud-misconfiguration-and-administrative-error-a-top-cause-of-cloud-data-breach-2/</loc>
		<lastmod>2019-01-02T21:48:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securityledger-podcast-as-attacks-mount-how-to-secure-the-industrial-internet/</loc>
		<lastmod>2019-01-02T23:13:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/technology-trends-for-the-new-year-that-are-not-about-security-2/</loc>
		<lastmod>2019-01-03T00:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/5-cybersecurity-steps-you-should-already-be-taking/</loc>
		<lastmod>2019-01-03T04:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/dont-get-caught-in-a-smishing-scam/</loc>
		<lastmod>2019-01-03T04:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/7-habits-of-a-highly-effective-ciso-2019-data-security-resolutions/</loc>
		<lastmod>2019-01-03T08:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/software-security-predictions-what-to-watch-for-in-2019/</loc>
		<lastmod>2019-01-03T08:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hacker-duo-hijacks-thousands-of-chromecasts-and-google-smart-tvs-to-play-pewdiepie-ad-reveals-bug-in-googles-chromecast-devices/</loc>
		<lastmod>2019-01-03T09:14:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cyber-security-roundup-for-december-2018-2/</loc>
		<lastmod>2019-01-03T12:50:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/demystifying-the-india-data-protection-bill-2018-part-1-of-3/</loc>
		<lastmod>2019-01-03T13:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hackers-demand-ransom-from-dublins-tram-system-after-luas-website-defaced/</loc>
		<lastmod>2019-01-03T13:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-future-of-cybersecurity-a-2019-outlook/</loc>
		<lastmod>2019-01-03T14:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ad-fraud-101-how-cybercriminals-profit-from-clicks/</loc>
		<lastmod>2019-01-03T14:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/japan-to-store-critical-data-domestically-amid-cyberwar-fears/</loc>
		<lastmod>2019-01-03T14:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/docker-security-tips-best-practices/</loc>
		<lastmod>2019-01-03T15:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/business-must-change-infosec-in-2019/</loc>
		<lastmod>2019-01-03T15:16:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/data-scraping-chart-reproduction-arrows-of-environmental-destruction/</loc>
		<lastmod>2019-01-03T15:26:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/exploiting-jndi-injections-in-java/</loc>
		<lastmod>2019-01-03T15:38:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securewv-hack3rcon-2018-ted-corbeills-left-of-boom/</loc>
		<lastmod>2019-01-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ransomware-hackers-and-guarantees/</loc>
		<lastmod>2019-01-03T16:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/discovering-and-hacking-iot-devices-using-web-based-attacks/</loc>
		<lastmod>2019-01-03T16:20:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/text-message-security-its-about-content-control/</loc>
		<lastmod>2019-01-03T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/black-hills-infosec-rdp-logging-bypass-and-azure-active-directory-recon/</loc>
		<lastmod>2019-01-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/machines-can-be-inventive/</loc>
		<lastmod>2019-01-03T18:09:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hackers-exploit-known-google-chromecast-vulnerability-in-thousands-of-devices/</loc>
		<lastmod>2019-01-03T18:19:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/catching-bloodhound-before-it-bites/</loc>
		<lastmod>2019-01-03T18:29:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/lets-encrypt-are-enabling-the-bad-guys-and-why-they-should/</loc>
		<lastmod>2019-01-03T18:48:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/click2gov-breaches-show-the-power-of-zero-days/</loc>
		<lastmod>2019-01-03T19:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/a-cisos-journey-to-find-a-web-application-firewall-that-works/</loc>
		<lastmod>2019-01-03T19:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/apple-phone-phishing-scams-getting-better/</loc>
		<lastmod>2019-01-03T19:21:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-joy-of-techs-if-your-computer-really-cared-about-you/</loc>
		<lastmod>2019-01-03T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/owasp-top-10-security-risks-part-iv/</loc>
		<lastmod>2019-01-03T20:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/year-in-review-looking-back-on-our-top-10-cybersecurity-predictions-for-2018-and-our-predictions-for-2019/</loc>
		<lastmod>2019-01-03T21:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securewv-hack3rcon-2018-steven-truaxs-your-dead-now-what-how-to-help-your-family-after-your-gone/</loc>
		<lastmod>2019-01-03T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-retailers-can-stay-secure-in-the-cloud-in-2019/</loc>
		<lastmod>2019-01-03T22:02:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-build-a-successful-continuous-monitoring-cm-program/</loc>
		<lastmod>2019-01-04T05:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/career-advice-from-mcafees-lead-scientist-cyberspeak-podcast/</loc>
		<lastmod>2019-01-04T08:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cyber-security-researcher-withdraws-public-talk-on-hacking-apples-face-id-from-black-hat-conference-2019-reuters-report/</loc>
		<lastmod>2019-01-04T11:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/lack-of-collaboration-could-be-putting-global-response-to-cybercrime-at-risk/</loc>
		<lastmod>2019-01-04T13:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-avoid-a-rat-infestation/</loc>
