<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.information-security-today.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.information-security-today.com/news/sr-cyber-security-analyst-at-us-tech-solutions/</loc>
		<lastmod>2020-09-29T20:14:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/home-security-tech-systems-and-advice/</loc>
		<lastmod>2020-09-29T20:31:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/commentary-austin-sa-corridor-a-launchpad-for-security-innovation/</loc>
		<lastmod>2020-09-29T20:45:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/david-cutcliffe-press-conference-quotes-virginia-tech/</loc>
		<lastmod>2020-09-29T21:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/worried-about-chinese-backdoors-lord-pushes-for-new-tech-strategy/</loc>
		<lastmod>2020-09-29T21:25:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-company-mcafee-files-to-join-rush-of-tech-ipos/</loc>
		<lastmod>2020-09-29T22:26:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/big-tech-firms-may-be-handing-hong-kong-user-data-to-china/</loc>
		<lastmod>2020-09-30T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/as-tech-reaches-end-of-life-hackers-are-watching/</loc>
		<lastmod>2020-09-30T00:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/home-security-tech-alarm-tech/</loc>
		<lastmod>2020-09-30T00:23:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-engineer-job-at-platform-sh/</loc>
		<lastmod>2020-09-30T00:42:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/coronavirus-doctors-diary-trying-out-tech-that-may-help-make-worship-covid-secure/</loc>
		<lastmod>2020-09-30T00:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/coronavirus-doctors-diary-trying-out-tech-that-may-help-make-worship-covid-secure-2/</loc>
		<lastmod>2020-09-30T00:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/medford-talks-security-after-zoom-bombing-incident-2/</loc>
		<lastmod>2020-09-30T02:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/medford-talks-security-after-zoom-bombing-incident/</loc>
		<lastmod>2020-09-30T02:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-attack-hits-tmc-cyber-security-expert-explains/</loc>
		<lastmod>2020-09-30T03:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-roles-are-yall-cloud-security-tech-consultants-applying-to/</loc>
		<lastmod>2020-09-30T03:23:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-systems-tech-jobs-in-fort-belvoir-va/</loc>
		<lastmod>2020-09-30T05:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-it-security-jobs-in-greenwood-village-at-fiserv-inc/</loc>
		<lastmod>2020-09-30T07:54:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/axis-security-raises-32-million-expands-its-tech/</loc>
		<lastmod>2020-09-30T09:47:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/house-passes-400m-state-and-local-cybersecurity-grant-program/</loc>
		<lastmod>2020-09-30T21:33:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/t-systems-bolsters-managed-security-services-integrates-fortinet-in-southeast-asia/</loc>
		<lastmod>2020-09-30T21:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/unbound-tech-targets-msps-sis-resellers-with-first-partner-program/</loc>
		<lastmod>2020-09-30T21:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/house-passes-bills-to-boost-emerging-tech-and-shore-up-cybersecurity-of-electric-sector/</loc>
		<lastmod>2020-09-30T21:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/transformative-tech-spac-kins-technology-group-files-for-a-200-million-ipo/</loc>
		<lastmod>2020-09-30T22:07:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/mcafee-finally-pulls-trigger-joins-tech-ipo-rush/</loc>
		<lastmod>2020-09-30T22:23:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/amazon-launched-one-a-new-contactless-authentication-system/</loc>
		<lastmod>2020-09-30T23:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/senior-security-operations-analyst/</loc>
		<lastmod>2020-09-30T23:44:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-data-completes-acquisition-of-innovix-distribution/</loc>
		<lastmod>2020-10-01T00:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/microsoft-ignite-security-challenge-issue/</loc>
		<lastmod>2020-10-01T00:59:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/managed-security-services-market-2020-by-technology-production-consumption-ratio-after/</loc>
		<lastmod>2020-10-01T01:22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-dispatcher-tech-company/</loc>
		<lastmod>2020-10-01T01:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-dispatcher-for-tech-company-at-allied-universal/</loc>
		<lastmod>2020-10-01T02:55:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/us-department-of-energy-undersecretary-dabbar-visits-georgia-tech/</loc>
		<lastmod>2020-10-01T03:31:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tiktok-is-a-threat-to-national-security/</loc>
		<lastmod>2020-10-01T03:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/jackson-native-builds-tech-hub-downtown/</loc>
		<lastmod>2020-10-01T04:07:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/huawei-welcomes-a-thorough-examination-of-its-5g-technology-to-prove-its-not-a-security-threat/</loc>
		<lastmod>2020-10-01T04:18:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ip-cameras-spotlight-on-multi-lens-cameras/</loc>
		<lastmod>2020-10-01T04:39:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-architecture-devsecops-tech-risk/</loc>
		<lastmod>2020-10-01T07:44:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/poe-security-cameras-market-overview-by-technological-growth-and-scope-2020-to-2025/</loc>
		<lastmod>2020-10-01T08:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/rewriting-the-it-security-manual-for-the-cloud-era/</loc>
		<lastmod>2020-10-01T09:02:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/eplus-strengthens-managed-cloud-security-services-with-addition-of-managed-detection-and/</loc>
		<lastmod>2020-10-01T09:42:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/uk-found-flaw-of-national-significance-in-huawei-tech-says-report/</loc>
		<lastmod>2020-10-01T16:42:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/defense-in-depth-did-strategies-protect-higher-ed-users-against-cyberthreats/</loc>
		<lastmod>2020-10-01T17:26:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/biometric-technology-is-the-future-of-access-control/</loc>
		<lastmod>2020-10-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-below-the-threshold-of-war/</loc>
		<lastmod>2020-10-01T18:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/licel-to-reveal-their-seven-security-by-design-principles-at-droidcon-emea-2020/</loc>
		<lastmod>2020-10-01T18:22:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/governor-cuomo-and-governor-murphy-launch-exposure-notification-apps-to-help-stop-the/</loc>
		<lastmod>2020-10-01T18:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-importance-of-cmmc-in-showcasing-a-contractors-security-capabilities/</loc>
		<lastmod>2020-10-01T18:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/lightstream-launches-managed-security-services/</loc>
		<lastmod>2020-10-01T19:18:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-to-retain-your-security-analyst/</loc>
		<lastmod>2020-10-01T19:35:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fairfax-tech-firm-to-develop-immigration-identify-verification-platform/</loc>
		<lastmod>2020-10-01T19:41:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/webinar-telework-security-risks-you-cant-afford-to-take/</loc>
		<lastmod>2020-10-01T19:41:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-joy-of-tech-debate-pain/</loc>
		<lastmod>2020-10-01T19:59:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/11-new-technologies-impacting-product-based-businesses/</loc>
		<lastmod>2020-10-01T20:37:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/3-common-election-security-vulnerabilities-pros-should-know/</loc>
		<lastmod>2020-10-01T20:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/should-i-buy-a-wyze-smart-security-camera-a-look-at-the-budget-security-camera-brand/</loc>
		<lastmod>2020-10-01T20:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/chinas-critical-minerals-national-security-and-the-meaning-of-supply-chain-interdependence/</loc>
		<lastmod>2020-10-01T21:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/semaphore-co-joins-microage-in-move-to-corner-cloud-technology-services-market/</loc>
		<lastmod>2020-10-01T22:29:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/saas-platform-kount-partners-with-verifi-to-help-firms-minimize-disputes-fraud/</loc>
		<lastmod>2020-10-01T22:49:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-student-national-security-undergraduate-intern-computing-and-analytics/</loc>
		<lastmod>2020-10-01T22:53:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/goldman-nabs-new-head-of-tech-risk-and-information-security-from-morgan-stanley/</loc>
		<lastmod>2020-10-01T23:33:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/multi-million-dollar-tech-company-looking-to-invest-in-high-point/</loc>
		<lastmod>2020-10-02T01:06:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/were-facing-a-tipping-point-cybersecurity-in-the-age-of-covid-19/</loc>
		<lastmod>2020-10-02T02:26:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/coastal-trident-antx-team-executes-critical-event-despite-pandemic-related-restrictions/</loc>
		<lastmod>2020-10-02T02:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/application-security-architect-job-in-clearwater-fl-at-tech-data/</loc>
		<lastmod>2020-10-02T04:39:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/can-israeli-tech-end-hunger-in-africa/</loc>
		<lastmod>2020-10-02T07:01:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/carving-a-pathway-into-tech-for-veterans/</loc>
		<lastmod>2020-10-02T07:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/duke-football-set-to-host-virginia-tech-desperate-to-break-out-of-early-slump/</loc>
		<lastmod>2020-10-02T07:52:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-breeds-prosperity-kucoin-launched-safeguard-program/</loc>
		<lastmod>2020-10-02T10:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-startups-build-effective-cybersecurity-programs/</loc>
		<lastmod>2020-10-02T10:41:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/arista-networks-acquires-awake-security/</loc>
		<lastmod>2020-10-02T10:56:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-tech-crisis-that-isnt-china-controls-the-worlds-rare-earth-supply-chains/</loc>
		<lastmod>2020-10-02T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-diy-security-dealers-defend-themselves/</loc>
		<lastmod>2020-10-02T12:33:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-experts-develop-new-fingerprinting-technique-to-link-russian-hacking-groups-to/</loc>
		<lastmod>2020-10-02T12:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/house-republican-mcmorris-rogers-gets-democrats-aboard-9-tech-policy-priorities/</loc>
		<lastmod>2020-10-02T12:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/watchguard-expands-channel-program-after-panda-deal/</loc>
		<lastmod>2020-10-02T13:18:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/bt-toshiba-boast-quantum-secure-network-first/</loc>
		<lastmod>2020-10-02T14:06:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cybersecurity-and-arbitration-protecting-your-documents-and-ensuring-confidentiality/</loc>
		<lastmod>2020-10-02T17:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-news-desk-announces-partnership-with-ifsec/</loc>
		<lastmod>2020-10-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/information-security-analyst-technician-electronics-systems-maintenance-job-at-acet-inc/</loc>
		<lastmod>2020-10-02T19:07:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-overview-%c2%b7-joatmon08-tech-portfolio/</loc>
		<lastmod>2020-10-02T19:18:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-kubernetes-paves-the-way-for-secure-innovation-in-healthcare/</loc>
		<lastmod>2020-10-02T19:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/slothfulmedia-rat-is-out-blue-themed-election-spam-in-the-us-xdspy-and-desert-scorpion/</loc>
		<lastmod>2020-10-02T19:41:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cisco-to-acquire-container-security-specialist-portshift/</loc>
		<lastmod>2020-10-02T19:41:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/biggest-ransomware-attack-yet-crippled-us-hospitals-last-weekend/</loc>
		<lastmod>2020-10-02T19:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ring-created-a-security-drone-to-fly-around-your-house-rich-on-tech/</loc>
		<lastmod>2020-10-02T19:55:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/info-technician-tech-specialist-netwrk-arch-cyper-security-job-in-washington-dc/</loc>
		<lastmod>2020-10-02T20:08:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/a-security-flaw-in-grindr-let-anyone-easily-hijack-user-accounts/</loc>
		<lastmod>2020-10-02T20:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/reducing-cyber-risks-in-as-a-service-it-agreements/</loc>
		<lastmod>2020-10-02T20:31:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/james-taylor-dont-let-disinformation-halt-tech-innovation-in-florida/</loc>
		<lastmod>2020-10-02T20:37:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-dhs-modified-explosive-threat-detection-tech-for-darpa/</loc>
		<lastmod>2020-10-02T21:19:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cio-leadership-world-class-technology-leaders-to-discuss-fostering-the-data-driven/</loc>
		<lastmod>2020-10-02T21:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/south-tulsa-neighborhoods-install-high-tech-security-cameras/</loc>
		<lastmod>2020-10-03T00:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/mcafee-files-to-go-public-amid-ipo-boom/</loc>
		<lastmod>2020-10-03T01:12:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/inside-walter-reed-the-nations-medical-center-where-trump-will-be-treated-for-coronavirus-in-a/</loc>
		<lastmod>2020-10-03T01:23:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/amazon-doubles-down-on-echo-home-security-what-to-know/</loc>
		<lastmod>2020-10-03T01:51:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/honeywell-security-tech-support/</loc>
		<lastmod>2020-10-03T07:35:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/6-privacy-and-security-mistakes-youre-making-on-social-media/</loc>
		<lastmod>2020-10-03T07:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cybersecurity-takes-top-tech-priority-as-covid-19-spurs-transformation-projects/</loc>
		<lastmod>2020-10-03T07:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/researchers-use-fingerprints-tech-to-spot-russian-hackers/</loc>
		<lastmod>2020-10-03T08:11:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/making-the-case-for-commercially-successful-tech/</loc>
		<lastmod>2020-10-03T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ibm-india-pvt-ltd-3-6/</loc>
		<lastmod>2020-10-03T09:20:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/googles-new-apv-initiative-improves-non-pixel-devices-security-and-it-also-informs-users-about/</loc>
		<lastmod>2020-10-03T10:06:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/global-information-technology-it-security-as-a-service-market-2020-covid-19-impact-analysis/</loc>
		<lastmod>2020-10-03T10:41:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/google-hiring-special-team-to-spot-critical-bugs-in-android-apps/</loc>
		<lastmod>2020-10-03T11:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/global-iot-security-solution-for-identity-and-access-management-iam-market-2020-recovering/</loc>
		<lastmod>2020-10-03T11:37:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/amazons-latest-drone-films-inside-your-home-what-could-go-wrong/</loc>
		<lastmod>2020-10-03T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/us-must-act-to-counter-chinas-dominance-of-mineral-rare-earth-markets-opinion/</loc>
		<lastmod>2020-10-03T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/new-phishing-worm-account-takeover-threat/</loc>
		<lastmod>2020-10-03T12:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-security-tip-how-to-delete-private-data-for-good/</loc>
		<lastmod>2020-10-03T12:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/larry-ellisons-tiktok-bid-puts-oracle-chairman-back-in-the-spotlight/</loc>
		<lastmod>2020-10-03T14:03:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nigeria-south-africa-and-kenya-record-millions-of-cyber-attacks-in-2020/</loc>
		<lastmod>2020-10-03T14:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/from-cybersecurity-to-hiring-tech-talent-tampa-st-pete-startups-tackle-top-business-issues/</loc>
		<lastmod>2020-10-03T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/why-amazons-home-security-drone-should-set-off-alarm-bells/</loc>
		<lastmod>2020-10-03T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/states-are-finally-starting-to-use-the-covid-tracking-tech-apple-and-google-built-heres-why/</loc>
		<lastmod>2020-10-03T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/on-the-move-the-north-texas-tech-and-startup-hires-and-departures-in-september/</loc>
		<lastmod>2020-10-03T16:41:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/spy-panic-thinktank-calls-for-ban-on-british-spies-joining-hostile-foreign-governments/</loc>
		<lastmod>2020-10-03T16:41:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/microsoft-ignites-2020-with-new-services-and-tools-for-business-resiliency/</loc>
		<lastmod>2020-10-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/5g-set-to-revolutionize-iot-but-not-any-time-soon/</loc>
		<lastmod>2020-10-03T18:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/information-security-technical-lead/</loc>
		<lastmod>2020-10-03T18:48:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/improve-aims-to-improve-food-security-in-african-countries/</loc>
		<lastmod>2020-10-03T18:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/as-cios-report-slow-thawing-of-tech-spending-freezes-expect-2-growth-in-2021/</loc>
		<lastmod>2020-10-03T19:29:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/clinical-trials-hit-by-ransomware-attack-on-health-tech-firm/</loc>
		<lastmod>2020-10-03T20:03:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/south-tulsa-neighborhoods-install-high-tech-security-cameras-ok/</loc>
		<lastmod>2020-10-03T20:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/electromagnetic-locks-market-forecast-research-reports-offers-key-insights-2020-2025/</loc>
		<lastmod>2020-10-03T20:26:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/is-this-new-high-tech-britannia-coin-a-golden-opportunity-as-stocks-slide/</loc>
		<lastmod>2020-10-03T21:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tap-into-the-global-boom-in-fighting-cyber-crime-and-net-86-returns/</loc>
		<lastmod>2020-10-03T21:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-tech-manager-in-detroit-wanted-by-soave-enterprises-llc/</loc>
		<lastmod>2020-10-03T21:44:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/palantirs-british-boss-offers-defence-of-security-giant/</loc>
		<lastmod>2020-10-03T23:02:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/new-esg-jumpcloud-study-uncovers-its-biggest-identity-and-security-challenges-due-to/</loc>
		<lastmod>2020-10-03T23:23:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/a-shameful-security-flaw-could-have-let-anyone-access-your-grindr-account/</loc>
		<lastmod>2020-10-03T23:37:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/honeywell-security-tech-support-2/</loc>
		<lastmod>2020-10-04T00:11:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dublin-security-tech-firm-looks-to-us-with-plans-for-san-francisco-office/</loc>
		<lastmod>2020-10-04T01:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/networking-security/</loc>
		<lastmod>2020-10-04T01:48:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-deeply-do-ethics-run-in-the-it-industry/</loc>
		<lastmod>2020-10-04T02:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/a-software-to-keep-you-on-top-of-cloud-security-needs/</loc>
		<lastmod>2020-10-04T03:18:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/information-security-technical-controls-analyst-3158052-found-on-morgan-stanley/</loc>
		<lastmod>2020-10-04T03:26:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-giant-imperva-acquires-israeli-startup-jsonar-for-data-security-expertise/</loc>
		<lastmod>2020-10-04T05:03:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/bbb-tips-online-security-especially-important-during-pandemic/</loc>
		<lastmod>2020-10-04T05:03:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/virginia-tech-assistant-professor-integrated-security-in-blacksburg-va/</loc>
		<lastmod>2020-10-04T05:33:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/content-security-gateway-market-report-2020-size-trends-competitive-analysis-types/</loc>
		<lastmod>2020-10-04T05:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sk-telecoms-subsidiaries-eye-ipos/</loc>
		<lastmod>2020-10-04T06:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/android-malware-crackdown-google-takes-drastic-action-to-protect-play-store-apps/</loc>
		<lastmod>2020-10-04T06:02:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/access-control-security-market-may-see-a-big-move-by-2026-honeywell-advance-technology/</loc>
		<lastmod>2020-10-04T06:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/best-of-futuristic-tech-weve-seen-in-2020/</loc>
		<lastmod>2020-10-04T06:54:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dublin-security-tech-firm-looks-to-us-with-plans-for-san-francisco-office-2/</loc>
		<lastmod>2020-10-04T07:02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/law-enforcement-police-modernization-market-shares-strategies-and-forecasts-worldwide/</loc>
		<lastmod>2020-10-04T08:26:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dhs-works-to-protect-national-critical-infrastructure/</loc>
		<lastmod>2020-10-04T10:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/a-closer-look-at-the-american-tech-ban-and-its-consequences/</loc>
		<lastmod>2020-10-04T10:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/amazon-will-let-you-pay-with-your-handsand-other-small-business-tech-news/</loc>
		<lastmod>2020-10-04T10:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-is-winning-the-war-for-global-tech-dominance/</loc>
		<lastmod>2020-10-04T19:49:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/college-football-corner-wins-for-virginia-and-virginia-tech-another-long-year-for-the-longhorns/</loc>
		<lastmod>2020-10-04T20:48:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-technology-is-helping-luxury-fashion-brands-gain-traction/</loc>
		<lastmod>2020-10-04T21:31:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/valideas-top-five-technology-stocks-based-on-kenneth-fisher-10-4-2020/</loc>
		<lastmod>2020-10-04T22:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/asia-pacific-stocks-rise-as-investors-watch-trumps-health-condition-following-his-covid-19-diagnosis/</loc>
		<lastmod>2020-10-04T23:42:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/microsoft-puts-lipstick-on-a-pig-to-avoid-scrutiny-over-security/</loc>
		<lastmod>2020-10-05T00:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/vmware-highlights-security-in-covid-era-networking/</loc>
		<lastmod>2020-10-05T00:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fake-qr-codes-can-expose-your-phone-to-hackers-heres-how-to-protect-it/</loc>
		<lastmod>2020-10-05T02:09:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/airasia-teams-up-with-google-cloud-to-drive-digital-skills-training-in-malaysia/</loc>
		<lastmod>2020-10-05T02:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/extra-point-vs-virginia-tech-blue-devils-improve-turnovers-still-fall-short-to-the-hokies/</loc>
		<lastmod>2020-10-05T03:33:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/surveillance-cameras-market-growth-by-top-companies-trends-by-types-and-application/</loc>
		<lastmod>2020-10-05T05:41:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/registration-open-2020-21-microsoft-security-public-webinars/</loc>
		<lastmod>2020-10-05T05:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/network-security-and-cyber-risk-management-market-in-india-market-2020-growth-trends-by/</loc>
