<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://www.securbay.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://www.securbay.com/2014/10/09/the-owasp-testing-guide-4-0/</loc><lastmod>2014-10-30T15:05:46+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/03/13/fake-social-profiles-social-engineering-trojans-that-attack-enterprises/</loc><lastmod>2015-03-15T02:46:50+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/03/26/byos-adding-a-new-dimension-to-enterprise-it-security/</loc><lastmod>2015-08-04T03:50:06+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/04/14/near-term-cyber-security-solutions-for-the-digital-economy/</loc><lastmod>2015-08-04T03:51:42+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/04/28/mobile-security-an-it-security-managers-cope-ing-with-byod/</loc><lastmod>2015-04-28T10:13:27+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/05/10/mid-terms-cyber-security-measures-for-digital-economy/</loc><lastmod>2015-08-04T03:53:04+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/05/19/byod-corporate-liability-and-cope/</loc><lastmod>2015-08-04T03:47:47+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/05/27/long-term-measures-of-cyber-security-for-a-digital-economy/</loc><lastmod>2015-08-04T03:54:33+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/06/06/mobile-device-management-is-not-about-the-device-but-the-data/</loc><lastmod>2015-08-04T03:45:46+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/07/01/trends-in-of-mobile-device-management-devices-wearables-and-containerization/</loc><lastmod>2015-08-04T03:46:20+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/07/07/digital-currency-the-security-perspective/</loc><lastmod>2015-08-04T03:55:31+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/07/24/digital-economy-bitcoin-the-blockchain-story/</loc><lastmod>2015-07-24T03:16:28+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/08/04/iot-security-it-starts-with-it-and-ot/</loc><lastmod>2015-08-04T03:37:05+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/08/11/digital-economy-blockchain-security-look-at-it-as-a-relational-database/</loc><lastmod>2015-08-11T13:59:57+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/08/27/blockchain-applications-disruptive-technology-to-build-a-safer-online-world/</loc><lastmod>2015-09-07T08:38:54+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/09/07/iot-security-is-about-data-handling-and-physical-security/</loc><lastmod>2015-09-07T04:32:21+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/09/19/digital-currency-and-banking-2-0/</loc><lastmod>2015-09-19T06:14:51+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/10/05/iot-security-closed-vs-open-systems-and-challenges/</loc><lastmod>2015-10-05T03:32:15+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/10/16/mobile-banking-and-digital-currency-confluence-of-consequence/</loc><lastmod>2016-02-23T03:43:05+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/10/25/iot-security-the-ecosystem-components-and-managers/</loc><lastmod>2015-10-25T10:56:44+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/11/12/digital-currency-security-vulnerabilities-in-bitcoin-transactions/</loc><lastmod>2015-11-12T01:36:56+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/12/09/implementing-an-iot-security-ecosystem/</loc><lastmod>2015-12-14T03:32:14+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/12/09/iot-security-ecosystem/</loc><lastmod>2015-12-14T03:33:42+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/12/24/digital-currency-in-india-part-1/</loc><lastmod>2015-12-24T06:31:00+00:00</lastmod></url><url><loc>https://www.securbay.com/2015/12/24/digital-currency-in-india-part-2-resurgence/</loc><lastmod>2015-12-24T06:34:33+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/01/27/51070/</loc><lastmod>2016-01-27T08:53:32+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/02/03/digital-currency-the-way-forward/</loc><lastmod>2016-03-15T10:10:30+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/03/14/cybersecurity_nistintro/</loc><lastmod>2016-03-14T21:32:23+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/03/14/cybersecurity_csfandrm-v1-1/</loc><lastmod>2016-03-14T21:33:34+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/03/14/cybersecurity_nistintelcasestudy-1-1/</loc><lastmod>2016-03-14T21:34:50+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/04/09/mobile-app-vulnerabilities/</loc><lastmod>2016-04-09T13:49:06+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/04/15/security-issues-in-cloud-access/</loc><lastmod>2016-05-02T08:06:48+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/05/02/software-code/</loc><lastmod>2016-05-02T08:07:57+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/10/01/pokemon-go-what-are-the-enterprise-security-concerns/</loc><lastmod>2016-10-01T18:35:07+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/10/01/the-5-things-you-need-to-know-about-ransomware/</loc><lastmod>2016-10-01T18:39:24+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/10/01/law-and-ransomware-the-legal-perspective-for-consumer-and-enterprise/</loc><lastmod>2016-10-01T18:48:56+00:00</lastmod></url><url><loc>https://www.securbay.com/2016/10/01/88941/</loc><lastmod>2016-10-03T10:11:57+00:00</lastmod></url></urlset>