		<lastmod>2019-01-04T13:31:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/moving-into-2019-hhs-urges-healthcare-practitioners-and-executives-to-bolster-defenses-against-cybercrime/</loc>
		<lastmod>2019-01-04T13:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-does-cybersecurity-have-in-store-for-2019/</loc>
		<lastmod>2019-01-04T14:21:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/our-customers-emphasize-the-value-of-fortigate-secure-sd-wan-in-gartner-peer-insights-reviews/</loc>
		<lastmod>2019-01-04T14:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-tribune-hack-and-more-security-news-avast/</loc>
		<lastmod>2019-01-04T14:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cyber-security-predictions-for-2019/</loc>
		<lastmod>2019-01-04T14:30:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/philips-hues-second-ongoing-remote-connectivity-outage-infuriates-users/</loc>
		<lastmod>2019-01-04T14:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/social-risk-monitoring-all-press-good-press/</loc>
		<lastmod>2019-01-04T14:54:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/skype-flaw-grants-access-to-the-photos-on-your-android-phone-without-a-passcode/</loc>
		<lastmod>2019-01-04T15:19:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/town-of-salem-hack-exposes-details-of-7-6-million-gamers/</loc>
		<lastmod>2019-01-04T15:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securewv-hack3rcon-2018-joey-marescas-a-brief-introduction-to-metasploit/</loc>
		<lastmod>2019-01-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/entrust-datacard-selected-as-sc-media-2019-excellence-award-finalist/</loc>
		<lastmod>2019-01-04T16:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/kick-start-your-cloud-security-your-complete-guide-to-cybersecurity/</loc>
		<lastmod>2019-01-04T16:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/clickjacking-attack-on-facebook-how-a-tiny-attribute-can-save-the-corporation/</loc>
		<lastmod>2019-01-04T16:27:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-does-elliptic-curve-cryptography-work/</loc>
		<lastmod>2019-01-04T17:33:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/video-learning-ai-for-hackers-a-visual-primer/</loc>
		<lastmod>2019-01-04T17:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/communist-chinese-commence-negative-information-crackdown/</loc>
		<lastmod>2019-01-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/simplifying-the-onboarding-process/</loc>
		<lastmod>2019-01-04T18:01:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/from-my-gartner-blog-more-on-ai-for-cybersecurity/</loc>
		<lastmod>2019-01-04T18:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/healthcare-it-continues-to-struggle-with-backup-strategies/</loc>
		<lastmod>2019-01-04T19:01:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xkcd-reminders/</loc>
		<lastmod>2019-01-04T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/christmas-day-was-quiet-for-online-retailers-but-picked-up-immediately-on-boxing-day/</loc>
		<lastmod>2019-01-04T20:38:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/introducing-the-cybercrime-support-network-2/</loc>
		<lastmod>2019-01-04T21:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securewv-hack3rcon-2018-benny-karnes-securewv-hack3rcon-closing-awards/</loc>
		<lastmod>2019-01-04T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/zeronights-2018-alexandre-gazets-fabien-0xf4b-perigauds-joffrey-_sn0rky-czarnys-turning-your-bmc-into-a-revolving-door/</loc>
		<lastmod>2019-01-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/city-of-los-angeles-files-suit-targeting-illicit-data-use-by-weather-channel-app/</loc>
		<lastmod>2019-01-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-joy-of-techs-faceid-fail/</loc>
		<lastmod>2019-01-05T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/zeronights-2018-vladimir-dashchenkos-denial-anger-bargaining-depression-acceptance-reporting-0days-to-vendors/</loc>
		<lastmod>2019-01-05T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/inner-circle-podcast-episode-017-andy-smith-discusses-zero-trust-privilege-in-the-modern-threatscape/</loc>
		<lastmod>2019-01-06T06:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ssd-advisory-apache-openoffice-virtual-table-corruption/</loc>
		<lastmod>2019-01-06T08:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/kubernetes-open-etcd/</loc>
		<lastmod>2019-01-06T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/kubernetes-kube-hunter-py-etcd/</loc>
		<lastmod>2019-01-06T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/zeronights-2018-joxean-korets-diffing-c-source-codes-to-binaries/</loc>
		<lastmod>2019-01-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/meet-the-big-brother-of-india-and-potentially-others/</loc>
		<lastmod>2019-01-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/robert-m-lees-jeff-hass-little-bobby-comics-babysitting/</loc>
		<lastmod>2019-01-06T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/a-forged-from-address/</loc>
		<lastmod>2019-01-06T20:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/zeronights-2018-david-baptistes-vulnerability-in-compiler-leads-to-stealth-backdoor-in-software/</loc>
		<lastmod>2019-01-06T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/all-about-the-hotspot-honeypots/</loc>
		<lastmod>2019-01-07T02:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/newspaper-ransomware-attack-how-facebook-tracks-you-on-android-usb-type-c-authentication-wb50/</loc>
		<lastmod>2019-01-07T05:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/limitations-of-blockchain-technology/</loc>