		<lastmod>2020-10-05T06:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/middle-east-and-africa-cybersecurity-market-share-2020-global-industry-segments-by-regions/</loc>
		<lastmod>2020-10-05T07:43:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-3.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/put-identity-and-security-at-the-heart-of-digital-transformation/</loc>
		<lastmod>2020-10-05T08:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-4.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fake-qr-codes-can-expose-your-phone-to-hackers-heres-how-to-protect-it-2/</loc>
		<lastmod>2020-10-05T09:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-5.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/leading-chinese-chipmaker-smic-hit-by-us-export-restrictions/</loc>
		<lastmod>2020-10-05T10:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-6.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/airasia-teams-up-with-google-cloud-to-drive-digital-skills-training-in-malaysia-2/</loc>
		<lastmod>2020-10-05T11:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-7.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/extra-point-vs-virginia-tech-blue-devils-improve-turnovers-still-fall-short-to-the-hokies-2/</loc>
		<lastmod>2020-10-05T12:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-8.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/john-knox-village-wins-tech-awards-gold-for-sensing-possible-falls-with-ai-machine-vision/</loc>
		<lastmod>2020-10-05T13:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-9.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/keep-home-network-secure/</loc>
		<lastmod>2020-10-05T14:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-10.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/modern-healthcare-tech-also-means-modern-security/</loc>
		<lastmod>2020-10-05T15:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-11.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/israel-startup-powerhouse/</loc>
		<lastmod>2020-10-05T16:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-12.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-security-policy-soon-to-strengthen-digitisation-says-karnataka-dy-cm/</loc>
		<lastmod>2020-10-05T17:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-13.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/let-there-be-lifi-world-leading-tech-aims-to-solve-spectrum-crunch/</loc>
		<lastmod>2020-10-05T18:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-14.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/research-report-covers-global-tailgating-detection-market-research-report-2020-2027-iee-sa/</loc>
		<lastmod>2020-10-05T19:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-15.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/kioxia-and-sony-memory-chipmaker-are-waiting-for-us-approval-to-supply-huawei/</loc>
		<lastmod>2020-10-05T20:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-16.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/impact-of-covid-19-on-endpoint-security-market-from-2020-2025-growth-analysis-by/</loc>
		<lastmod>2020-10-05T21:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-17.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nec-purchases-100-shares-of-avaloq-for-2-2bn/</loc>
		<lastmod>2020-10-05T22:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-18.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/why-the-us-should-pay-attention-to-chinas-draft-data-security-law/</loc>
		<lastmod>2020-10-05T23:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-19.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/discover-tomorrows-world-of-security-products-at-ifsec-tech-talks/</loc>
		<lastmod>2020-10-06T00:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-20.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-byte-keeping-your-kids-safe-online/</loc>
		<lastmod>2020-10-06T01:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-21.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/kid-tech-support-saves-parents-5000-annually/</loc>
		<lastmod>2020-10-06T02:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-22.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nest-audio-vs-amazon-echo-4th-gen-which-should-you-buy/</loc>
		<lastmod>2020-10-06T03:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-23.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/atsc-named-prime-in-potential-417m-maritime-domain-awareness-tech-sale-to-egypt/</loc>
		<lastmod>2020-10-06T04:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-24.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/expert-insight-on-clinical-trials-hit-by-ransomware-attack-on-health-tech-firm/</loc>
		<lastmod>2020-10-06T06:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-25.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tmas-ops-tech-2020-to-showcase-innovation/</loc>
		<lastmod>2020-10-06T07:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-26.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/schmidt-security-pros-products-give-homeowners-peace-of-mind/</loc>
		<lastmod>2020-10-06T08:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-27.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/department-of-energy-issues-report-on-benefits-of-us-oil-and-natural-gas-providing-energy/</loc>
		<lastmod>2020-10-06T09:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-28.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-week-that-will-be/</loc>
		<lastmod>2020-10-06T10:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-29.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/it-security-engineer-job-in-marietta-ga-at-pds-tech-inc/</loc>
		<lastmod>2020-10-06T11:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-30.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-operations-analyst/</loc>
		<lastmod>2020-10-06T12:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-31.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/software-pioneer-john-mcafee-indicted-on-tax-charges/</loc>
		<lastmod>2020-10-06T13:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-32.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-top-6-why-dont-smart-devices-secure-themselves/</loc>
		<lastmod>2020-10-06T14:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-33.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/alarm-technician-electrician-data-installer-security-tech-it-installer-job-in-dubbo-central-nsw/</loc>
		<lastmod>2020-10-06T15:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-34.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/warning-hackers-bypass-apples-t2-security-chip-by-combining-two-exploits-used-to-jailbreak/</loc>
		<lastmod>2020-10-06T16:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-35.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/louisville-ga-tech-look-to-snap-skids-in-acc-showdown/</loc>
		<lastmod>2020-10-06T17:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-36.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/japan-to-tighten-visa-screenings-of-foreign-students-researchers-to-prevent-tech-theft/</loc>
		<lastmod>2020-10-06T18:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-37.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fire-alarm-security-tech-sarasota/</loc>
		<lastmod>2020-10-06T19:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-38.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/network-security/</loc>
		<lastmod>2020-10-06T20:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-39.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cmmc-pre-certification/</loc>
		<lastmod>2020-10-06T21:43:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-40.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/drive-thru-flu-shots-being-offered-at-marshall-county-tech-school/</loc>
		<lastmod>2020-10-06T22:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-41.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/saic-wins-878m-gsa-task-order-for-multidomain-c2-tech-services-michael-larouche-quoted/</loc>
		<lastmod>2020-10-06T23:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-42.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-to-boost-the-effectiveness-of-your-cybersecurity-operations/</loc>
		<lastmod>2020-10-07T00:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-43.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/build-a-cloud-security-strategy/</loc>
		<lastmod>2020-10-07T01:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-44.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/16-software-development-trends-that-will-soon-dominate-the-tech-industry/</loc>
		<lastmod>2020-10-07T02:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-45.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/motion-recruitment-expands-market-specialization-model-into-dataops-and-cybersecurity/</loc>
		<lastmod>2020-10-07T03:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-46.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/some-employees-more-likely-to-adhere-to-information-security-policies-than-others/</loc>
		<lastmod>2020-10-07T04:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-47.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/charles-burns-opens-day-2-of-isc-west-with-ubers-global-security-insights/</loc>
		<lastmod>2020-10-07T05:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-48.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/apples-t2-security-processor-has-an-unpatchable-security-flaw/</loc>
		<lastmod>2020-10-07T06:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-49.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/saline-county-receives-election-security-grant/</loc>
		<lastmod>2020-10-07T07:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-50.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/spotlighting-cyber-security-awareness-month/</loc>
		<lastmod>2020-10-07T08:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-51.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cloud-security-information-security-gap-analysis-tool/</loc>
		<lastmod>2020-10-07T09:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-52.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cloud-security-strategy-template/</loc>
		<lastmod>2020-10-07T10:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-53.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nih-radx-initiative-advances-six-new-covid-19-testing-technologies/</loc>
		<lastmod>2020-10-07T11:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-54.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/chastity-cage-security-flaw-could-let-hackers-lock-up-your-penis/</loc>
		<lastmod>2020-10-07T12:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-55.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/h-1b-visa-trump-administration-issues-major-rule-change/</loc>
		<lastmod>2020-10-07T13:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-56.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/h-1b-visa-trump-administration-issues-major-rule-change-2/</loc>
		<lastmod>2020-10-07T14:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-57.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-next-gen-endpoint-protection-can-secure-federal-users-at-home/</loc>
		<lastmod>2020-10-07T15:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-58.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cisco-moves-to-buy-cloud-and-container-security-startup/</loc>
		<lastmod>2020-10-07T16:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-59.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/mercurys-cto-dr-william-conley-selected-as-advisor-for-hudson-institutes-new-center-for/</loc>
		<lastmod>2020-10-07T17:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-60.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ways-to-invest-in-security-tools/</loc>
		<lastmod>2020-10-07T18:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-61.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/with-ultra-modern-tech-new-coast-guard-vessel-to-strengthen-security/</loc>
		<lastmod>2020-10-07T19:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-62.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/m-tech-signs-up-security-vendor-securonix/</loc>
		<lastmod>2020-10-07T20:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-63.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tpg-pace-tech-opportunities-corp-2020-security-ownership-statement-form-3/</loc>
		<lastmod>2020-10-07T21:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-64.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/m-tech-signs-us-based-cloud-security-analytics-platform-securonix/</loc>
		<lastmod>2020-10-07T22:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-65.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sec-charges-cybersecurity-co-founder-for-unlawful-ico-promotion/</loc>
		<lastmod>2020-10-07T23:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-66.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/with-ultra-modern-tech-new-coast-guard-vessel-to-strengthen-security-2/</loc>
		<lastmod>2020-10-08T00:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-67.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-every-msp-internal-security-framework-should-include/</loc>
		<lastmod>2020-10-08T06:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-68.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/m-tech-to-distribute-securonix-siem-in-a-nz/</loc>
		<lastmod>2020-10-08T07:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-69.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/state-of-software-security-open-source-edition/</loc>
		<lastmod>2020-10-08T08:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-70.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/workforce-changes-needed-to-make-ic-more-agile-report-says/</loc>
		<lastmod>2020-10-08T09:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-71.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-security-researchers-should-view-the-voting-systems-act/</loc>
		<lastmod>2020-10-08T10:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-72.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/mps-express-5g-security-fears/</loc>
		<lastmod>2020-10-08T11:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-73.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/google-accounts-get-security-boost-with-new-critical-alerts-system/</loc>
		<lastmod>2020-10-08T12:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-74.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sfs-cyber-response-equip-workers-to-detect-resist-security-threats/</loc>
		<lastmod>2020-10-08T13:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-75.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/199-a-few-tech-cock-ups-and-one-cock-lock-up/</loc>
		<lastmod>2020-10-08T14:43:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-76.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-shift-supervisor-tech-facility-at-allied-universal/</loc>
		<lastmod>2020-10-08T15:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-77.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/swing-district-debate-hinges-on-oil-sector-border-security/</loc>
		<lastmod>2020-10-08T16:43:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-78.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/us-government-issues-warning-following-uptick-in-emotet-malware-attacks/</loc>
		<lastmod>2020-10-08T17:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-79.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-tech-solutions-is-looking-to-hire-installers/</loc>
		<lastmod>2020-10-08T18:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-80.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ent-security-grc-analyst-i-job-in-lubbock-tx-at-texas-tech-university-system/</loc>
		<lastmod>2020-10-08T19:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-81.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/home-security-am-tech-70mm-disc-pad-lock-heavy-duty-outdoor-safety-security-shackle-with/</loc>
		<lastmod>2020-10-08T20:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-82.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/access-systems-internet-security-tech/</loc>
		<lastmod>2020-10-08T21:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-83.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-is-a-clear-and-present-threat-to-us-economic-security-opinion/</loc>
		<lastmod>2020-10-08T22:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-84.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-company-finds-vulnerability-in-xfinity-television-remote-controls/</loc>
		<lastmod>2020-10-08T23:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-85.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/hackers-eye-their-next-targets-from-schools-to-cars/</loc>
		<lastmod>2020-10-09T00:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-86.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/micron-tech-wins-bid-to-kill-rivals-security-patent/</loc>
		<lastmod>2020-10-09T01:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-87.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sts-silicon-valley-innovation-program-leverages-blockchain-interoperability-to-support-dhs/</loc>
		<lastmod>2020-10-09T02:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-88.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/greenfield-tech-lead-java-dev-api-security-authorization/</loc>
		<lastmod>2020-10-09T03:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-89.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/grindr-security-flaw-allowed-hacking-with-just-an-email-address/</loc>
		<lastmod>2020-10-09T04:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-90.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/information-security-analyst/</loc>
		<lastmod>2020-10-09T05:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-91.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-research-strives-to-keep-us-imported-food-safe/</loc>
		<lastmod>2020-10-09T06:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-92.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/large-tech-employer-with-operations-in-plano-joining-ipo-party/</loc>
		<lastmod>2020-10-09T07:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-93.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/secure-data-technologies-expanding-to-springfield-missouri/</loc>
		<lastmod>2020-10-09T08:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-94.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-operations-analyst-soc/</loc>
		<lastmod>2020-10-09T09:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-95.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/telework-security-risks-you-cant-afford-to-take/</loc>
		<lastmod>2020-10-09T10:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-96.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/trends-in-it-risk-management/</loc>
		<lastmod>2020-10-09T11:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-97.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/spore-cyber-security-capabilities-to-be-enhanced/</loc>
		<lastmod>2020-10-09T12:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-98.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/doj-bans-use-of-grant-funds-for-certain-foreign-made-drones/</loc>
		<lastmod>2020-10-09T13:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-99.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/free-tech-tools-for-election-officials/</loc>
		<lastmod>2020-10-09T14:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-100.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/covid-19-budgets-data-security-and-automation-are-concerns-of-it-leaders-and-staff/</loc>
		<lastmod>2020-10-09T15:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-101.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/labor-board-accuses-google-contractor-of-violating-union-rights/</loc>
		<lastmod>2020-10-09T16:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-102.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/spore-cyber-security-capabilities-to-be-enhanced-tech-news-top-stories/</loc>
		<lastmod>2020-10-09T17:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-103.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/vicon-security-tech-support/</loc>
		<lastmod>2020-10-09T18:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-104.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/privacyraven-has-left-the-nest/</loc>
		<lastmod>2020-10-09T19:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-105.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-savvy-teens-save-parents-thousands-avast/</loc>
		<lastmod>2020-10-09T20:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-106.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/apples-t2-chip-in-mac-has-an-unfixable-security-problem/</loc>
		<lastmod>2020-10-09T21:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-107.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-new-ring-always-home-camera-is-a-security-disaster-in-the-making/</loc>
		<lastmod>2020-10-09T22:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-108.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dmp-hires-regional-training-manager-for-ny-metro-new-england/</loc>
		<lastmod>2020-10-09T23:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-109.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/klarman-fellow-examines-tech-policy-via-social-science/</loc>
		<lastmod>2020-10-10T00:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-110.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/kelley-kronenberg-expands-tech-c-suite/</loc>
		<lastmod>2020-10-10T01:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-111.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-to-secure-your-open-source-supply-chain/</loc>
		<lastmod>2020-10-10T02:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-112.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-security-tech-can-you-now-get-for-your-house/</loc>
		<lastmod>2020-10-10T03:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-113.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/national-security-ai-commission-at-odds-over-us-response-to-malign-ai/</loc>
		<lastmod>2020-10-10T04:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-114.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/5-vpn-myths-your-end-users-need-to-know/</loc>
		<lastmod>2020-10-10T05:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-115.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-the-enterprise-can-shut-down-cyber-criminals-and-protect-a-remote-staff/</loc>
		<lastmod>2020-10-10T06:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-116.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/amazon-begins-to-implement-palm-recognition-technology-in-seattle-stores/</loc>
		<lastmod>2020-10-10T07:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-117.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cloud-security-engineer/</loc>
		<lastmod>2020-10-10T08:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-118.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-baseline-for-microsoft-edge-version-86/</loc>
		<lastmod>2020-10-10T09:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-119.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/juniper-networks-unveils-vpn-offering/</loc>
		<lastmod>2020-10-10T10:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-120.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/qa-andrea-daugherty-of-ut-health-austin-on-security-in-the-pandemic/</loc>
		<lastmod>2020-10-10T11:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-121.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/psa-adapt-state-of-the-integrator-our-solutions-can-help-pandemic-recovery/</loc>
		<lastmod>2020-10-10T12:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-122.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/local-it-firm-experiencing-momentum-as-market-rebounds/</loc>
		<lastmod>2020-10-10T13:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-123.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/insider-threat-security-is-your-business-at-risk/</loc>
		<lastmod>2020-10-10T14:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-124.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-epic-battle-over-apples-commission-rates/</loc>
		<lastmod>2020-10-10T15:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-125.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/city-tech-vendor-hacked-some-lexington-employee-social-security-numbers-accessed/</loc>
		<lastmod>2020-10-10T16:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-126.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/doj-announces-cryptocurrency-enforcement-framework/</loc>
		<lastmod>2020-10-10T17:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-127.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/united-states-appeals-judges-order-that-blocked-tiktok-ban/</loc>
		<lastmod>2020-10-10T18:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-128.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/spore-to-work-with-un-to-beef-up-cyber-security/</loc>
		<lastmod>2020-10-10T19:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-129.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-to-know-about-signal-the-secure-messaging-app-that-keeps-all-of-your-conversations-private/</loc>
		<lastmod>2020-10-10T20:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-130.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/edge-86-0-622-38-security-update/</loc>
		<lastmod>2020-10-10T21:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-131.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/german-tech-firm-software-ag-hit-with-23mn-ransomware-attack/</loc>
		<lastmod>2020-10-10T22:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-132.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-egyptian-central-bank-establishes-a-company-to-transfer-funds-and/</loc>
		<lastmod>2020-10-10T23:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-133.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/3-tech-stocks-that-are-thriving-despite-the-coronavirus/</loc>
		<lastmod>2020-10-11T00:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-134.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/a-prison-video-visitation-service-exposed-private-calls-between-inmates-and-their-attorneys/</loc>
		<lastmod>2020-10-11T01:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-135.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/is-arlo-leaving-the-home-security-field-to-amazon-and-google/</loc>
		<lastmod>2020-10-11T02:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-136.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tata-communications-bets-on-three-pronged-approach-for-growth-in-post-covid-world/</loc>
		<lastmod>2020-10-11T03:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-137.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/jio-waives-postpaid-security-fee-to-attract-customers-from-rival-networks/</loc>
		<lastmod>2020-10-11T04:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-138.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/company-overview-for-smart-tech-security-ltd-10578079/</loc>
		<lastmod>2020-10-11T05:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-139.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/network-security-operations-sw-application-tech-support-practitioner-at-accenture/</loc>
		<lastmod>2020-10-11T06:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-140.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fears-new-facebook-security-measures-could-protect-uks-300000-paedophiles/</loc>
		<lastmod>2020-10-11T07:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-141.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-pm-security-compliance/</loc>
		<lastmod>2020-10-11T08:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-142.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/viken-detection-tech-aids-cbp-in-security-along-southern-border/</loc>
		<lastmod>2020-10-11T09:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-143.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-to-do-if-someone-breaks-into-your-home/</loc>
		<lastmod>2020-10-11T10:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-144.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/4-essential-tasks-new-bootstrapped-businesses-should-outsource/</loc>
		<lastmod>2020-10-11T11:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-145.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/india-needs-integration/</loc>
		<lastmod>2020-10-11T12:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-146.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-one-pager/</loc>
		<lastmod>2020-10-11T13:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-147.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/amazon-prime-day-2020-deals-now-available-in-uk-cheapest-ever-echo-show-5-at-45-blink/</loc>
		<lastmod>2020-10-11T14:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-148.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/facebook-responsible-for-94-of-69-million-child-sex-abuse-images-reported-by-us-tech-firms/</loc>
		<lastmod>2020-10-11T15:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-149.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/facebook-made-94-of-all-child-sex-abuse-image-reports-by-tech-firms-last-year/</loc>
		<lastmod>2020-10-11T16:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-150.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sr-security-engineer-in-st-paul-wanted-by-tech-mahindra-americas/</loc>
		<lastmod>2020-10-11T17:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-151.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/meet-the-winners-women-in-technology-awards-2020/</loc>
		<lastmod>2020-10-11T18:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-152.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-nokia-2-4-comes-with-ai-powered-camera/</loc>
		<lastmod>2020-10-11T19:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-153.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/washingtons-china-policy-has-lost-its-wei/</loc>
		<lastmod>2020-10-11T20:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-154.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-qa-dont-let-a-new-router-disrupt-wi-fi-network/</loc>
		<lastmod>2020-10-11T21:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-155.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/throwback-tulsa-anita-hill-testifies-against-clarence-thomas-on-this-day-in-1991/</loc>
		<lastmod>2020-10-11T22:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-156.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-cybersecurity-no-place-to-hide/</loc>
		<lastmod>2020-10-11T23:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-157.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/vulnerability-found-in-apples-t2-security-chip/</loc>
		<lastmod>2020-10-12T00:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-158.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cisos-are-key-to-make-companies-security-safe-under-covid-19/</loc>
		<lastmod>2020-10-12T01:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-159.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/us-cyber-command-behind-trickbot-tricks-krebs-on-security/</loc>
		<lastmod>2020-10-12T02:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-160.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/breaking-down-home-security/</loc>
		<lastmod>2020-10-12T03:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-161.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/covid-19-pandemic-forces-significant-surge-in-tech-investments/</loc>
		<lastmod>2020-10-12T04:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-162.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/engg-web-options-postponed/</loc>
		<lastmod>2020-10-12T05:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-163.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-australia-china-tensions-have-hit-lowest-ebb-in-decades/</loc>
		<lastmod>2020-10-12T06:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-164.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-to-do-if-phone-to-car-software-link-disconnects/</loc>
		<lastmod>2020-10-12T07:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-165.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/election-result-delays-mean-the-system-is-working-says-cybersecurity-chief/</loc>
		<lastmod>2020-10-12T08:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-166.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/holm-auto-good-news-salina-tech-students-eager-to-learn-while-remodeling-ashby-house-shelter/</loc>
		<lastmod>2020-10-12T09:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-167.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-all-new-blink-security-camera-price-drops-to-just-24-99-before-prime-day/</loc>
		<lastmod>2020-10-12T10:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-168.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/amazon-prime-day-2020-deals-already-available-in-uk-huge-discount-on-echo-show-5-at-45/</loc>
		<lastmod>2020-10-12T11:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-169.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/pboc-vice-governor-says-worsening-us-china-relations-a-risk-to-financial-network/</loc>
		<lastmod>2020-10-12T12:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-170.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ms-tech-mini-full-hd-960p-camera-professional-wireless-wifi-home-ip-ap-camera-camcorder/</loc>
		<lastmod>2020-10-12T13:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-171.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dutton-pushes-against-encryption-yet-again-but-oversight-at-home-is-slow/</loc>
		<lastmod>2020-10-12T14:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-172.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/why-is-china-introducing-new-export-controls/</loc>
		<lastmod>2020-10-12T15:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-173.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-security-skills-ad-branded-crass-by-minister/</loc>
		<lastmod>2020-10-12T16:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-174.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cloudblue-empowers-mid-market-companies/</loc>
		<lastmod>2020-10-12T17:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-175.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ifsec-india-and-osh-india-virtual-expos-propel-the-security-surveillance-and-occupational/</loc>
		<lastmod>2020-10-12T18:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-176.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/a-7-step-cybersecurity-plan-for-healthcare-organizations/</loc>
		<lastmod>2020-10-12T19:43:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-177.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/debunking-the-distrust-around-ai-tech/</loc>
		<lastmod>2020-10-12T20:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-178.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/people-in-the-news-oct-12-2020-mcnees-wallace-klehr-harrison/</loc>
		<lastmod>2020-10-12T21:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-179.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-next-generation-endpoint-security-can-protect-remote-workers/</loc>
		<lastmod>2020-10-12T22:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-180.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-makes-the-quintessential-chief-information-security-officer/</loc>
		<lastmod>2020-10-12T23:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-181.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/seraphim-capitals-space-tech-accelerator-releases-details-of-its-newest-space-camp-cohort/</loc>
		<lastmod>2020-10-13T00:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-182.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/hy-tech-security-inc-home/</loc>
		<lastmod>2020-10-13T01:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-183.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/international-statement-end-to-end-encryption-and-public-safety/</loc>
		<lastmod>2020-10-13T02:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-184.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-measures-high-tech-equipment-and-a-digital-trail-as-camden-county-ballots-roll-in/</loc>
		<lastmod>2020-10-13T03:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-185.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/webinar-telework-security-risks-you-cant-afford-to-take-2/</loc>
		<lastmod>2020-10-13T04:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-186.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/castro-district-group-delays-vote-on-security-cameras-after-significant-community-pushback/</loc>
		<lastmod>2020-10-13T05:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-187.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nutanix-to-host-tech-talk-on-nutanix-clusters/</loc>
		<lastmod>2020-10-13T06:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-188.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/college-launches-new-training-initiative-expands-training-center/</loc>
		<lastmod>2020-10-13T07:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-189.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/board-of-advisors/</loc>
		<lastmod>2020-10-13T08:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-190.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/apple-gives-shout-out-to-teenaged-self-taught-nj-coder-who-alerted-them-to-iphone-security-risk/</loc>
		<lastmod>2020-10-13T09:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-191.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-grayhat-cybersecurity-conference-is-set-for-the-halloween-weekend-with-the-goal-of/</loc>
		<lastmod>2020-10-13T10:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-192.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-to-know-about-chromes-new-security-features/</loc>
		<lastmod>2020-10-13T11:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-193.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-to-know-about-chromes-new-security-features-2/</loc>
		<lastmod>2020-10-13T12:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-194.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/information-security-analyst-endpoint-security/</loc>
		<lastmod>2020-10-13T13:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-195.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/chinas-quiet-experiment-to-let-millions-roam-the-real-internet/</loc>
		<lastmod>2020-10-13T14:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-196.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/as-skywater-expansion-shows-governments-role-in-us-chip-industry-is-rising/</loc>
		<lastmod>2020-10-13T15:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-197.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cdw-tech-talk-how-to-manage-digital-transformation-in-times-of-crisis/</loc>
		<lastmod>2020-10-13T16:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-198.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-grayhat-cybersecurity-conference-is-set-for-the-halloween-weekend/</loc>
		<lastmod>2020-10-13T17:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-199.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/chinas-quiet-experiment-let-millions-view-long-banned-websites/</loc>
		<lastmod>2020-10-13T18:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-200.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fire-alarm-life-safety-installer-low-voltage-tech-cctv-security-sys/</loc>
		<lastmod>2020-10-13T19:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-201.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/chinas-human-rights-record-an-achilles-heel-for-its-tech-ambitions/</loc>
		<lastmod>2020-10-13T20:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-202.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/peter-devitt-finds-buyer-for-21m-melbourne-hi-tech-penthouse/</loc>
		<lastmod>2020-10-13T21:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-203.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/multi-cloud-networking-and-security-to-run-google-anthos/</loc>
		<lastmod>2020-10-13T22:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-204.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/virginia-tech-partners-with-software-bootcamp-in-hopes-of-filling-virginias-cyber-job-gap/</loc>
		<lastmod>2020-10-13T23:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-205.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-employment-data-contradict-need-for-quick-h-1b-visa-rules/</loc>
		<lastmod>2020-10-14T00:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-206.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/your-technology-is-tracking-you-take-these-steps-for-better-online-privacy/</loc>
		<lastmod>2020-10-14T01:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-207.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/inside-singapores-huge-bet-on-vertical-farming/</loc>
		<lastmod>2020-10-14T02:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-208.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/best-prime-day-deals-on-smart-lighting-security-cams-and-other-smart-home-gear/</loc>
		<lastmod>2020-10-14T03:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-209.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ai-commission-recommends-powerful-ctos-to-prep-for-great-power-competition/</loc>
		<lastmod>2020-10-14T11:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-210.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/prime-day-2020-simplisafe-deals-save-100-or-more-on-a-home-security-system/</loc>
		<lastmod>2020-10-14T12:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-211.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/trickbot-botnet-survives-takedown-attempt-but-microsoft-sets-new-legal-precedent/</loc>
		<lastmod>2020-10-14T13:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-212.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/oregon-fbis-tech-tuesday-cybersecurity-awareness-month-tips-info/</loc>
		<lastmod>2020-10-14T15:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-213.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cdw-tech-talk-driving-business-success-while-ensuring-security/</loc>
		<lastmod>2020-10-14T16:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-214.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/update-windows-display-drivers-soon-for-security-fix/</loc>
		<lastmod>2020-10-14T17:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-215.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/national-security-science-and-tech-priorities-updated/</loc>
		<lastmod>2020-10-14T18:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-216.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/privacy-security-stakeholders-and-the-information-governance-reference-model/</loc>
		<lastmod>2020-10-14T19:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-217.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/it-security-tech-support-ust-global-malaysia-sdn-bhd-4404134/</loc>
		<lastmod>2020-10-14T20:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-218.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/mark-zuckerberg-priscilla-chan-donate-100m-to-help-election-security/</loc>
		<lastmod>2020-10-14T21:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-219.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/leading-viet-tech-group-fpt-software-ups-code-quality-and-security-with-synopsys-solutions/</loc>
		<lastmod>2020-10-14T22:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-220.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-fund-inflows-have-national-security-risks/</loc>
		<lastmod>2020-10-14T23:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-221.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/eduroam-wifi-requires-users-to-accept-new-security-certificate/</loc>
		<lastmod>2020-10-15T00:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-222.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-do-you-make-cyber-security-tech-buying-decisions-heres-what-your-peers-say/</loc>
		<lastmod>2020-10-15T01:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-223.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-geopolitical-impact-of-clean-energy-transitions/</loc>
		<lastmod>2020-10-15T02:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-224.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-officer-for-digital-tech-site-allied-universal/</loc>
		<lastmod>2020-10-15T03:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-225.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/chinas-xi-promises-changes-to-promote-tech-center-shenzhen/</loc>
		<lastmod>2020-10-15T04:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-226.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-tuesday-cyber-security-awareness-month/</loc>
		<lastmod>2020-10-15T05:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-227.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/credence-security-joins-with-colortokens-to-bring-a-modern-security-approach-to-enterprises/</loc>
		<lastmod>2020-10-15T06:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-228.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/us-body-on-ai-calls-for-creating-india-us-strategic-tech-alliance/</loc>
		<lastmod>2020-10-15T07:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-229.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/managed-security-services-provider-mssp-news-15-october-2020/</loc>
		<lastmod>2020-10-16T06:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-230.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sbg-to-extend-va-mobile-tech-mgmt-support-carlos-del-toro-quoted/</loc>
		<lastmod>2020-10-16T07:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-231.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/full-session-the-era-of-flux-and-transformation-for-security-strategies/</loc>
		<lastmod>2020-10-16T08:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-232.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/imda-sets-security-standards-to-keep-remote-workers-safe/</loc>
		<lastmod>2020-10-16T09:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-233.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/qualcomm-announces-photo-verification-tool/</loc>
		<lastmod>2020-10-16T10:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-234.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security/</loc>
		<lastmod>2020-10-16T11:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-235.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fcc-usaid-partner-to-advance-us-5g-security-policy/</loc>
		<lastmod>2020-10-16T12:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-236.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/twitter-hack-analysis-drives-calls-for-greater-security-regulation/</loc>
		<lastmod>2020-10-16T13:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-237.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-can-artificial-intelligence-help-in-the-fight-to-remain-secure/</loc>
		<lastmod>2020-10-16T14:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-238.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/why-you-should-consider-updating-your-access-control-system/</loc>
		<lastmod>2020-10-16T15:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-239.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/irish-co-founded-tech-company-sonrai-secures-20m-in-funding/</loc>
		<lastmod>2020-10-16T16:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-240.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/why-cyberattack-misattribution-is-our-top-election-security-threat/</loc>
		<lastmod>2020-10-16T17:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-241.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/opinion-coal-from-hampton-roads-serves-nations-interests/</loc>
		<lastmod>2020-10-16T18:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-242.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-set-to-pass-law-protecting-vital-tech-from-us/</loc>
		<lastmod>2020-10-16T19:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-243.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/twitter-suffered-widespread-service-disruption-says-there-is-no-evidence-of-security-breach-or/</loc>