		<lastmod>2019-01-07T05:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/healthcare-continues-to-be-prime-target-for-cyber-attacks/</loc>
		<lastmod>2019-01-07T08:43:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/politicians-reactions-on-vip-hack-in-germany/</loc>
		<lastmod>2019-01-07T09:16:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/researchers-design-anonprint-for-safer-qr-code-mobile-payment-acsc-2018-conference/</loc>
		<lastmod>2019-01-07T09:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/60-of-organizations-suffered-a-container-security-incident-in-2018-finds-study/</loc>
		<lastmod>2019-01-07T09:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/nsa-to-release-ghidra-their-reverse-engineering-framework-to-the-public-at-rsa-conference-2019/</loc>
		<lastmod>2019-01-07T11:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/researchers-release-uncaptcha2-a-tool-that-uses-googles-speech-to-text-api-to-bypass-the-recaptcha-audio-challenge/</loc>
		<lastmod>2019-01-07T11:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/alert-service-compromised-to-send-out-spam-message/</loc>
		<lastmod>2019-01-07T12:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/after-bitpay-coinbase-bans-gab-accounts-and-its-founder-andrew-torba/</loc>
		<lastmod>2019-01-07T12:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/digital-identity-digital-trust-janrain-and-akamai/</loc>
		<lastmod>2019-01-07T13:04:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/office-365-security-licensing-and-pricing-2019-edition/</loc>
		<lastmod>2019-01-07T13:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/raise-the-stakes-with-privileged-threat-analytics/</loc>
		<lastmod>2019-01-07T13:45:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/lights-out-can-the-u-s-survive-a-catastrophic-power-outage/</loc>
		<lastmod>2019-01-07T13:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/kubernetes-master-post/</loc>
		<lastmod>2019-01-07T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/marriott-lowers-estimate-of-customers-affected-by-breach-to-383-million-says-8-6-million-encrypted-payment-cards-involved/</loc>
		<lastmod>2019-01-07T14:20:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-ways-to-get-roi-from-your-appsec-program/</loc>
		<lastmod>2019-01-07T14:55:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ssd-advisory-sme-server-unauthenticated-xss-to-privileged-remote-code-execution/</loc>
		<lastmod>2019-01-07T14:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/extreme-cybersecurity-predictions-for-2019/</loc>
		<lastmod>2019-01-07T15:09:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2019-predictions-for-iot-avast/</loc>
		<lastmod>2019-01-07T15:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-is-physical-security/</loc>
		<lastmod>2019-01-07T15:43:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/akamai-received-top-scores-in-gartners-new-report-critical-capabilities-for-cloud-web-application-firewalls-services/</loc>
		<lastmod>2019-01-07T15:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cryptomix-ransomware-exploits-crowdfunding-sites-for-child-cancer-treatment/</loc>
		<lastmod>2019-01-07T15:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/password-management-incompetence-the-blur-story/</loc>
		<lastmod>2019-01-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/magento-commerce-widget-form-core-xss-vulnerability/</loc>
		<lastmod>2019-01-07T17:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-does-your-caa-say/</loc>
		<lastmod>2019-01-07T17:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/marriott-confirms-less-than-383-million-unique-guests-affected-in-starwood-data-breach/</loc>
		<lastmod>2019-01-07T17:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/zeronights-2018-jianing-wangs-junyu-zhous-ntlm-relay-reloaded-attack-methods-you-do-not-know/</loc>
		<lastmod>2019-01-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-machine-identities-matter-in-the-fight-for-privacy/</loc>
		<lastmod>2019-01-07T18:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xkcd-short-selling/</loc>
		<lastmod>2019-01-07T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/u-s-data-privacy-legislation-accountability-transparency-and-no-back-doors/</loc>
		<lastmod>2019-01-07T20:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ottuesday-ai-destined-for-big-role-in-entertainment/</loc>
		<lastmod>2019-01-08T14:45:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/sans-for585-qampa-smartphone-forensics-questions-answered/</loc>
		<lastmod>2019-01-07T21:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-new-consumer-data-protection-act-from-senator-ron-wyden-from-oregon-2/</loc>
		<lastmod>2019-01-07T20:37:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/zeronights-2018-ilya-nesterovs-sergey-shekyans-unveiling-the-cloak-a-look-at-what-happens-when-you-click-that-link/</loc>
		<lastmod>2019-01-07T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/port-covington-md-re-emerges-as-cybertown-usa-ground-zero-for-cybersecurity-research/</loc>
		<lastmod>2019-01-07T22:04:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/20-critical-controls/</loc>
		<lastmod>2019-01-07T22:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-10-endpoint-security-trends-in-2018/</loc>
		<lastmod>2019-01-07T22:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-keeps-you-up-at-night/</loc>
		<lastmod>2019-01-08T04:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/qa-why-emerging-iot-platforms-require-the-same-leading-edge-security-as-industrial-controls/</loc>
		<lastmod>2019-01-08T06:05:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/grading-my-2018-ics-security-predictions-did-they-come-true/</loc>
		<lastmod>2019-01-08T08:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/quiet-lawsuit-in-pennsylvania-may-create-a-groundbreaking-data-security-priority-shift-are-you-ready/</loc>
		<lastmod>2019-01-08T08:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/customers-lose-confidence-data-breaches-arent-just-about-fines/</loc>
		<lastmod>2019-01-08T08:48:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/nist-releases-guide-to-better-manage-privileged-accounts/</loc>
		<lastmod>2019-01-08T08:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/protect-classified-information-with-identity-classification/</loc>
		<lastmod>2019-01-08T10:15:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/edtech-trump-in-the-new-year-start/</loc>
		<lastmod>2019-01-08T10:24:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ethereum-classic-suffered-a-51-attack-developers-deny-state-a-new-asic-card-was-tested/</loc>
		<lastmod>2019-01-08T11:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/iot-cybersecurity-challenges-and-solutions/</loc>
		<lastmod>2019-01-08T11:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/kubernetes-security-tips-best-practices/</loc>
		<lastmod>2019-01-08T11:33:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/13-grounded-and-realistic-cybersecurity-predictions-for-2019-roundup/</loc>
		<lastmod>2019-01-08T12:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/gemaltos-cipher-partner-program-certifications-get-a-refresh/</loc>
		<lastmod>2019-01-08T14:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/thieves-make-off-with-shoppers-credit-card-numbers-after-hacking-apparel-site-for-four-months/</loc>
		<lastmod>2019-01-08T14:14:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bot-or-not-distinguishing-between-the-good-the-bad-and-the-ugly/</loc>
		<lastmod>2019-01-08T14:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/it-firm-increases-sales-by-50-with-avast-business-managed-workplace-avast-business/</loc>
		<lastmod>2019-01-08T14:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cybercrime-trends-and-financial-services/</loc>
		<lastmod>2019-01-08T14:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/dirt-cheap-legit-windows-software-pick-two/</loc>
		<lastmod>2019-01-08T15:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/german-teen-confesses-to-data-breach-affecting-1000-politicians-journalists/</loc>
		<lastmod>2019-01-08T15:10:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/comptia-network-earning-cpes/</loc>
		<lastmod>2019-01-08T15:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cert-csih-earning-pdus/</loc>
		<lastmod>2019-01-08T15:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/dont-become-a-ransomware-target/</loc>
		<lastmod>2019-01-08T15:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/zeronights-2018-hc-mas-massive-scale-usb-device-driver-fuzz-without-device/</loc>
		<lastmod>2019-01-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-westland-real-estate-group-chose-spanning-backup-for-g-suite/</loc>
		<lastmod>2019-01-08T16:11:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/kitchen-utensil-manufacturer-discloses-data-breach-of-e-commerce-site/</loc>
		<lastmod>2019-01-08T16:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-should-you-integrate-machine-identity-protection-with-your-certificate-authorities/</loc>
		<lastmod>2019-01-08T16:27:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/a-new-year-means-new-security-resolutions-hear-from-the-experts/</loc>
		<lastmod>2019-01-08T16:43:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/red-team-operations-attack-and-think-like-a-criminal-cyberspeak-podcast/</loc>
		<lastmod>2019-01-08T17:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-the-winner-of-ces-highest-honor-says-about-the-future-of-iot/</loc>
		<lastmod>2019-01-08T17:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hacker-history-ii-the-bbs-years/</loc>
		<lastmod>2019-01-08T17:43:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/dfir-summit-2019-call-for-presentations-cfp-now-open/</loc>
		<lastmod>2019-01-08T17:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hacker-history-i-getting-started-as-a-hacker/</loc>
		<lastmod>2019-01-08T17:56:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-forking/</loc>
		<lastmod>2019-01-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/business-mobile-messaging-making-the-transportation-industry-more-mobile/</loc>
		<lastmod>2019-01-08T18:14:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/most-popular-cybersecurity-blog-posts-from-2018-2/</loc>
		<lastmod>2019-01-08T18:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bromium-secure-browsing-isolates-intelligently-and-maximizes-browser-choice/</loc>
		<lastmod>2019-01-08T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-secure-cloud-apps-the-ultimate-guide/</loc>
		<lastmod>2019-01-08T18:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/two-interesting-session-related-vulnerabilities/</loc>
		<lastmod>2019-01-08T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/sap-security-notes-january-19-first-critical-note-for-sap-cloud-connector-and-mobile-patching/</loc>
		<lastmod>2019-01-08T19:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/introducing-the-defenders-digest-2/</loc>
		<lastmod>2019-01-08T19:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/exploits-on-the-rise-sap-and-oracle-2/</loc>
		<lastmod>2019-01-08T19:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/zeronights-2018-junyu-zhous-wenxu-wus-attack-surfaces-against-git-web-servers-used-by-thousands-of-developers/</loc>