		<lastmod>2020-10-16T20:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-244.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/san-jose-ciso-on-security-and-privacy-after-2020/</loc>
		<lastmod>2020-10-16T21:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-245.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/working-remotely-u-of-t-tech-resources-have-you-covered/</loc>
		<lastmod>2020-10-16T22:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-246.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/network-engineer/</loc>
		<lastmod>2020-10-16T23:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-247.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/id-verification-benefits-both-consumers-and-ecommerce-sites/</loc>
		<lastmod>2020-10-17T00:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-248.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/linkshadow-named-user-behavior-analytics-security-solution-of-the-year/</loc>
		<lastmod>2020-10-17T01:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-249.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/idis-virtual-showcase-2020-to-feature-latest-innovations/</loc>
		<lastmod>2020-10-17T02:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-250.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/pentagon-inks-197-million-in-contracts-for-microelectronics/</loc>
		<lastmod>2020-10-17T03:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-251.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/also-noted/</loc>
		<lastmod>2020-10-17T04:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-252.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fuzzing-fuzz-testing-tutorial-what-it-is-and-how-can-it-improve-application-security/</loc>
		<lastmod>2020-10-17T05:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-253.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/navy-coast-guard-onboarding-artificial-intelligence-tech/</loc>
		<lastmod>2020-10-17T06:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-254.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-helps-scsd3-requests-additional-funding-for-technology-infrastructure-maintenance/</loc>
		<lastmod>2020-10-17T07:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-255.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/zoom-and-twitter-meeting-security-refresher/</loc>
		<lastmod>2020-10-17T08:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-256.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-is-elasticsearch-and-why-is-it-involved-in-so-many-data-leaks/</loc>
		<lastmod>2020-10-17T09:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-257.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/reports-accelerating-digital-transformation-a-top-priority/</loc>
		<lastmod>2020-10-17T10:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-258.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/5-companies-that-came-to-win-this-week/</loc>
		<lastmod>2020-10-17T11:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-259.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/transact-technologies-completes-9-8-million-public-offering-of-common-stock-including-full/</loc>
		<lastmod>2020-10-17T12:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-260.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-i-learned-from-devsecops-leaders-in-a-high-tech-world/</loc>
		<lastmod>2020-10-17T13:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-261.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/maynard-public-schools-tech-department-makes-sure-students-have-access-to-school/</loc>
		<lastmod>2020-10-17T14:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-262.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/rapidsos-companions-create-free-public-security-tech-service/</loc>
		<lastmod>2020-10-17T15:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-263.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-officer-high-tech-facility/</loc>
		<lastmod>2020-10-17T16:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-264.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/considering-going-back-to-school-for-cyber-security-security-tech/</loc>
		<lastmod>2020-10-17T17:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-265.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/google-chinese-government-linked-hackers-use-mcafee-to-install-malware-to-victims-devices/</loc>
		<lastmod>2020-10-17T18:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-266.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/information-security-tech-lead-analyst-vp/</loc>
		<lastmod>2020-10-17T19:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-267.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/crpf-collaborates-with-iit-delhi-drdo-jatc-to-augment-rd-capabilities/</loc>
		<lastmod>2020-10-17T20:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-268.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/eden-amitai-radware-how-ddos-cybersecurity-protection-and-gaming-integrate/</loc>
		<lastmod>2020-10-17T21:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-269.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/silicon-valleys-workforce-is-feeling-more-burned-out-than-before-the-pandemic-with-nearly-70/</loc>
		<lastmod>2020-10-17T22:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-270.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/crpf-inks-mou-with-iit-delhi-drdo-to-prepare-tech-experts-from-among-force/</loc>
		<lastmod>2020-10-17T23:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-271.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dont-let-the-pandemic-launch-your-new-product-for-you/</loc>
		<lastmod>2020-10-18T00:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-272.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/windows-users-theres-an-unscheduled-security-patch-that-fixes-critical-bugs-update-now/</loc>
		<lastmod>2020-10-18T01:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-273.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/reforms-in-mining-are-a-first-step-in-ushering-a-green-tech-driven-future/</loc>
		<lastmod>2020-10-18T02:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-274.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/global-smart-home-security-system-market-exhibits-a-lucrative-growth-potential-and-reveals/</loc>
		<lastmod>2020-10-18T03:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-275.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/microsoft-ends-support-for-office-2010-points-people-to-office-365/</loc>
		<lastmod>2020-10-18T04:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-276.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-to-create-an-electronic-signature-free-online-with-signature-generator/</loc>
		<lastmod>2020-10-18T05:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-277.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-global-warming-might-affect-food-security/</loc>
		<lastmod>2020-10-18T06:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-278.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-week-that-was-all-of-lawfare-in-one-post/</loc>
		<lastmod>2020-10-18T07:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-279.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/exchange-classic-hybrid-connection-security/</loc>
		<lastmod>2020-10-18T08:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-280.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/emergency-management-and-homeland-security-masters-degree/</loc>
		<lastmod>2020-10-18T09:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-281.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/pandemic-causes-deep-cuts-to-san-diego-refugees-income-housing-security-healthcare/</loc>
		<lastmod>2020-10-18T10:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-282.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/troll-watch-how-tech-is-cracking-down-on-election-disinformation/</loc>
		<lastmod>2020-10-18T11:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-283.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sushi-chain-starts-contactless-service-as-pandemic-grinds-on/</loc>
		<lastmod>2020-10-18T12:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-284.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/women-transitioning-from-incarceration-may-face-tech-challenges/</loc>
		<lastmod>2020-10-18T13:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-285.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/half-of-cybersecurity-staff-taken-off-security-duties/</loc>
		<lastmod>2020-10-18T14:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-286.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/covid-19-has-destroyed-millions-of-jobs-its-time-to-reskill-america/</loc>
		<lastmod>2020-10-18T15:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-287.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-smart-devices-are-exploited-for-domestic-abuse/</loc>
		<lastmod>2020-10-18T16:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-288.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tip-router-security-test-pages/</loc>
		<lastmod>2020-10-18T17:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-289.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/upcoming-events-for-the-week-of-oct-18-2020/</loc>
		<lastmod>2020-10-18T18:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-290.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/singapores-world-first-face-scan-plan-sparks-privacy-fears/</loc>
		<lastmod>2020-10-18T19:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-291.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/google-stops-biggest-ever-ddos-cyber-attack-to-date/</loc>
		<lastmod>2020-10-18T20:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-292.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/microsoft-fixes-two-new-windows-bugs-in-latest-security-update/</loc>
		<lastmod>2020-10-18T21:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-293.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/singapores-world-first-face-scan-plan-sparks-privacy-fears-2/</loc>
		<lastmod>2020-10-18T22:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-294.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/supervisor-information-security-pb481/</loc>
		<lastmod>2020-10-18T23:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-295.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-passes-export-law-protecting-national-security-covering-tech/</loc>
		<lastmod>2020-10-19T00:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-296.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-passes-export-law-protecting-national-security-covering-tech-2/</loc>
		<lastmod>2020-10-19T01:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-297.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/amazon-needs-this-wireless-in-flight-drone-recharging-tech-for-prime-air/</loc>
		<lastmod>2020-10-19T02:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-298.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-passes-export-law-protecting-national-security-covering-tech-3/</loc>
		<lastmod>2020-10-19T03:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-299.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/3-accelerators-solving-covid-19s-cybersecurity-crunch/</loc>
		<lastmod>2020-10-19T05:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-300.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-talk-cybersecurity-the-importance-of-security-in-a-digital-world/</loc>
		<lastmod>2020-10-19T06:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-301.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-tech-talks-daily-podcast-agile-security-in-remote-working-environments-on-apple-podcasts/</loc>
		<lastmod>2020-10-19T07:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-302.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/semiconductor-shortfall-america-is-willingly-ceding-the-technology-race-to-asia/</loc>
		<lastmod>2020-10-19T08:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-303.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/jntuh-gets-govt-nod-for-starting-new-emerging-tech-courses-in-ug/</loc>
		<lastmod>2020-10-19T09:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-304.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/covid-19-crushes-fingerprint-reader-market/</loc>
		<lastmod>2020-10-19T10:43:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-305.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-lawmakers-pass-export-control-law-to-protect-tech/</loc>
		<lastmod>2020-10-19T11:43:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-306.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/strategic-elements-leverages-robotics-technology-to-address-a-us34-5-billion-market/</loc>
		<lastmod>2020-10-19T12:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-307.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tiag-wins-contract-with-naval-facilities-engineering-and-expeditionary-warfare-center/</loc>
		<lastmod>2020-10-19T13:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-308.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/xi-highlights-crucial-role-of-quantum-tech/</loc>
		<lastmod>2020-10-19T14:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-309.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cycraft-jp-releases-ai-driven-detection-response-security-platform-mri-and-ines-set-to/</loc>
		<lastmod>2020-10-19T15:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-310.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/treating-the-underlying-causes-of-healthcares-cyber-security-symptoms/</loc>
		<lastmod>2020-10-19T16:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-311.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/interview-with-daniela-haarhuis-security-cant-be-achieved-through-the-violation-of-human-rights/</loc>
		<lastmod>2020-10-19T17:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-312.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/use-of-tech-new-security-grid-in-kashmir-substantially-cut-infiltration-from-pakistan/</loc>
		<lastmod>2020-10-19T18:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-313.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/apples-iphone-12-livestream-was-noticeably-missing-from-chinese-social-media/</loc>
		<lastmod>2020-10-19T19:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-314.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-telecom-weekly-newsletter-october-19-2020/</loc>
		<lastmod>2020-10-19T20:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-315.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/japan-to-export-defense-tech-to-vietnam-under-new-agreement/</loc>
		<lastmod>2020-10-19T21:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-316.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/national-cyber-security-awareness-month/</loc>
		<lastmod>2020-10-19T22:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-317.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/socialblock-technology-that-could-improve-data-security-in-smart-cities/</loc>
		<lastmod>2020-10-19T23:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-318.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/users-to-make-room-for-transformative-tech/</loc>
		<lastmod>2020-10-20T00:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-319.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-passes-law-to-safeguard-national-security-sensitive-tech/</loc>
		<lastmod>2020-10-20T01:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-320.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/latest-cyber-security-tech-news-page-8-of-8-cybernews/</loc>
		<lastmod>2020-10-20T02:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-321.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-is-napco-security-technologies-inc-s-nasdaqnssc-share-price-doing/</loc>
		<lastmod>2020-10-20T03:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-322.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/innovation-is-about-to-get-political/</loc>
		<lastmod>2020-10-20T04:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-323.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/best-buy-taps-accenture-for-diversity-hiring-technology-innovation/</loc>
		<lastmod>2020-10-20T05:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-324.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/threat-detection-platform-developer-pivots-to-allow-businesses-to-safely-reopen/</loc>
		<lastmod>2020-10-20T06:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-325.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-to-protect-operational-technology-in-smart-cities/</loc>
		<lastmod>2020-10-20T07:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-326.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/combating-disinformation-campaigns-ahead-of-2020-election/</loc>
		<lastmod>2020-10-20T08:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-327.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/britain-unveils-strategy-to-gain-a-technological-advantage-over-adversaries/</loc>
		<lastmod>2020-10-20T09:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-328.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/city-tech-manager-named-to-ontario-expert-panel-on-cyber-security/</loc>
		<lastmod>2020-10-20T10:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-329.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fortinet-fortiwifi-30d-firewall-router-security-appliance-fwf-30d-fort/</loc>
		<lastmod>2020-10-20T11:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-330.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/solarium-commission-looks-to-boot-china-from-the-tech-supply-chain/</loc>
		<lastmod>2020-10-20T12:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-331.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/gartners-strategic-tech-trends-for-2021-turn-pragmatic/</loc>
		<lastmod>2020-10-20T13:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-332.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/12-big-tech-trends-entrepreneurs-are-excited-about/</loc>
		<lastmod>2020-10-20T14:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-333.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sacramento-hispanic-chamber-launches-tech-assistance-program-for-minority-owned-businesses/</loc>
		<lastmod>2020-10-20T15:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-334.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-is-not-a-game-normally-dtns-3889/</loc>
		<lastmod>2020-10-20T16:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-335.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/federal-commission-issues-recommendations-for-securing-critical-tech-against-chinese-threats/</loc>
		<lastmod>2020-10-20T17:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-336.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/job-configuration-manager-with-security-clearance-yahya-technologies-llc/</loc>
		<lastmod>2020-10-20T18:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-337.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/climate-change-cutting-edge-technology-will-enhance-food-security/</loc>
		<lastmod>2020-10-20T19:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-338.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/google-discontinues-nest-secure-here-are-the-best-security-system-alternatives/</loc>
		<lastmod>2020-10-20T20:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-339.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-tuesday-cloud-security-monitoring-and-threat-hunting/</loc>
		<lastmod>2020-10-20T21:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-340.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/green-bay-debuts-five-new-ballot-drop-off-boxes-throughout-the-city/</loc>
		<lastmod>2020-10-20T22:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-341.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/internet-technology-and-military-power-next-g-alliance-and-6g-secret-service-agent-on-cyber/</loc>
		<lastmod>2020-10-20T23:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-342.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/form-4-a-terra-tech-corp/</loc>
		<lastmod>2020-10-21T00:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-343.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/improving-iot-security-in-the-connected-economy/</loc>
		<lastmod>2020-10-21T01:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-344.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/another-class-action-filed-against-pindrop-security-amazon-web-services-for-bipa-violations/</loc>
		<lastmod>2020-10-21T02:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-345.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/more-than-109000-people-are-currently-waiting-to-get-a-donor-organ-in-the-united-states-last-year/</loc>
		<lastmod>2020-10-21T03:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-346.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/stqv-tech-security-on-github/</loc>
		<lastmod>2020-10-21T04:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-347.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-property-managers-need-to-know-about-cyber-security/</loc>
		<lastmod>2020-10-21T05:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-348.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nsa-warns-china-exploits-25-vulnerabilities-us-uk-accuse-gru-of-high-profile-hacks-us-anti/</loc>
		<lastmod>2020-10-21T06:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-349.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/egnyte-introduces-new-features-to-help-deal-with-security-governance-during-pandemic/</loc>
		<lastmod>2020-10-21T07:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-350.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/microsoft-further-disrupts-botnet-after-initial-efforts-showed-limited-effect/</loc>
		<lastmod>2020-10-21T08:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-351.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/pickering-americas-tech-giants-are-not-the-problem-and-antitrust-is-not-the-solution/</loc>
		<lastmod>2020-10-21T09:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-352.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-two-keys-to-election-security/</loc>
		<lastmod>2020-10-21T10:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-353.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cybersecurity-and-a-potential-biden-white-house-past-tech-priorities-resurrected/</loc>
		<lastmod>2020-10-21T11:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-354.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fastlys-virtual-customer-conference-empowers-developers-and-security-professionals-to-build/</loc>
		<lastmod>2020-10-21T12:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-355.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/blackberry-or-okta-which-security-stock-should-you-own/</loc>
		<lastmod>2020-10-21T13:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-356.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/whom-can-we-trust-to-safeguard-healthcare-data/</loc>
		<lastmod>2020-10-21T14:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-357.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/report-establish-ctos-in-every-national-security-agency/</loc>
		<lastmod>2020-10-21T15:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-358.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/watch-live-major-tech-themes-set-the-stage-for-dell-technologies-world-digital-experience-2020/</loc>
		<lastmod>2020-10-21T16:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-359.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/backed-by-fresh-funding-sourced-group-launches-cloud-security-spin-off/</loc>
		<lastmod>2020-10-21T17:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-360.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/hillicon-valley-department-of-justice-sues-google-house-republicans-push-for-tech-bias-hearing/</loc>
		<lastmod>2020-10-21T18:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-361.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/as-election-nears-government-and-tech-firms-push-back-on-russia-and-trump/</loc>