		<lastmod>2019-01-08T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-secure-apis-microservices-with-a-next-gen-waf/</loc>
		<lastmod>2019-01-08T20:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-improve-your-website-resilience-for-ddos-attacks-part-iii-waf/</loc>
		<lastmod>2019-01-08T20:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/defining-network-security-in-a-hybrid-cloud-world/</loc>
		<lastmod>2019-01-08T20:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/january-2018-patch-tuesday-47-vulns-7-critical-adobe-vulns/</loc>
		<lastmod>2019-01-08T21:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/vert-threat-alert-january-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-01-08T21:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/</loc>
		<lastmod>2019-01-08T21:37:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-joy-of-tech-the-ghosts-of-apple-past/</loc>
		<lastmod>2019-01-08T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/5-phishing-attacks-that-do-not-involve-email-scams/</loc>
		<lastmod>2019-01-08T23:48:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/opinion-back-to-the-start-for-2fa-adoption/</loc>
		<lastmod>2019-01-09T04:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/us-health-insurer-humana-announces-third-data-breach-after-third-party-hack/</loc>
		<lastmod>2019-01-09T08:23:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-verify-a-cross-site-scripting-vulnerability/</loc>
		<lastmod>2019-01-09T08:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/session-detection-what-to-do-if-the-lsr-fails-to-identify-a-session-pattern/</loc>
		<lastmod>2019-01-09T08:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-does-pci-dss-apply-to-voip/</loc>
		<lastmod>2019-01-09T10:12:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/eu-shares-guidelines-to-help-organizations-achieve-gdpr-compliance/</loc>
		<lastmod>2019-01-09T12:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cyber-security-conferences-to-attend-in-2019/</loc>
		<lastmod>2019-01-09T12:35:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/humana-informs-customers-of-third-party-security-incident/</loc>
		<lastmod>2019-01-09T13:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/7-cybersecurity-trends-to-watch-in-2019/</loc>
		<lastmod>2019-01-09T13:33:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/canadian-telecom-firm-wants-permission-to-collect-monetize-customer-data-online-activity/</loc>
		<lastmod>2019-01-09T13:39:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/nist-releases-guidance-for-risk-assessment-automation/</loc>
		<lastmod>2019-01-09T13:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-state-of-web-application-vulnerabilities-in-2018/</loc>
		<lastmod>2019-01-09T14:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bitglass-rising-2018-recap/</loc>
		<lastmod>2019-01-09T14:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/make-no-mistake-american-companies-are-squarely-in-the-cross-hairs-of-well-financed-nation-state-actors-u-s-counter-spy-center-says/</loc>
		<lastmod>2019-01-09T14:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/grow-your-business-by-reducing-complexity-for-smb-customers/</loc>
		<lastmod>2019-01-09T14:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/patch-tuesday-january-2019-edition/</loc>
		<lastmod>2019-01-09T14:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cynerio-secures-7-million-seed-round-funding-to-drive-us-market-development/</loc>
		<lastmod>2019-01-09T14:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2019-mobile-threat-predictions-avast/</loc>
		<lastmod>2019-01-09T14:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/zeronights-2018-eric-sesterhenns-luis-merinos-markus-verviers-zero-fax-given/</loc>
		<lastmod>2019-01-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/do-banks-undervalue-extended-validation-ev-certificates/</loc>
		<lastmod>2019-01-09T16:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/now-or-never-financial-services-and-the-cloud/</loc>
		<lastmod>2019-01-09T16:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/achieve-data-security-with-strong-internal-and-external-perimeters/</loc>
		<lastmod>2019-01-09T17:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hacker-history-iii-professional-hardware-hacker/</loc>
		<lastmod>2019-01-09T17:34:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/owasp-top-10-web-application-security-risks/</loc>
		<lastmod>2019-01-09T17:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/c2-hiding/</loc>
		<lastmod>2019-01-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/on-the-road-to-0-8-0-some-additional-new-features-coming-in-the-sergeant-package/</loc>
		<lastmod>2019-01-09T19:32:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-bruce-dennis-certs-vs-degree-vs-experience-which-one-is-the-winner/</loc>
		<lastmod>2019-01-09T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/go-big-with-bootcamp-for-advanced-memory-forensics-and-threat-detection/</loc>
		<lastmod>2019-01-09T20:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/keeping-your-business-safe-from-ceo-fraud/</loc>
		<lastmod>2019-01-09T21:49:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/luke-kingma-and-lou-patrick-mackays-futurism-babys-first-ipad/</loc>
		<lastmod>2019-01-09T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cert-csih-exam-information/</loc>
		<lastmod>2019-01-09T22:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cert-csih-renewal-process/</loc>
		<lastmod>2019-01-09T22:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/swimlane-is-making-a-splash-at-rsa-2019/</loc>
		<lastmod>2019-01-10T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/telcos-sell-phone-location-data-to-aggregators-avast/</loc>
		<lastmod>2019-01-10T00:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/dynamic-content-acceleration-in-imperva-cdn-improves-enterprise-website-performance/</loc>
		<lastmod>2019-01-10T01:01:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-cybercriminals-are-getting-initial-access-into-your-system/</loc>
		<lastmod>2019-01-10T04:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/resolve-to-comply-in-2019/</loc>
		<lastmod>2019-01-10T08:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/december-2018-update-for-netsparker-standard/</loc>
		<lastmod>2019-01-10T08:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hybrid-clouds-bring-new-complexities-and-security-risks/</loc>
		<lastmod>2019-01-10T10:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/celebrating-our-security-heritage/</loc>
		<lastmod>2019-01-10T10:41:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/tls-comes-to-google-public-dns-with-support-for-dns-over-tls-connections/</loc>
		<lastmod>2019-01-10T11:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/facebook-accused-of-violating-vietnams-cyber-law/</loc>
		<lastmod>2019-01-10T11:50:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/security-vulnerabilities-in-cell-phone-systems/</loc>
		<lastmod>2019-01-10T11:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/neiman-marcus-to-pay-1-5-million-under-data-breach-settlement/</loc>
		<lastmod>2019-01-10T12:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/using-deep-learning-methods-to-detect-malware-in-android-applications/</loc>
		<lastmod>2019-01-10T13:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/waffle-geoms-other-miscellaneous-in-development-package-updates/</loc>
		<lastmod>2019-01-10T13:56:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/networkminer-2-4-released/</loc>
		<lastmod>2019-01-10T14:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/google-to-ban-harmful-intrusive-web-ads-globally-starting-july-9/</loc>
		<lastmod>2019-01-10T14:20:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/five-best-practices-to-achieving-a-secure-devops-model/</loc>
		<lastmod>2019-01-10T14:20:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/redefining-the-cloud-and-cloud-security/</loc>
		<lastmod>2019-01-10T14:29:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/neiman-marcus-to-pay-1-5-million-in-settlement-with-43-states-for-data-breach/</loc>
		<lastmod>2019-01-10T14:38:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securing-your-microsoft-azure-environment/</loc>
		<lastmod>2019-01-10T14:53:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/reddit-users-locked-out-of-accounts-after-security-concern/</loc>
		<lastmod>2019-01-10T14:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-role-of-a-ciso-during-digitization/</loc>
		<lastmod>2019-01-10T15:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cybersecurity-landscape-hotspots/</loc>
		<lastmod>2019-01-10T15:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cert-csih-domain-overview/</loc>
		<lastmod>2019-01-10T15:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/us-ballistic-missile-agency-fails-security-audit/</loc>
		<lastmod>2019-01-10T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-chris-myers-barrett-adams-building-a-cloud-pentest-lab-and-how-we-blew-some-up/</loc>
		<lastmod>2019-01-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/secret-service-theft-rings-turn-to-fuze-cards/</loc>
		<lastmod>2019-01-10T16:27:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-framework-choice-matters-in-web-application-security/</loc>
		<lastmod>2019-01-10T17:03:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/one-year-later-ensuring-windows-is-protected-from-meltdownspectre/</loc>
		<lastmod>2019-01-10T17:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/threat-alert-malspam/</loc>
		<lastmod>2019-01-10T17:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/us-government-shutdown-forces-fda-food-inspections-to-cease/</loc>
		<lastmod>2019-01-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-three/</loc>
		<lastmod>2019-01-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/gao-report-confirms-major-gaps-in-government-cybersecurity/</loc>
		<lastmod>2019-01-10T18:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/verodin-and-mitre-align-missions-at-attckcon-2018/</loc>
		<lastmod>2019-01-10T19:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-joekleins-fast-track-your-cybersecurity-hacking-career/</loc>
		<lastmod>2019-01-10T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-much-of-your-security-is-based-on-assumptions-instead-of-evidence/</loc>
		<lastmod>2019-01-10T20:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cyber-security-fud-fear-and-the-growth-of-the-infosec-industry/</loc>
		<lastmod>2019-01-10T21:14:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/take-the-2019-sans-security-vulnerability-management-survey/</loc>
		<lastmod>2019-01-10T21:24:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/free-supercounters-widget-serves-unwanted-redirects-to-dating-site/</loc>
		<lastmod>2019-01-10T21:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xkcd-marsiforming/</loc>
		<lastmod>2019-01-10T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/roll-your-own-federal-government-shutdown-caused-ssl-certificate-expiration-monitor-in-r/</loc>
		<lastmod>2019-01-10T22:22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/making-privileged-access-management-complete-find-the-jim-to-your-pam/</loc>