		<lastmod>2020-10-21T19:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-363.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/computer-systems-security-analyst/</loc>
		<lastmod>2020-10-21T20:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-364.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ways-to-invest-in-mobile-security/</loc>
		<lastmod>2020-10-21T21:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-365.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/walmart-reels-in-former-jones-day-partner-with-tech-savvy/</loc>
		<lastmod>2020-10-21T22:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-366.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/google-sued-by-doj-over-antitrust-practices-what-you-need-to-know/</loc>
		<lastmod>2020-10-21T23:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-367.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/international-recognition-for-certis-covid-19-campaign-in-singapore/</loc>
		<lastmod>2020-10-22T00:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-368.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nsa-list-shows-chinese-hackers-exploiting-25-different-security-bug-vulnerabilities/</loc>
		<lastmod>2020-10-22T01:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-369.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-officer-tech-company-job-in-bellevue-wa-at-allied-universal/</loc>
		<lastmod>2020-10-22T02:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-370.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-security-logo/</loc>
		<lastmod>2020-10-22T03:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-371.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/microsoft-takes-another-bite-at-trickbot-cisa-offers-rumor-control-cyberspace-solarium-on-supply/</loc>
		<lastmod>2020-10-22T04:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-372.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/greenfield-awarded-election-security-grant-of-over-9000/</loc>
		<lastmod>2020-10-22T05:55:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-373.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/beijing-restricts-exports-related-to-national-security-china-joins-covax/</loc>
		<lastmod>2020-10-22T06:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-374.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-enforce-2020-deploy-anywhere-protect-everywhere/</loc>
		<lastmod>2020-10-22T07:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-375.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/google-ai-tech-will-be-used-for-virtual-border-wall-cbp-contract-shows/</loc>
		<lastmod>2020-10-22T08:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-376.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/latest-tech-to-improve-secretariat-security/</loc>
		<lastmod>2020-10-22T09:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-377.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/new-security-tech-at-pittsburgh-airport-means-no-more-dragging-that-laptop-out-to-be-scanned/</loc>
		<lastmod>2020-10-22T10:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-378.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-managed-security-services-helps-drive-digital-transformation-in-higher-education/</loc>
		<lastmod>2020-10-22T11:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-379.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/paubox-announces-tech-upgrade-at-annual-security-conference/</loc>
		<lastmod>2020-10-22T12:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-380.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/info-security-leader-state-bolstering-innovation-with-privacy-and-security/</loc>
		<lastmod>2020-10-22T13:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-381.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sensitive-healthcare-data-needs-zero-knowledge-tech-for-security/</loc>
		<lastmod>2020-10-22T14:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-382.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/chatham-county-board-of-elections-explains-early-absentee-ballot-scanning-process-security/</loc>
		<lastmod>2020-10-22T15:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-383.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/swat-team-of-nerds-tackles-tough-tech-challenges/</loc>
		<lastmod>2020-10-22T16:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-384.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-flex-officer-tech-site-job-in-san-francisco-ca-at-allied-universal/</loc>
		<lastmod>2020-10-22T17:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-385.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-and-tech-oversight-engineer-job-opening-in-scottsdale-arizona/</loc>
		<lastmod>2020-10-22T18:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-386.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/2020-ceos-of-the-year-orlando-tech-exec-oversaw-explosive-growth-in-firms-cybersecurity-division/</loc>
		<lastmod>2020-10-22T19:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-387.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/rb-tech-security-and-technical-solutions/</loc>
		<lastmod>2020-10-22T20:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-388.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/information-system-security-officer/</loc>
		<lastmod>2020-10-22T21:55:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-389.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-state-of-secops-its-time-to-think-beyond-the-soc/</loc>
		<lastmod>2020-10-22T22:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-390.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-analyst-engineer/</loc>
		<lastmod>2020-10-22T23:55:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-391.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/24-7-tech-solutions/</loc>
		<lastmod>2020-10-23T00:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-392.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/gwinnett-receives-4-2m-in-grants-for-election-security-coronavirus-safety/</loc>
		<lastmod>2020-10-23T01:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-393.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/titletowntech-is-investing-in-synthetaic-an-artificial-intelligence-data-company-based-in-delafield/</loc>
		<lastmod>2020-10-23T02:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-394.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/is-the-cybersecurity-industry-selling-companies-lemons-apparently-lots-of-important-cisos/</loc>
		<lastmod>2020-10-23T03:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-395.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-reliant-corp-selected-as-technology-company-of-the-year/</loc>
		<lastmod>2020-10-23T04:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-396.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/www-fasjobs-com-senior-security-tech-fireandsecurityjobs-net-facebook/</loc>
		<lastmod>2020-10-23T05:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-397.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/virtu-taps-former-ibm-watson-executive-dana-morris-and-former-ericsson-executive-will-peppo/</loc>
		<lastmod>2020-10-23T06:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-398.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-online-security-threats-hurt-work-from-home-businesses/</loc>
		<lastmod>2020-10-23T07:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-399.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-conference-calendar-for-2020-and-2021-whats-cancelled-whats-not-and-whats-digital-due/</loc>
		<lastmod>2020-10-23T08:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-400.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/mcdonalds-corporation-staff-security-engineer-mcd-tech-labs/</loc>
		<lastmod>2020-10-23T09:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-401.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/final-judgment-issued-in-secs-suit-against-kin-ico/</loc>
		<lastmod>2020-10-23T10:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-402.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/outcomes-must-come-first-in-security-then-technology-says-cyber-firm-ceo/</loc>
		<lastmod>2020-10-23T11:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-403.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nist-needs-tech-providers-help-developing-zero-trust-practice-guide/</loc>
		<lastmod>2020-10-23T12:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-404.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/senior-security-engineer-fintech-id-1305446/</loc>
		<lastmod>2020-10-23T13:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-405.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cio-leadership-world-class-female-technology-executives-discuss-success-leadership-at/</loc>
		<lastmod>2020-10-23T14:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-406.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/mastercard-addresses-digital-demands-and-security-in-asia/</loc>
		<lastmod>2020-10-23T15:55:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-security-a-key-enabler-of-a-digital-economy/</loc>
		<lastmod>2020-10-23T16:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-407.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-hopes-for-change-if-biden-wins-but-little-likely/</loc>
		<lastmod>2020-10-23T17:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-408.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-hopes-for-change-if-biden-wins-but-little-likely-2/</loc>
		<lastmod>2020-10-23T18:55:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-409.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/reducing-identity-and-access-security-risks-in-cloud-infrastructures-a-guide/</loc>
		<lastmod>2020-10-23T19:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-410.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/protegrity-assembles-new-leadership-team-to-address-the-next-frontier-of-data-security/</loc>
		<lastmod>2020-10-23T20:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-411.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-technology-202-bidens-pledge-to-dreamers-highlights-stark-contrast-with-trump-over/</loc>
		<lastmod>2020-10-23T21:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-412.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nga-offers-cash-prizes-for-tech-that-can-identify-a-location-by-its-sound/</loc>
		<lastmod>2020-10-23T22:55:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-413.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-5-principles-of-zero-trust-security/</loc>
		<lastmod>2020-10-23T23:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-414.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/microsoft-msft-unveils-space-ambitions/</loc>
		<lastmod>2020-10-24T00:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-415.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ai-security-this-project-aims-to-spot-attacks-against-critical-systems-before-they-happen/</loc>
		<lastmod>2020-10-24T01:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-416.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-solutions-from-samsung-help-small-businesses-adjust-to-the-new-normal/</loc>
		<lastmod>2020-10-24T02:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-417.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/jsx-pulls-jet-service-targeting-tech-travelers-out-of-seattle-after-demand-suffers-during-pandemic/</loc>
		<lastmod>2020-10-24T03:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-418.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/best-practices-for-securing-your-online-classrooms/</loc>
		<lastmod>2020-10-24T04:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-419.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/skywater-commissions-department-of-defense-funded-facility-expansion-with-ribbon-cutting/</loc>
		<lastmod>2020-10-24T05:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-420.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/lessons-to-tech-leaders-and-insights-from-forbes-cio-newsletter-subscribers-amid-digital/</loc>
		<lastmod>2020-10-24T06:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-421.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/skywater-commissions-department-of-defense-funded-facility-expansion-with-ribbon-cutting-2/</loc>
		<lastmod>2020-10-24T07:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-422.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/univ-of-tennessee-deploys-allegion-cbord-contactless-mobile-ids/</loc>
		<lastmod>2020-10-24T08:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-423.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/top-5-security-hacks-for-ios-14-and-android-11/</loc>
		<lastmod>2020-10-24T09:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-424.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/enterprise-security-in-the-coronavirus-pandemic-era-how-to-support-remote-work/</loc>
		<lastmod>2020-10-24T10:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-425.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/application-security-engineer/</loc>
		<lastmod>2020-10-24T11:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-426.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-3-biggest-remote-work-security-priorities-that-matter-to-it-teams/</loc>
		<lastmod>2020-10-24T12:55:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-427.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-week-in-review-october-23-2020/</loc>
		<lastmod>2020-10-24T13:55:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-428.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/bulgaria-kosovo-north-macedonia-join-us-initiative-to-block-chinese-equipment-in-5g-network/</loc>
		<lastmod>2020-10-24T14:55:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-429.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/is-louisiana-tech-in-must-win-mode-at-utsa/</loc>
		<lastmod>2020-10-24T15:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-430.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-security-literacy-spore-ranks-2nd-in-study-tech-news-top-stories/</loc>
		<lastmod>2020-10-24T16:55:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-431.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/download-jason-coombs-microsoft-internet-information-services-security-technical-reference/</loc>
		<lastmod>2020-10-24T17:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-432.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/hi-tech-security/</loc>
		<lastmod>2020-10-24T18:55:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/as-us-election-approaches-new-york-times-intensifies-its-anti-russia-disinformation-campaign/</loc>
		<lastmod>2020-10-24T19:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-433.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/mozilla-throttles-rollout-of-firefox-82-update/</loc>
		<lastmod>2020-10-24T20:55:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-434.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/bloomberg-new-economy-semiconductors-are-chinas-choke-point/</loc>
		<lastmod>2020-10-24T21:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-435.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-technician-overnight-position/</loc>
		<lastmod>2020-10-24T22:55:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-436.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/manjoo-how-to-break-the-hold-of-conspiracy-theories/</loc>
		<lastmod>2020-10-24T23:55:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-437.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/building-a-new-digitalised-world-through-technology-centrism/</loc>
		<lastmod>2020-10-25T00:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-438.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/did-a-security-researcher-guess-trumps-twitter-password/</loc>
		<lastmod>2020-10-25T01:55:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-439.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-best-cuba-vpn-in-2020/</loc>
		<lastmod>2020-10-25T02:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-440.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/why-fake-news-may-soon-be-harder-to-find-and-why-social-media-companies-are-dealing-with-it/</loc>
		<lastmod>2020-10-25T03:55:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-441.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/as-trump-casts-doubt-on-election-integrity-new-security-agency-contradicts-him/</loc>
		<lastmod>2020-10-25T04:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-442.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/4-ways-to-use-technology-against-the-pandemic/</loc>
		<lastmod>2020-10-25T05:55:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-443.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/100-remote-iam-security-business-analyst-requirements-gathering-tech-at-group-nine/</loc>
		<lastmod>2020-10-25T06:55:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-444.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/minicam-market-research-with-size-growth-key-players-segments-and-forecasts-analysis-2020/</loc>
		<lastmod>2020-10-25T07:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-445.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-for-security-id-archives/</loc>
		<lastmod>2020-10-25T08:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-446.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-intrusion/</loc>
		<lastmod>2020-10-25T09:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-447.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/readers-choice-2020-house-and-home/</loc>
		<lastmod>2020-10-25T10:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-448.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dangerous-times-but-lots-of-ways-to-protect-yourself-against-digital-intruders/</loc>
		<lastmod>2020-10-25T11:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-449.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/samsungs-lee-tainted-titan-who-built-a-global-tech-giant/</loc>
		<lastmod>2020-10-25T12:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-450.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/obituary-samsungs-lee-tainted-titan-who-built-a-global-tech-giant/</loc>
		<lastmod>2020-10-25T13:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-451.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/pompeo-esper-to-push-trumps-anti-china-message-in-india/</loc>
		<lastmod>2020-10-25T14:55:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-452.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/global-security-narcotics-detectors-market-2020-trends-analysis-and-covid-19-effect-analysis/</loc>
		<lastmod>2020-10-25T15:55:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/windows-10-20h2-key-features-and-installation-videos/</loc>
		<lastmod>2020-10-25T16:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-453.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/part-4370/</loc>
		<lastmod>2020-10-25T17:55:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-joy-of-tech-google-needs-apple/</loc>
		<lastmod>2020-10-25T18:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-454.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/mcafee-secure-product-investment-not-so-much/</loc>
		<lastmod>2020-10-25T19:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-455.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/microsoft-wants-to-make-sure-we-dont-fall-victim-to-murderous-ai/</loc>
		<lastmod>2020-10-25T20:55:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-456.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/infinidomes-anti-jamming-tech-integrated-by-easy-aerial-for-drone-ops/</loc>
		<lastmod>2020-10-25T21:55:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-457.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/it-service-management-company-acquires-tech-firm/</loc>
		<lastmod>2020-10-25T22:56:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-458.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/chipmaker-imagination-technologies-kicks-off-strategic-review/</loc>
		<lastmod>2020-10-25T23:56:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/simple-ways-to-save-photos-and-get-them-off-your-phone/</loc>
		<lastmod>2020-10-26T00:55:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-459.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-security-advice-from-industry-experts-for-businesses-in-a-pandemic-world/</loc>
		<lastmod>2020-10-26T01:56:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-460.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/it-solutions-to-keep-your-data-safe-and-remotely-accessible/</loc>
		<lastmod>2020-10-26T02:55:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-461.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-security/</loc>
		<lastmod>2020-10-26T03:56:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-462.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/10-25-2020-news-commentary-national-security/</loc>
		<lastmod>2020-10-26T04:55:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-463.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-weiyangx-fintech-review/</loc>
		<lastmod>2020-10-26T05:55:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-464.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/report-what-cisos-think-of-the-new-normal/</loc>
		<lastmod>2020-10-26T06:55:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-465.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/optus-enhances-secure-sd-wan-offering-to-australian-enterprises/</loc>
		<lastmod>2020-10-26T07:55:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-466.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-to-secure-your-business-against-ddos-attacks/</loc>
		<lastmod>2020-10-26T08:55:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-467.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/make-sure-your-connected-devices-are-secure-six-tips/</loc>
		<lastmod>2020-10-26T09:55:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-468.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/gearing-up-for-the-global-5g-revolution/</loc>
		<lastmod>2020-10-26T10:55:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-469.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/system-analyst-infra-network-security-splunksiem6500-7500-tech-mnc/</loc>
		<lastmod>2020-10-26T11:55:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-470.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/digital-sovereignty-in-a-time-of-conflict/</loc>
		<lastmod>2020-10-26T12:55:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-471.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/india-japan-look-to-asean-to-tighten-continental-cybersecurity-co-op/</loc>
		<lastmod>2020-10-26T13:55:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-it-investment-priorities-shaping-todays-school-districts/</loc>
		<lastmod>2020-10-26T14:55:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/when-working-from-home-wasnt-an-option-how-employers-try-to-make-working-from-work-safer/</loc>
		<lastmod>2020-10-26T15:55:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/quick-heal-technologies-appoints-global-experts-to-accelerate-innovation-in-cybersecurity/</loc>
		<lastmod>2020-10-26T16:55:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/saic-to-advance-warfighter-c2-tech-support-under-878m-gsa-task-order-michael-larouche/</loc>
		<lastmod>2020-10-26T17:55:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/microsoft-ibm-nvidia-other-tech-companies-collaborate-to-launch-adversarial-ml-threat/</loc>
		<lastmod>2020-10-26T18:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-472.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/interview-the-security-queens-on-ncsam/</loc>
		<lastmod>2020-10-26T19:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-473.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ocd-tech-names-leslie-weinstein-as-the-new-head-of-its-cybersecurity-maturity-model/</loc>
		<lastmod>2020-10-26T20:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-474.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/5-minutes-with-joan-pepin-diversity-in-cybersecurity/</loc>
		<lastmod>2020-10-26T21:55:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-475.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/navy-seeks-autonomous-flight-safety-tech/</loc>
		<lastmod>2020-10-26T22:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-476.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/apples-iphone-magsafe-charger-could-ruin-your-credit-card-passport-or-security-badge/</loc>
		<lastmod>2020-10-26T23:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-477.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/second-half-of-2020-cybersecurity-trends/</loc>
		<lastmod>2020-10-27T00:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-478.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/top-10-ics-security-solutions/</loc>
		<lastmod>2020-10-27T01:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-479.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-moves-uw-hires-director-for-new-dod-program-microsoft-vet-joins-eqt-and-more/</loc>
		<lastmod>2020-10-27T02:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-480.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/immigration-law-firm-berry-appleman-leiden-is-a-tech-titans-award-finalist-for-corporate/</loc>
		<lastmod>2020-10-27T03:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-481.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/forrester-releases-privacy-and-cyber-security-predictions-for-2021/</loc>
		<lastmod>2020-10-27T04:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-482.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/xdr-the-next-evolution-in-endpoint-detection-and-response/</loc>
		<lastmod>2020-10-27T05:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-483.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/rethinking-technology-governance/</loc>
		<lastmod>2020-10-27T06:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-484.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sia-highlights-ai-predictive-analytics-and-contactless-tech-in-2021-megatrends-report/</loc>
		<lastmod>2020-10-27T07:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-485.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/enterprises-confident-chief-sustainability-officer-cso-will-improve-cybersecurity/</loc>
		<lastmod>2020-10-27T08:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-486.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/industry-voices-telemedicine-and-long-term-implications-for-hipaa-compliance/</loc>
		<lastmod>2020-10-27T09:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-487.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nswc-crane-technologies-assessed-from-across-dod-for-commercialization-in-nsins-defense/</loc>
		<lastmod>2020-10-27T10:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-488.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/watchdog-tracking-by-israels-security-service-is-invasive-ineffective-in-covid-fight/</loc>
		<lastmod>2020-10-27T11:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-489.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/when-you-vote-be-sure-to-check-your-election-security/</loc>
		<lastmod>2020-10-27T12:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-490.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/pae-aims-to-expand-tech-services-with-208m-acquisition/</loc>
		<lastmod>2020-10-27T13:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-491.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/heres-a-roundup-of-winners-from-tech-titans-20th-annual-awards-gala/</loc>
		<lastmod>2020-10-27T14:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-492.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/georgia-tech-and-pacific-northwest-national-laboratory-strengthen-research-ties/</loc>
		<lastmod>2020-10-27T15:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-493.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/stackhawk-automates-developer-security-tech-insider-presents/</loc>
		<lastmod>2020-10-27T16:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-494.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/experienced-alarm-tech-start-asap/</loc>
		<lastmod>2020-10-27T17:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-495.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/vicon-security-tech-support-2/</loc>
		<lastmod>2020-10-27T18:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-496.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-security-2/</loc>
		<lastmod>2020-10-27T19:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-497.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/secure-a-next-gen-tech-gig-live-webinar-recording/</loc>
		<lastmod>2020-10-27T20:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-498.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ntiva-and-southfield-capital-announce-the-strategic-acquisition-of-eguard-technology-services/</loc>
		<lastmod>2020-10-27T21:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-499.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/zero-trust-adoption-gains-traction-in-asia-pacific-not-a-minute-too-soon/</loc>
		<lastmod>2020-10-27T22:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-500.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/getting-started-with-bot-management/</loc>
		<lastmod>2020-10-27T23:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-501.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/junior-sap-security-administrator/</loc>
		<lastmod>2020-10-28T00:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-502.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/lightspeed-venture-partners-backs-theta-lakes-video-conferencing-security-tech-with-12-7-million/</loc>
		<lastmod>2020-10-28T01:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-503.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/digital-security-101-keeping-your-sme-business-safe-online/</loc>
		<lastmod>2020-10-28T02:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-504.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ivy-tech-students-from-valparaiso-campus-finish-second-in-national-cybersecurity-competition/</loc>
		<lastmod>2020-10-28T03:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-505.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/latest-cyber-security-tech-news-page-9-of-9-cybernews/</loc>
		<lastmod>2020-10-28T04:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-506.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-support-mobile-devices-laptops-security-camera-install/</loc>
		<lastmod>2020-10-28T05:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-507.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/guide-your-digital-native-children-with-tech-avast/</loc>
		<lastmod>2020-10-28T06:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-508.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/election-related-phishing-data-breaches-in-australia-the-us-finland-islamist-hacktivists-hit/</loc>
		<lastmod>2020-10-28T07:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-509.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/wyze-adds-weather-resistance-to-its-new-security-camera-keeps-20-price/</loc>
		<lastmod>2020-10-28T08:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-510.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-a-biden-presidency-would-slowly-change-us-policy-on-china/</loc>
		<lastmod>2020-10-28T09:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-511.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/why-is-the-cio-ciso-dynamic-strained/</loc>
		<lastmod>2020-10-28T10:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-512.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/national-security-interest-in-tech-continues-odni-seeks-info/</loc>
		<lastmod>2020-10-28T11:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-513.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/austins-eagle-eye-networks-raises-40-million-for-growth/</loc>
		<lastmod>2020-10-28T12:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-514.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sap-security-admin-junior/</loc>
		<lastmod>2020-10-28T13:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-515.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/citrix-expands-workspace-security-program-to-include-zero-trust-solutions/</loc>
		<lastmod>2020-10-28T14:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-516.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/small-business-month-workshop-3-tech-cyber-security/</loc>
		<lastmod>2020-10-28T15:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-517.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/home-security-tech-alarm-tech-2/</loc>
		<lastmod>2020-10-28T16:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-518.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/wyze-launches-version-3-of-its-20-security-camera/</loc>
		<lastmod>2020-10-28T17:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-519.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sacha-baron-cohen-shares-near-tech-glitch-intense-security-around-giuliani/</loc>
		<lastmod>2020-10-28T18:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-520.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/vicon-security-tech-support-3/</loc>
		<lastmod>2020-10-28T19:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-521.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/global-iot-identity-access-management-market-insights-report-2020-2026-oracle-corporation/</loc>
		<lastmod>2020-10-28T20:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-522.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nsw-adopts-ibms-open-p-tech-platform-to-bolster-pipeline-of-cyber-security-experts/</loc>
		<lastmod>2020-10-28T21:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-523.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cloud-security-and-compliance-specialist-fedramp-tech-role/</loc>
		<lastmod>2020-10-28T22:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-524.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/lightspeed-venture-partners-backs-theta-lakes-video-conferencing-security-tech-with-12-7-million-2/</loc>
		<lastmod>2020-10-28T23:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-525.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-tech-a-complete-guide-2019-edition/</loc>
		<lastmod>2020-10-29T00:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-526.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/simplified-cisco-security-now-with-sase-zero-trust-xdr/</loc>
		<lastmod>2020-10-29T01:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-527.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/microsoft-says-iranian-hackers-targeted-security-conference-attendees/</loc>
		<lastmod>2020-10-29T02:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-528.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/part-two-huawei-enlists-russian-talent-and-technology-to-ensure-future-innovation/</loc>
		<lastmod>2020-10-29T03:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-529.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/boldon-james-and-infodas-partner-to-deliver-an-end-to-end-solution-for-email-messages/</loc>
		<lastmod>2020-10-29T04:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-530.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/medical-device-security-stymied-by-legacy-tech-flawed-segmentation/</loc>
		<lastmod>2020-10-29T05:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-531.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/5q-cybers-veronica-unnikrishnan-named-dallas-business-journal-women-in-technology-honoree/</loc>
		<lastmod>2020-10-29T06:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-532.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/vsblty-provides-biometric-smart-signage-tech-for-guatemala-airport/</loc>
		<lastmod>2020-10-29T07:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-533.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/miles-taylor-a-former-homeland-security-official-reveals-he-was-anonymous/</loc>
		<lastmod>2020-10-29T08:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-534.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dont-wait-for-a-breach-before-implementing-cybersecurity-expert-says/</loc>
		<lastmod>2020-10-29T09:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-535.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/austin-startup-esticom-sold-to-california-tech-company/</loc>
		<lastmod>2020-10-29T10:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-536.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/b2b-tech-firms-cut-marketing-budgets-due-to-pandemic-study/</loc>
		<lastmod>2020-10-29T11:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-537.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-gate-on-oil-and-gas-tech-podcast-ogit065/</loc>
		<lastmod>2020-10-29T12:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-538.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dell-technologies-world-2020-5-steps-to-combat-endpoint-security-threats/</loc>
		<lastmod>2020-10-29T13:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-539.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/rtm-vote-in-members-of-ghs-vestibule-building-committee-including-controversial-nominee/</loc>
		<lastmod>2020-10-29T14:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-540.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ms-tech-2mp-wireless-wifi-outdoor-security-ip66-waterproof-bullet-cameraip-cctv-system/</loc>
		<lastmod>2020-10-29T15:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-541.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/logo-for-tech-company/</loc>
		<lastmod>2020-10-29T16:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-542.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/hgc-strikes-security-services-pact-with-cybersecurity-malaysia/</loc>
		<lastmod>2020-10-29T17:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-543.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/trump-site-allegedly-hacked-in-crypto-extortion-scam/</loc>
		<lastmod>2020-10-29T18:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-544.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-company-claiming-it-will-transform-gary-was-barred-from-selling-securities-in-california/</loc>
		<lastmod>2020-10-29T19:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-545.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/orchard-worker-recruiter-exposed-sensitive-personal-data/</loc>
		<lastmod>2020-10-29T20:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-546.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/google-providing-us-department-of-homeland-security-with-tech-platform-for-virtual-border-wall/</loc>
		<lastmod>2020-10-29T21:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-547.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/us-security-agency-stays-silent-on-tech-back-doors/</loc>
		<lastmod>2020-10-29T22:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-548.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fullstack-academy-announces-partnership-with-colorado-state-university-extended-campus-to/</loc>
		<lastmod>2020-10-29T23:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-549.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/menlo-security-inc/</loc>
		<lastmod>2020-10-30T00:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-550.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/smart-engines-provides-alfa-bank-kazakhstan-with-tech/</loc>
		<lastmod>2020-10-30T01:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-551.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/openssf-and-linux-foundation-offer-3-free-courses-on-developing-secure-open-source-software/</loc>
		<lastmod>2020-10-30T02:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-552.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/networking-already-a-feature-at-total-tech-summit-goes-virtual/</loc>
		<lastmod>2020-10-30T03:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-553.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/robins-proud-new-virtual-training-facility-keeps-defenders-ready-lethal/</loc>
		<lastmod>2020-10-30T04:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-554.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/advice-from-a-tech-expert-if-you-connect-it-protect-it-column/</loc>
		<lastmod>2020-10-30T05:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-555.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/4-startups-tapped-to-pilot-capabilities-at-defenses-5g-living-lab/</loc>
		<lastmod>2020-10-30T06:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-556.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/expressvpn-teams-up-with-yale-researcher-to-kickstart-new-digital-security-initiative/</loc>
		<lastmod>2020-10-30T07:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-557.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/data-company-aims-to-usher-more-underrepresented-groups-into-tech/</loc>
		<lastmod>2020-10-30T08:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-558.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/election-security-talking-tech-w-will-adler/</loc>
		<lastmod>2020-10-30T09:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-559.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/perfect-storm-of-security-issues-looms-over-2020-election/</loc>
		<lastmod>2020-10-30T10:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-560.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/college-basketball-coaches-on-hot-seat-who-is-lacking-job-security-and-might-need-a-good-2020-21/</loc>
		<lastmod>2020-10-30T11:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-561.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/is-big-tech-a-big-election-security-risk/</loc>
		<lastmod>2020-10-30T12:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-562.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech5-provides-facial-recognition-tech-for-indian-exam-security-company/</loc>
		<lastmod>2020-10-30T13:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-563.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-a-fake-persona-laid-the-groundwork-for-a-hunter-biden-conspiracy-deluge/</loc>
		<lastmod>2020-10-30T14:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-564.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-ceos-questioned-on-bias-by-senators-including-kansas-jerry-moran/</loc>
		<lastmod>2020-10-30T15:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-565.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/it-security-analyst/</loc>
		<lastmod>2020-10-30T16:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-566.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-firm-plans-to-make-covid-19-test-kits-at-105m-north-charleston-campus/</loc>
		<lastmod>2020-10-30T17:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-567.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/white-house-strategy-identifies-emerging-tech-crucial-to-national-security/</loc>
		<lastmod>2020-10-30T18:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-568.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/enterprise-digital-security-management-in-2021-challenges-plans-budgets/</loc>
		<lastmod>2020-10-30T19:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-569.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/haven-hiring-tech/</loc>
		<lastmod>2020-10-30T20:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-570.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/is-big-tech-a-big-election-security-risk-gcn/</loc>
		<lastmod>2020-10-30T21:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-571.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/lightspeed-venture-partners-backs-theta-lakes-video-conferencing-security-tech-with-12-7-million-3/</loc>
		<lastmod>2020-10-30T22:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-572.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/wary-of-security-issues-japans-government-moves-to-shut-china-out-of-its-drone-supply-chain/</loc>
		<lastmod>2020-10-30T23:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-573.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/securing-healthcare-technology-during-the-pandemic-and-beyond/</loc>
		<lastmod>2020-10-31T00:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-574.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/password-security-are-you-at-risk/</loc>
		<lastmod>2020-10-31T06:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-575.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/2020-tma-meeting-marked-by-keen-security-market-insights/</loc>
		<lastmod>2020-10-31T07:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-576.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-deal-roundup-heres-who-raked-in-and-doled-out-dollars-in-october/</loc>
		<lastmod>2020-10-31T08:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-577.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/educause-2020-how-automation-can-help-universities-balance-security-and-privacy/</loc>
		<lastmod>2020-10-31T09:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-578.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyberstrong-by-cybersaint-security/</loc>
		<lastmod>2020-10-31T10:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-579.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/fcc-creates-5g-fund-for-rural-america/</loc>
		<lastmod>2020-10-31T11:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-580.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/boost-cybersecurity-measures-to-protect-senior-care-residents-and-staff/</loc>
		<lastmod>2020-10-31T12:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-581.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-field-day-4-delegate-roundtable/</loc>
		<lastmod>2020-10-31T13:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-582.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/supply-tech-albany-ga-with-security-clearance/</loc>
		<lastmod>2020-10-31T14:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-583.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cio-of-the-year-corporate-category/</loc>
		<lastmod>2020-10-31T15:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-584.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/best-practices-for-purchasing-security-technology-cloud-offerings/</loc>
		<lastmod>2020-10-31T16:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-585.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-to-take-on-the-tech-barons/</loc>
		<lastmod>2020-10-31T17:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-586.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dhs-chief-labels-twitter-a-threat-to-us-security-over-censorship/</loc>
		<lastmod>2020-10-31T18:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-587.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/seven-unbelievable-advances-in-gaming-technology/</loc>
		<lastmod>2020-10-31T19:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-588.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/form-5-tetra-tech-inc/</loc>
		<lastmod>2020-10-31T20:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-589.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/step-into-accelerated-digital-transformation-at-dell-tech-forum-2020-this-time-virtually/</loc>
		<lastmod>2020-10-31T21:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-590.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/us-court-orders-apple-to-pay-503-million-to-virnetx-in-patent-case/</loc>
		<lastmod>2020-10-31T22:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-591.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/leaving-new-york-high-earners-in-finance-and-tech-explain-why-they-left-the-worlds-greatest-city/</loc>
		<lastmod>2020-10-31T23:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/10/file-592.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-can-no-longer-rely-on-old-model-of-development-time-for-change-xi/</loc>
		<lastmod>2020-11-01T00:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/egeneration-to-transform-bangladesh-into-innovative-high-tech-nation/</loc>
		<lastmod>2020-11-01T01:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/3-top-tech-stocks-to-buy-now/</loc>