		<lastmod>2019-01-10T22:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-is-it-nearly-impossible-to-manually-protect-machine-identities/</loc>
		<lastmod>2019-01-11T00:27:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-top-5-vendor-neutral-cloud-security-certifications-of-2019/</loc>
		<lastmod>2019-01-11T04:43:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/mjag-dropper-using-decoy-documents-to-drop-rats/</loc>
		<lastmod>2019-01-11T07:19:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fireeyes-global-dns-hijacking-campaign-suspects-iranian-based-group-as-the-prime-source/</loc>
		<lastmod>2019-01-11T10:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-stop-old-backup-and-unreferenced-files-from-leaking-sensitive-information/</loc>
		<lastmod>2019-01-11T11:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/free-decryption-tool-created-for-pylocky-ransomware-family/</loc>
		<lastmod>2019-01-11T13:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hyatt-hotels-launches-public-bug-bounty-program-with-hackerone/</loc>
		<lastmod>2019-01-11T13:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/kubernetes-kubelet-api-containerlogs-endpoint/</loc>
		<lastmod>2019-01-11T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/preparing-for-y2038-already/</loc>
		<lastmod>2019-01-11T14:15:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-launch-a-career-in-application-security-cyberspeak-podcast/</loc>
		<lastmod>2019-01-11T14:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/key-takeaways-from-sans-report-secure-devops-2018-fact-or-fiction/</loc>
		<lastmod>2019-01-11T14:47:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/amazons-ring-gave-access-to-its-employees-to-watch-live-footage-of-the-customers-the-intercept-reports/</loc>
		<lastmod>2019-01-11T15:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-secure-your-cloud-file-storage-with-5-simple-tricks/</loc>
		<lastmod>2019-01-11T15:23:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2019-predictions-for-ai-avast/</loc>
		<lastmod>2019-01-11T15:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/adware-on-google-play-and-more-security-news-avast/</loc>
		<lastmod>2019-01-11T15:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-jon-moscos-jpmosco-introduction-to-container-security-in-kubernetes/</loc>
		<lastmod>2019-01-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/more-than-80-tls-certificates-used-by-gov-websites-have-expired-amidst-ongoing-u-s-government-shutdown/</loc>
		<lastmod>2019-01-11T16:39:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fuzz-testing/</loc>
		<lastmod>2019-01-11T17:54:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/no-direction-home-large-scale-worldwide-dns-attacks/</loc>
		<lastmod>2019-01-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/gamble-not-with-your-future/</loc>
		<lastmod>2019-01-11T19:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ciso-boot-camp-qa-with-michael-palmer-ciso-of-the-national-football-league/</loc>
		<lastmod>2019-01-11T19:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/microsoft-windows-jet-engine-msrd3x-code-execution-vulnerability/</loc>
		<lastmod>2019-01-11T19:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-joshua-marpets-scott-lyons-cryptocurrency-as-asymmetric-economic-weapon/</loc>
		<lastmod>2019-01-11T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/investigate-and-fight-cyberattacks-with-sift-workstation/</loc>
		<lastmod>2019-01-11T21:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/50-great-devops-tools-you-may-not-be-using/</loc>
		<lastmod>2019-01-11T21:55:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/luke-kingma-and-lou-patrick-mackays-futurism-a-toast-to-the-future/</loc>
		<lastmod>2019-01-11T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-lessons-from-2018-breaches/</loc>
		<lastmod>2019-01-11T22:26:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/streamline-your-network-with-a-single-sign-on-policy/</loc>
		<lastmod>2019-01-12T00:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/inner-circle-podcast-episode-018-kevin-livelli-discusses-cybercriminals-stealing-the-nation-state-hacker-playbook/</loc>
		<lastmod>2019-01-12T15:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-matthew-perrines-expanding-our-horizons-the-value-of-multidisciplinary-knowledge-in-security/</loc>
		<lastmod>2019-01-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/atts-john-donovan-the-great-deceiver/</loc>
		<lastmod>2019-01-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-david-vargas-smile-youre-on-camera-controversies-in-facial-biometrics/</loc>
		<lastmod>2019-01-12T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xkcd-thor-tools/</loc>
		<lastmod>2019-01-12T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-gangrifs-so-you-wanna-start-a-podcast/</loc>
		<lastmod>2019-01-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/howto-install-bitwarden-in-a-lxc-container-e-g-proxmox/</loc>
		<lastmod>2019-01-13T17:32:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-wala_fatemas-quick-picks-from-bro-zeek-logs/</loc>
		<lastmod>2019-01-13T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-improve-cyber-strategy-by-learning-nfl-defensive-tactics/</loc>
		<lastmod>2019-01-13T20:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/robert-m-lees-jeff-hass-little-bobby-comics-2fa-is-broken/</loc>
		<lastmod>2019-01-13T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/5-essential-data-security-questions-for-developers/</loc>
		<lastmod>2019-01-13T23:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/detect-merchant-fraud-with-outlier-categorical-model/</loc>