		<lastmod>2020-11-01T02:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/use-this-fast-free-check-to-see-if-your-email-address-is-spreading-spam/</loc>
		<lastmod>2020-11-01T03:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-3.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/xi-jinping-says-china-can-no-longer-rely-on-previous-model-of-depending-on-global-exports/</loc>
		<lastmod>2020-11-01T04:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-4.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/windows-10-antivirus-can-now-spot-when-your-work-devices-are-in-trouble/</loc>
		<lastmod>2020-11-01T05:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-5.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/photoshop-testing-security-for-images-to-prevent-theft-and-fakes/</loc>
		<lastmod>2020-11-01T06:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-6.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/bodyguards-on-demand-new-yorker-tests-out-private-security-for-hire-app/</loc>
		<lastmod>2020-11-01T07:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-7.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/avast-ultimate-review/</loc>
		<lastmod>2020-11-01T08:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-8.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/lazada-confirms-1-1m-accounts-compromised-in-redmart-security-breach/</loc>
		<lastmod>2020-11-01T09:55:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-9.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/domino-data-lab-joins-google-cloud-partner-advantage-program-giving-customers-a-new-way/</loc>
		<lastmod>2020-11-01T10:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-10.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/a-head-in-the-cloud-lands-deal-for-asavie-as-ralph-shaws-dublin-firm-locks-in-with-akamai/</loc>
		<lastmod>2020-11-01T11:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-11.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ransomware-surge-imperils-hospitals-as-pandemic-intensifies/</loc>
		<lastmod>2020-11-01T12:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-12.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/us-actions-against-chinese-tech-miss-the-mark/</loc>
		<lastmod>2020-11-01T13:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-13.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ready-or-not-the-year-that-pushed-advisors-into-tech/</loc>
		<lastmod>2020-11-01T14:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-14.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-companies-push-for-new-software-to-break-chinas-5g-lead/</loc>
		<lastmod>2020-11-01T15:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-15.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/stackhawk-whose-tech-helps-developers-find-application-security-vulnerabilities-before-they-get/</loc>
		<lastmod>2020-11-01T16:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-16.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/were-driving-the-digital-economy-azdan-ceo/</loc>
		<lastmod>2020-11-01T17:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-17.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/global-cognitive-security-market-expected-to-reach-highest-cagr-ibm-cisco-ca-technologies/</loc>
		<lastmod>2020-11-01T18:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-18.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/extremists-are-threatening-mayhem-at-polling-sites-anti-defamation-league-ceo-jonathan/</loc>
		<lastmod>2020-11-01T19:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-19.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/it-security-operations-specialist/</loc>
		<lastmod>2020-11-01T20:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-20.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-systems-are-outdated-say-experts-fashioning-briefs-for-incoming-administration/</loc>
		<lastmod>2020-11-01T21:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-21.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-tech-is-slowly-working-to-make-elections-more-accessible/</loc>
		<lastmod>2020-11-01T22:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-22.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ciso-commentary-data-security-risks-concerns-and-changes/</loc>
		<lastmod>2020-11-01T23:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-23.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/smart-home/</loc>
		<lastmod>2020-11-02T00:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-24.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/defense-firm-aselsan-provides-record-number-of-handheld-radios-to-security-forces/</loc>
		<lastmod>2020-11-02T01:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-25.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/eset-launches-eset-cloud-office-security/</loc>
		<lastmod>2020-11-02T02:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-26.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/apple-must-pay-virnetx-503-million-in-security-patent-trial/</loc>
		<lastmod>2020-11-02T03:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-27.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/managed-security/</loc>
		<lastmod>2020-11-02T04:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-28.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/explained-the-lack-of-technology-in-americas-elections/</loc>
		<lastmod>2020-11-02T05:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-29.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/are-electric-bullets-the-new-face-of-law-enforcement-reform/</loc>
		<lastmod>2020-11-02T06:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-30.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/valideas-top-five-technology-stocks-based-on-joseph-piotroski-11-1-2020/</loc>
		<lastmod>2020-11-02T07:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-31.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/kc-metro-election-officials-weigh-in-on-security-of-votes/</loc>
		<lastmod>2020-11-02T08:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-32.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/singtel-owned-trustwave-names-former-dxc-and-hpe-exec-as-new-ceo/</loc>
		<lastmod>2020-11-02T09:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-33.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/from-hummus-to-high-tech-israel-ceos-seek-friends-deals-in-uae/</loc>
		<lastmod>2020-11-02T10:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-34.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-did-the-tech-nation-rising-star-winners-do-during-coronavirus/</loc>
		<lastmod>2020-11-02T11:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-35.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ivy-tech-plans-info-session-on-cyber-security-careers/</loc>
		<lastmod>2020-11-02T12:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-36.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ivy-tech-plans-info-session-on-cyber-security-careers-2/</loc>
		<lastmod>2020-11-02T13:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-37.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/google-reveals-zero-day-vulnerability-on-windows-10-after-microsoft-failed-to-release-patch-in-7/</loc>
		<lastmod>2020-11-02T14:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-38.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/endpoint-protection-todays-cyber-crims-make-a-mockery-of-legacy-security-tech/</loc>
		<lastmod>2020-11-02T15:55:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-39.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/score-black-friday-pricing-on-eufys-smart-home-security-tech-today-only/</loc>
		<lastmod>2020-11-02T16:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-40.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-nifty-fifty-have-a-message-for-the-tech-obsessed/</loc>
		<lastmod>2020-11-02T17:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-41.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/four-worries-about-michigan-election-security-and-two-reasons-to-rest-easy/</loc>
		<lastmod>2020-11-02T18:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-42.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sw-developers-with-security-focus-for-high-tech-5g-cloud-native-core-at-ericsson/</loc>
		<lastmod>2020-11-02T19:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-43.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/best-gifts-home-office-tech-that-every-remote-worker-wants/</loc>
		<lastmod>2020-11-02T20:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-44.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/silicon-valley-stares-down-its-biggest-test-yet/</loc>
		<lastmod>2020-11-02T21:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-45.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-innovation-releases-new-courses-on-security-in-devops-grc-and-emerging-software/</loc>
		<lastmod>2020-11-02T22:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-46.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/legal-tech-clients-know-software-outages-happen-but-dont-make-it-a-habit/</loc>
		<lastmod>2020-11-02T23:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-47.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/detection-for-clearing-the-security-log/</loc>
		<lastmod>2020-11-03T00:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-48.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/why-networks-should-apply-security-by-design-principles/</loc>
		<lastmod>2020-11-03T01:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-49.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/payment-card-security-remains-disturbingly-low-verizon-business-report/</loc>
		<lastmod>2020-11-03T02:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-50.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/nightfall-ai-featured-in-2020-forrester-now-tech-report/</loc>
		<lastmod>2020-11-03T03:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-51.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/us-companys-checkpoint-scanner-green-lighted-by-israeli-prime-ministers-office/</loc>
		<lastmod>2020-11-03T04:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-52.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/eyeing-regulation-risk-in-tech/</loc>
		<lastmod>2020-11-03T05:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-53.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/vermont-election-clerks-say-theyre-ready-for-the-ballot-count-high-tech-or-old-school/</loc>
		<lastmod>2020-11-03T06:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-54.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dhs-tech-companies-censorship-is-grave-threat-to-national-security/</loc>
		<lastmod>2020-11-03T07:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-55.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/napco-security-tech-nssc-tops-q1-eps-by-3c-revenues-miss/</loc>
		<lastmod>2020-11-03T08:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-56.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-the-election-results-could-impact-tech-investors/</loc>
		<lastmod>2020-11-03T09:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-57.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dhs-tech-companies-censorship-is-grave-threat-to-national-security-2/</loc>
		<lastmod>2020-11-03T10:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-58.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cisco-security-sales-executive-john-maynard-to-move-on-to-next-challenge/</loc>
		<lastmod>2020-11-03T11:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-59.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/adobe-hires-new-cso-in-mark-adams-to-guide-the-company-in-its-post-flash-era/</loc>
		<lastmod>2020-11-03T12:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-60.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/dba-with-security-vulnerability/</loc>
		<lastmod>2020-11-03T13:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-61.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/refinitiv-hiring-tech-lead-cyber-security-in-bengaluru-karnataka-india/</loc>
		<lastmod>2020-11-03T14:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-62.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-installation-techs-wanted-multiple-positions-available-job-in-act/</loc>
		<lastmod>2020-11-03T15:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-63.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/oracle-publishes-rare-out-of-band-security-update-for-weblogic-servers/</loc>
		<lastmod>2020-11-03T16:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-64.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/binance-in-trouble-blockchain-security-standard-blockheads/</loc>
		<lastmod>2020-11-03T17:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-65.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/technical-documentation-in-the-era-of-it-security/</loc>
		<lastmod>2020-11-03T18:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-66.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-security-risks-are-associated-with-usb-media/</loc>
		<lastmod>2020-11-03T19:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-67.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/criticalstart-recognized-as-14th-fastest-growing-tech-company-in-north-texas-by-tech-titans/</loc>
		<lastmod>2020-11-03T20:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-68.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/a-technology-enabled-path-to-better-health-care-collaboration/</loc>
		<lastmod>2020-11-03T21:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-69.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sase-a-next-generation-cloud-security-framework/</loc>
		<lastmod>2020-11-03T22:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-70.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-ri-national-guard-cyber-defenders-help-protect-election-technology-from-attackers/</loc>
		<lastmod>2020-11-03T23:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-71.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/virginia-center-for-innovative-technology-cit-roanoke-city-partner-on/</loc>
		<lastmod>2020-11-04T00:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-72.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sweden-should-stop-bullying-chinese-tech-with-security-guise/</loc>
		<lastmod>2020-11-04T01:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-73.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-lead-systems-security-analysis/</loc>
		<lastmod>2020-11-04T02:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-74.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/today-is-only-halftime-say-top-cybersecurity-officials/</loc>
		<lastmod>2020-11-04T03:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-75.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ai-can-spot-security-threats-faster-than-traditional-approaches/</loc>
		<lastmod>2020-11-04T04:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-76.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/swedens-folksam-insurance-group-reports-data-breach-involving-big-tech/</loc>
		<lastmod>2020-11-04T05:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-77.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/elucidata-tech-talk-the-relevance-of-data-security-and-data-privacy-in-an-industrial-context/</loc>
		<lastmod>2020-11-04T06:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-78.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/wakefern-shoprite-pay-new-jersey-235k-for-fraud-act-hipaa-violations/</loc>
		<lastmod>2020-11-04T07:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-79.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-10-awards-2020/</loc>
		<lastmod>2020-11-04T08:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-80.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/homeland-security-official-netscape-gadgets-tech/</loc>
		<lastmod>2020-11-04T09:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-81.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/why-employees-fall-for-scams-and-what-companies-can-do-about-it/</loc>
		<lastmod>2020-11-04T10:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-82.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-alarm-technicians-and-tech-assistants/</loc>
		<lastmod>2020-11-04T11:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-83.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/it-security-intune-engineer-at-tech-impact/</loc>
		<lastmod>2020-11-04T12:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-84.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/browse-thousands-of-security-logo-images-for-design-inspiration/</loc>
		<lastmod>2020-11-04T13:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-85.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/total-tech-summit-attendees-will-keep-the-conversation-going-all-year-long/</loc>
		<lastmod>2020-11-04T14:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-86.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-security-account-sales-specialist-job-in-portsmouth-nh-at-vital-tech-services/</loc>
		<lastmod>2020-11-04T15:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-87.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/survey-biggest-concerns-about-securing-digital-infrastructure-include-covid-unsanctioned/</loc>
		<lastmod>2020-11-04T16:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-88.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/hillicon-valley-officials-express-confidence-in-voting-security-amid-early-technical-glitches/</loc>
		<lastmod>2020-11-04T17:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-89.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/emt-security-officer-for-digital-tech-site-job-in-san-jose-ca-at-allied-universal/</loc>
		<lastmod>2020-11-04T18:55:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-90.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-lead-systems-security-analysis-at-fiserv-inc/</loc>
		<lastmod>2020-11-04T19:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-91.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/massive-transformation-wef-delivers-blueprint-for-china-to-tackle-food-safety-waste-and-security/</loc>
		<lastmod>2020-11-04T20:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-92.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cycraft-japan-joins-the-nippon-csirt-association/</loc>
		<lastmod>2020-11-04T21:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-93.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/trade-row-post-pandemic-recovery-key-to-apac-tech-outlook-in-2021/</loc>
		<lastmod>2020-11-04T22:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-94.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/california-votes-on-a-new-kind-of-watchdog-for-big-tech/</loc>
		<lastmod>2020-11-04T23:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-95.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/aei-acquires-linkware-pangiam-for-integrated-travel-security-tech-push/</loc>
		<lastmod>2020-11-05T00:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-96.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/akamai-technologies-advances-5g-security-strategy-with-acquisition-of-asavie/</loc>
		<lastmod>2020-11-05T01:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-97.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/confidential-computing-and-how-to-leverage-it-productively/</loc>
		<lastmod>2020-11-05T02:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-98.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-collaborative-partnerships-enable-shared-success/</loc>
		<lastmod>2020-11-05T03:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-99.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/aei-acquires-linkware-pangiam-for-integrated-travel-security-tech-push-2/</loc>
		<lastmod>2020-11-05T04:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-100.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/why-you-are-going-to-get-hacked/</loc>
		<lastmod>2020-11-05T05:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-101.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/telefonicas-ceo-of-cyber-tech-discusses-rapid-cloud-migration/</loc>
		<lastmod>2020-11-05T06:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-102.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/why-logistics-operations-are-so-pivotal-in-this-time-of-covid-19/</loc>
		<lastmod>2020-11-05T07:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-103.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/massachusetts-voters-pass-a-right-to-repair-measure-giving-them-unprecedented-access-to-their/</loc>
		<lastmod>2020-11-05T08:55:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-104.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/h-1b-visa-bay-area-tech-giants-fight-new-trump-administration-rules/</loc>
		<lastmod>2020-11-05T09:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-105.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/sa-cyber-training-company-acquired-by-la-based-tech-company/</loc>
		<lastmod>2020-11-05T10:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-106.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/honeywell-security-tech-support-3/</loc>
		<lastmod>2020-11-05T11:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-107.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/citrix-sets-new-standard-for-digital-workspace-security/</loc>
		<lastmod>2020-11-05T12:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-108.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/theres-a-new-front-in-us-china-trade-and-tech-war-analysis/</loc>
		<lastmod>2020-11-05T13:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-109.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/3-steps-to-secure-a-hybrid-workplace/</loc>
		<lastmod>2020-11-05T14:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-110.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/global-automotive-cyber-security-market-2020-business-overview-arilou-technologies-cisco/</loc>
		<lastmod>2020-11-05T15:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-111.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/network-security-why-visibility-isnt-enough/</loc>
		<lastmod>2020-11-05T16:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-112.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/switzerland-of-asia-singapore-increases-presence-as-tech-hub/</loc>
		<lastmod>2020-11-05T17:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-113.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ten-signs-its-time-to-review-your-endpoint-protection/</loc>
		<lastmod>2020-11-05T18:55:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-114.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/digital-hands-announces-appointment-of-john-west-to-board-of-directors/</loc>
		<lastmod>2020-11-05T19:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-115.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/global-high-security-locks-market-2020-research-analysis-medeco-samsung-mul-t-lock/</loc>
		<lastmod>2020-11-05T20:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-116.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/privacy-considerations-for-secure-remote-working-from-home/</loc>
		<lastmod>2020-11-05T21:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-117.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/autonomous-drone-maker-skydio-adds-key-product-and-engineering-executives-to-growing-team/</loc>
		<lastmod>2020-11-05T22:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-118.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/mpc-alliance-membership-increases-nearly-3x-in-first-year/</loc>
		<lastmod>2020-11-05T23:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-119.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/qorvo-wins-contract-of-up-to-75-million-for-semiconductor-packaging-center-in-dfw/</loc>
		<lastmod>2020-11-06T00:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-120.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/earthlink-launches-easytech-remote-technical-support-service/</loc>
		<lastmod>2020-11-06T01:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-121.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/mobile-credentials-for-the-masses-key-considerations-for-implementation-and-student-adoption/</loc>
		<lastmod>2020-11-06T02:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-122.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/what-is-security-compliance/</loc>
		<lastmod>2020-11-06T03:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-123.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/passing-of-1-3-billion-bond-proposals-allows-saisd-to-improve-schools-make-tech-upgrades/</loc>
		<lastmod>2020-11-06T04:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-124.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/gartner-its-not-too-early-to-apply-cutting-edge-tech-to-transportation-sector/</loc>
		<lastmod>2020-11-06T05:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-125.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/understanding-pharmacy-management-tech-solutions/</loc>
		<lastmod>2020-11-06T06:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-126.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/openssf-offers-free-training-on-developing-secure-software/</loc>
		<lastmod>2020-11-06T07:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-127.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-to-defend-your-organization-against-social-engineering-attacks/</loc>
		<lastmod>2020-11-06T08:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-128.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/lake-dai-brings-wealth-of-ai-knowledge-experience-to-alcatraz-board/</loc>
		<lastmod>2020-11-06T09:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-129.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/union-pacific-strengthens-tech-workforce-with-internships-for-first-generation-college-students/</loc>
		<lastmod>2020-11-06T10:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-130.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cisa-says-no-evidence-of-successful-foreign-election-hacks-qbots-voting-themed-malspam/</loc>
		<lastmod>2020-11-06T11:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-131.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/proctorio-used-dmca-to-take-down-a-students-critical-tweets/</loc>
		<lastmod>2020-11-06T12:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-132.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/doe-establishes-fellowship-to-support-industry-government-collab-on-operational-tech-dan/</loc>
		<lastmod>2020-11-06T13:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-133.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/coalfire-hiring-security-consultant-qsa-cloud-tech/</loc>
		<lastmod>2020-11-06T14:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-134.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ens-security-hiring-tech-rma-associate-in-city-of-industry-california-united-states/</loc>
		<lastmod>2020-11-06T15:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-135.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ampcus-inc-hiring-security-tech-lead-junior-senior/</loc>
		<lastmod>2020-11-06T16:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-136.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/women-security-peace-initiative-militarily-effective/</loc>
		<lastmod>2020-11-06T17:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-137.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/are-voting-machines-safe-from-cyberattacks-heres-how-they-work/</loc>
		<lastmod>2020-11-06T18:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-138.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/it-consultancy-sourced-group-unveils-new-cloud-security-assessment-offering/</loc>
		<lastmod>2020-11-06T19:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-139.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/humanizing-cu-technology-leads-to-longer-more-meaningful-financial-journeys/</loc>
		<lastmod>2020-11-06T20:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-140.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/put-your-cybersecurity-skills-to-the-test-in-a-virtual-battlefield/</loc>
		<lastmod>2020-11-06T21:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-141.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-government-agencies-can-use-tech-to-safely-get-back-to-their-workplaces/</loc>
		<lastmod>2020-11-06T22:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-142.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-company-says-its-software-isnt-to-blame-for-ballot-hiccups-in-georgias-gwinnett-county/</loc>
		<lastmod>2020-11-06T23:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-143.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/in-critical-infrastructure-trustworthy-ai-is-necessary/</loc>
		<lastmod>2020-11-07T00:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-144.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/eurofins-and-knowbe4-announce-partnership-to-help-organisations-successfully-challenge/</loc>
		<lastmod>2020-11-07T01:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-145.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/apple-patches-three-actively-exploited-zero%e2%80%91day-flaws-in-ios/</loc>
		<lastmod>2020-11-07T02:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-146.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/four-key-components-of-successful-network-security/</loc>
		<lastmod>2020-11-07T03:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-147.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/uk-revises-guidance-on-business-with-china-cites-national-security-concerns/</loc>
		<lastmod>2020-11-07T04:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-148.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-oracle-walmart-tiktok-deal-is-not-enough/</loc>
		<lastmod>2020-11-07T05:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-149.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/litigation-in-the-time-of-covid-best-practices-for-virtual-advocacy/</loc>
		<lastmod>2020-11-07T06:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-150.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/the-trump-administration-prioritized-emerging-tech-like-quantum-computing-and-ai-in-a-bid-to-keep/</loc>
		<lastmod>2020-11-07T07:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-151.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/predicting-7-msp-trends-in-technology-for-2021/</loc>
		<lastmod>2020-11-07T08:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-152.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/autonomous-vehicle-company-waymo-files-ttab-opposition-against-waypro/</loc>
		<lastmod>2020-11-07T09:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-153.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/u-illinois-to-lead-planning-efforts-on-network-of-cybersecurity-tech-institutes/</loc>
		<lastmod>2020-11-07T10:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-154.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/amazon-disavows-mississippi-police-program-that-plans-to-use-ring-cameras-for-real-time/</loc>
		<lastmod>2020-11-07T11:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-155.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/5-ways-startups-can-use-technological-innovations/</loc>
		<lastmod>2020-11-07T12:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-156.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/choosing-home-network-security-software/</loc>
		<lastmod>2020-11-07T13:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-157.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/eweekchat-tuesday-nov-10-new-tech-to-expect-in-2021/</loc>
		<lastmod>2020-11-07T14:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-158.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/ransomware-give-us-your-money-or-else/</loc>
		<lastmod>2020-11-07T15:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-159.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/putting-ex-prisoners-on-road-to-reintegration/</loc>
		<lastmod>2020-11-07T16:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-160.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/hinds-supervisors-election-commission-disagree-on-how-to-use-1-5m-grant/</loc>
		<lastmod>2020-11-07T17:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-161.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-system-integrators-market-what-strategies-are-leading-players-adopting-to-stay-ahead/</loc>
		<lastmod>2020-11-07T18:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-162.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/intranet-security-software-market-2020-comprehensive-analysis-of-industry-share-size-growth/</loc>
		<lastmod>2020-11-07T19:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-163.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-job-industry-in-2020-the-future-scope/</loc>
		<lastmod>2020-11-07T20:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-164.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/assa-abloy-introduces-safer2open-hands-free-solutions/</loc>
		<lastmod>2020-11-07T21:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-165.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/how-physical-security-in-africa-is-changing-business/</loc>
		<lastmod>2020-11-07T22:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-166.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/its-like-falling-in-love-israeli-entrepreneurs-welcomed-in-dubai/</loc>
		<lastmod>2020-11-07T23:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-167.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/impact-of-us-china-technationalism-on-asean/</loc>
		<lastmod>2020-11-08T00:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-168.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/local-new-economy-companies-play-trumps-at-ciie/</loc>
		<lastmod>2020-11-08T01:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-169.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/uk-creates-tech-hub-for-more-ethical-business-with-china/</loc>
		<lastmod>2020-11-08T02:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-170.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-telecom-establishes-quantum-security-joint-venture/</loc>
		<lastmod>2020-11-08T03:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-171.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/applications-of-ml-in-cyber-security/</loc>
		<lastmod>2020-11-08T04:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-172.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/3-tech-stocks-that-are-thriving-despite-coronavirus/</loc>
		<lastmod>2020-11-08T05:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-173.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/biden-beats-trump-heres-what-it-means-for-tech/</loc>
		<lastmod>2020-11-08T06:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-174.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/top-6-digital-trends-for-2020/</loc>
		<lastmod>2020-11-08T07:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-175.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/13-best-weekend-deals-on-gaming-home-and-audio-gear/</loc>
		<lastmod>2020-11-08T08:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-176.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/biden-wins-what-next-for-china-us-relations/</loc>
		<lastmod>2020-11-08T09:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-177.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/everything-hugh-freeze-said-after-25-libertys-win-over-virginia-tech/</loc>
		<lastmod>2020-11-08T10:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-178.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/oneplus-8-and-8-pro-receive-october-security-patch/</loc>
		<lastmod>2020-11-08T11:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-179.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/automated-technology-allows-unparalleled-space-exploration-from-moon-to-asteroids-and-beyond/</loc>
		<lastmod>2020-11-08T12:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-180.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/help-wanted-jobs-and-good-quality-of-life/</loc>
		<lastmod>2020-11-08T13:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-181.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/city-folk-vote-to-each-get-100-every-time-cops-govt-officials-illegally-spy-on-them-with-facial-rec-ai/</loc>
		<lastmod>2020-11-08T14:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-182.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/uber-and-lyft-will-push-for-more-laws-classifying-drivers-as-independent-contractors/</loc>
		<lastmod>2020-11-08T15:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-183.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/former-astronaut-wins-us-senate-seat-once-held-by-republican-john-mccain/</loc>
		<lastmod>2020-11-08T16:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-184.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/staying-safe-in-crypto-keeping-your-digital-assets-secure-and-protected/</loc>
		<lastmod>2020-11-08T17:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-185.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/it-security-jobs/</loc>
		<lastmod>2020-11-08T18:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-186.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/facebook-and-tech-companies-meet-with-us-intelligence-on-2020-election-security/</loc>
		<lastmod>2020-11-08T19:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-187.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/contactless-biometrics-technology-market-analysis-covid-19-impactoutlook-opportunities-size/</loc>
		<lastmod>2020-11-08T20:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-188.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/local-tech-entrepreneurs-invention-takes-aim-at-coronavirus/</loc>
		<lastmod>2020-11-08T21:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-189.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/netflix-does-a-very-scary-thingand-other-small-business-tech-news/</loc>
		<lastmod>2020-11-08T22:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-190.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-bollards-market-size-of-dynamics-products-application-forecast-report-2020-2027/</loc>
		<lastmod>2020-11-08T23:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-191.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/now-i-dont-waste-time-flying-to-meetings-everything-is-done-over-zoom/</loc>
		<lastmod>2020-11-09T00:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-192.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/agri-tech-firm-backs-she-feeds-the-world-campaign/</loc>
		<lastmod>2020-11-09T01:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-193.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest/</loc>
		<lastmod>2020-11-09T02:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-194.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/local-computer-wiz-pens-book-that-aims-to-keep-businesses-safe-from-internet-hackers/</loc>
		<lastmod>2020-11-09T03:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-195.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/business-owners-guide-to-cyber-security/</loc>
		<lastmod>2020-11-09T04:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-196.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/who-is-going-to-stop-fanmag-stocks-and-what-is-holding-back-teva/</loc>
		<lastmod>2020-11-09T05:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-197.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/real-time-cybersecurity-has-just-got-real/</loc>
		<lastmod>2020-11-09T06:55:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-198.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-data-bolsters-cloud-infrastructure-play-with-diamanti-deal/</loc>
		<lastmod>2020-11-09T07:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-199.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/telkomtelstra-rolls-out-vmware-sd-wan-to-more-than-5000-sites-across-indonesia/</loc>
		<lastmod>2020-11-09T08:55:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-200.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/securing-virus-hit-world-with-tech/</loc>
		<lastmod>2020-11-09T09:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-201.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cell-based-meat-in-china-firms-urged-to-break-away-from-plant-based-products-to-appeal-to-local/</loc>
		<lastmod>2020-11-09T10:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-202.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tim-berners-lee-startup-launches-privacy-focused-service-to-secure-your-data/</loc>
		<lastmod>2020-11-09T11:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-203.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/abu-dhabis-g42-signs-agreement-with-aiq-and-schlumberger-for-ai-solutions-in-oil-and-gas-industry/</loc>
		<lastmod>2020-11-09T12:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-204.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/residential-monitored-security-market-2020-market-projections-investment-tech-trends-and/</loc>
		<lastmod>2020-11-09T13:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-205.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/digital-tech-and-israeli-water-management/</loc>
		<lastmod>2020-11-09T14:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-206.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/radiation-detection-in-military-and-security-market-research-clinical-advancements-by-2028/</loc>
		<lastmod>2020-11-09T15:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-207.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-events-this-week-social-media-marketing-conference-2020-and-others/</loc>
		<lastmod>2020-11-09T16:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-208.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/patriot-one-appoints-peter-evans-as-ceo/</loc>
		<lastmod>2020-11-09T17:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-209.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/iphone-12-black-friday-deal-includes-free-airpods-and-cheap-unlimited-data/</loc>
		<lastmod>2020-11-09T18:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-210.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/israeli-cybersecurity-startup-resec-technologies-raises-4m-in-series-a-funding-led-by-qbn/</loc>
		<lastmod>2020-11-09T19:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-211.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/richcontext-retail-tech-agency-in-rogers-acquired-by-minnesota-firm/</loc>
		<lastmod>2020-11-09T20:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-212.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/kamakshi-sivaramakrishnan-joins-liveramp-board-of-directors/</loc>
		<lastmod>2020-11-09T21:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-213.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/canadian-institutions-join-fortinets-security-academy-program-to-address-cybersecurity-skills-gap/</loc>
		<lastmod>2020-11-09T22:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-214.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/a-presidential-agenda-for-the-geotech-decade-that-uplifts-people-prosperity-and-peace/</loc>
		<lastmod>2020-11-09T23:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-215.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/new-azure-kubernetes-service-aks-security-workbook/</loc>
		<lastmod>2020-11-10T00:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-216.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/relativity-achieves-fedramp-authorization-for-relativityone-government/</loc>
		<lastmod>2020-11-10T01:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-217.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/new-program-to-partner-israelis-indonesians-for-post-covid-tech-solutions/</loc>
		<lastmod>2020-11-10T02:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-218.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/gm-to-hire-3000-for-tech-jobs-as-part-of-ev-push/</loc>
		<lastmod>2020-11-10T03:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-219.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/deepfake-phishing-is-that-actually-your-boss-calling/</loc>
		<lastmod>2020-11-10T04:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-220.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/gchq-takes-action-against-russian-covid-19-vaccine-disinformation-source-code-theft/</loc>
		<lastmod>2020-11-10T05:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-221.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/stocks-surgezoom-to-boost-securitymore-gm-tech-workers/</loc>
		<lastmod>2020-11-10T06:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-222.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cyber-security-engineer-job-in-lisle-il-tech-mahindra/</loc>
		<lastmod>2020-11-10T07:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-223.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/security-driven-networking-the-foundation-of-digital-transformation/</loc>
		<lastmod>2020-11-10T08:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-224.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/new-tool-detects-unsafe-security-practices-in-android-apps/</loc>
		<lastmod>2020-11-10T09:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-225.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/aircraft-sustainment-researcher-elsys-with-security-clearance-hot/</loc>
		<lastmod>2020-11-10T10:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-226.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-optimistic-about-broadband-expansion-in-biden-admin/</loc>
		<lastmod>2020-11-10T11:55:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-227.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/china-puts-supply-chain-security-at-forefront-to-avoid-being-strangled-by-sanctions-analysts-say/</loc>
		<lastmod>2020-11-10T12:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-228.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/crn-tech-innovator-awards-and-the-barracuda-message-bus/</loc>
		<lastmod>2020-11-10T13:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-229.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/silicon-valley-founder-of-12-employee-tech-startup-sues-trump-administration-over-denied-visa/</loc>
		<lastmod>2020-11-10T14:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-230.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/tech-giants-not-convinced-australias-critical-infrastructure-bill-is-currently-fit-for-purpose/</loc>
		<lastmod>2020-11-10T15:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-231.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/feature-trackers-to-mask-detectors-india-bets-on-covid-tech-amid-privacy-fears/</loc>
		<lastmod>2020-11-10T16:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-232.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/stocks-surge-zoom-to-boost-security-more-gm-tech-workers/</loc>
		<lastmod>2020-11-10T17:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-233.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/threat-stack-unveils-machine-learning-capabilities-in-the-threat-stack-cloud-security-platform/</loc>
		<lastmod>2020-11-10T18:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-234.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/joel-fulton-former-ciso-of-splunk-talks-lucidum-his-new-ml-powered-asset-discovery-company/</loc>
		<lastmod>2020-11-10T19:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-235.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/hong-kongs-amber-group-picks-bitgo-trust-in-quest-for-institutional-investors/</loc>
		<lastmod>2020-11-10T20:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-236.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.information-security-today.com/news/cellular-monitoring-vs-landline-monitoring/</loc>
		<lastmod>2020-11-10T21:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.information-security-today.com/wp-content/uploads/2020/11/file-237.jpeg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->