		<lastmod>2019-01-14T00:27:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/us-government-shutdown-privacy-at-ces-2019-mobile-location-data-controversy-wb51/</loc>
		<lastmod>2019-01-14T05:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-you-need-to-know-about-secure-mobile-messaging-in-healthcare/</loc>
		<lastmod>2019-01-14T06:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/qa-heres-why-robust-privileged-access-management-has-never-been-more-vital/</loc>
		<lastmod>2019-01-14T08:43:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/your-business-doesnt-understand-email-security-4-ways-to-tackle-it/</loc>
		<lastmod>2019-01-14T08:55:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-ddos-attacker-rescued-by-a-disney-cruise-ship-is-sentenced-to-over-10-years-in-prison/</loc>
		<lastmod>2019-01-14T10:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/password-policy-manager-for-wordpress-update-1-1/</loc>
		<lastmod>2019-01-14T10:05:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/container-security-incidents-to-rise-in-2019-as-companies-knowingly-deploy-vulnerable-containers/</loc>
		<lastmod>2019-01-14T10:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/facebook-twitter-and-other-tech-giants-to-fight-against-indias-new-intermediary-guidelines-reuters-reports/</loc>
		<lastmod>2019-01-14T11:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/metasploit-5-0-released/</loc>
		<lastmod>2019-01-14T11:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/on-bounties-and-boffins/</loc>
		<lastmod>2019-01-14T11:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fraudsters-increasingly-turning-to-fuze-cards-to-evade-police/</loc>
		<lastmod>2019-01-14T12:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/mozilla-announces-it-will-disable-support-for-flash-plugin-in-firefox-69/</loc>
		<lastmod>2019-01-14T13:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bitglass-security-spotlightbitglass-security-spotlight-dod-facebook-nasa/</loc>
		<lastmod>2019-01-14T13:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-top-cybersecurity-breaches-of-2018/</loc>
		<lastmod>2019-01-14T13:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/microsoft-windows-7-windows-2018-end-of-life/</loc>
		<lastmod>2019-01-14T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-you-need-automation-for-certificate-management/</loc>
		<lastmod>2019-01-14T14:46:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/no-one-puts-pki-in-the-corner/</loc>
		<lastmod>2019-01-14T14:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/will-emerging-threats-tip-the-scales/</loc>
		<lastmod>2019-01-14T14:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hack-the-box-htb-machines-walkthrough-series-jerry/</loc>
		<lastmod>2019-01-14T14:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cert-csih-domain-1-protect-infrastructure/</loc>
		<lastmod>2019-01-14T14:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-i-hacked-play-with-docker-and-remotely-ran-code-on-the-host/</loc>
		<lastmod>2019-01-14T15:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/british-hacker-for-hire-goes-to-prison-for-liberian-telecom-deutsche-telekom-mirai-attack/</loc>
		<lastmod>2019-01-14T15:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-is-samsam-ransomware-and-how-to-recover-and-remove-it-guide/</loc>
		<lastmod>2019-01-14T15:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/sharepoint-online-data-protection-why-its-needed-now/</loc>
		<lastmod>2019-01-14T15:45:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-chris-rossis-dennyr0ss-cybersecurity-effectiveness-do-you-even-security/</loc>
		<lastmod>2019-01-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/machine-learning-to-detect-software-vulnerabilities/</loc>
		<lastmod>2019-01-14T16:48:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/vermont-data-broker-regulations-now-effective%ef%bb%bf/</loc>
		<lastmod>2019-01-14T16:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ottuesday-the-current-state-of-linear-broadcast-and-ott/</loc>
		<lastmod>2019-01-15T14:45:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/interview-sec-compliance-and-the-internet/</loc>
		<lastmod>2019-01-14T19:05:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/5-reasons-to-become-gdpr-compliant-when-you-dont-have-to/</loc>
		<lastmod>2019-01-14T19:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/courts-hand-down-hard-jail-time-for-ddos/</loc>
		<lastmod>2019-01-14T19:37:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-john-hammonds-_johnhammond-10-steps-to-build-lead-a-cybersecurity-ctf-team/</loc>
		<lastmod>2019-01-14T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-joy-of-tech-bird-vr/</loc>
		<lastmod>2019-01-14T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/imperva-increases-self-service-capability-fourfold-with-custom-security-rules/</loc>
		<lastmod>2019-01-14T22:37:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/splashr-0-6-0-now-uses-the-cran-nascent-stevedore-package-for-docker-orchestration/</loc>
		<lastmod>2019-01-15T01:56:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/addressing-the-elephant-in-the-room-cybersecuritys-increasing-talent-shortage/</loc>
		<lastmod>2019-01-15T05:43:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-fcc-and-call-authentication/</loc>
		<lastmod>2019-01-15T05:43:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ahead-of-eus-vote-on-new-copyright-rules-eff-releases-5-key-principles-to-guide-copyright-policy/</loc>
		<lastmod>2019-01-15T08:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/error-your-data-will-not-be-yours-anymore/</loc>
		<lastmod>2019-01-15T09:21:00+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->