<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.towerwall.com/towerwall-security-alert-v13-79-clear-cookies-flash-cookies-local-storage</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/top-10-php-security-vulnerabilities</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MichelleDrolet_LeadersinCyber2021.jpg</image:loc><image:caption>MichelleDroletLeadersinCyber2021</image:caption><image:title>MichelleDroletLeadersinCyber2021</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-named-powerful-women-channel-2012</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/always-prepared-monitor-analyze-test-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-blog-named-best-computer-security-blogs-2016-creditdonkey</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Michelle-Drolet-2020-crop-cricle-150x150.png</image:loc><image:caption>MichelleDrolet2020cropcricle150x150</image:caption><image:title>MichelleDrolet2020cropcricle150x150</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/cover-your-top-7-basic-security-threats-first</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/establishing-goals</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/test-apps-hackers-penetrating-castle-walls</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Castle%20walls01_0_0.jpg</image:loc><image:caption>Castlewalls0100</image:caption><image:title>Castlewalls0100</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/benefits-cloud-based-endpoint-security</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Cloud_Benefits_468.jpg</image:loc><image:caption>CloudBenefits468</image:caption><image:title>CloudBenefits468</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/application-security-maturing-independent-testing-crucial</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/beware-wild-west-web-applications</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MichelleDrolet.png</image:loc><image:caption>MichelleDrolet</image:caption><image:title>MichelleDrolet</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-more-free-security-tools-worth-a-look</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-know-public-wi-fi</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-questions-ask-ceo-cybersecurity</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/bugs-cash-bounty-hunters-new-wild-west-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-steps-to-develop-an-incident-response-plan</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/three-crucial-keys-to-understanding-hipaa-compliance</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-edge-computing-association-webinar-how-to-use-the-decentralized-edge-cloud-to-protect-your-data</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/cork-app-face-attack</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/cutcaster901308946BatteringRamvintageengravingsmall-1.jpg</image:loc><image:caption>cutcaster901308946BatteringRamvintageengravingsmall1</image:caption><image:title>cutcaster901308946BatteringRamvintageengravingsmall1</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/five-key-cybersecurity-trends-for-2021</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/fake-paypal-emails-distributing-malware</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/7-security-threats-that-go-ignored-too-often</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/ransomware-cryptowall-picks-cryptolocker-left</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-finding-clarity-in-the-cloud</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/flawed-mobile-voting-app-highlights-need-for-proper-testing</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-securitymalware-alert-vol-13-71</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/information-security-summit-2016-raises-5000-massbay-cyber-security-scholarships</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/webinar2-second-nature-security.png</image:loc><image:caption>webinar2secondnaturesecurity</image:caption><image:title>webinar2secondnaturesecurity</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/IMG_3983.jpg</image:loc><image:caption>IMG3983</image:caption><image:title>IMG3983</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/ransomware-getting-worse-prepare</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/PenTestService-Card-2.jpg</image:loc><image:caption>PenTestServiceCard2</image:caption><image:title>PenTestServiceCard2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/tips-for-setting-up-a-cybersecure-response-plan</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Strategy_468.gif</image:loc><image:caption>Strategy468</image:caption><image:title>Strategy468</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/inside-infosec-1-malware-in-the-time-of-covid-19</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-data-privacy-alert-vol-13-81-massive-breach-health-care-company-anthem</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/soc-2-compliance-why-you-should-care</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/7th-annual-information-security-summit-recap</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-second-nature-security-secure-networks-behavior-modification-security-awareness-training</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/webinar2-second-nature-security.png</image:loc><image:caption>webinar2secondnaturesecurity</image:caption><image:title>webinar2secondnaturesecurity</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/save-date-join-information-security-summit-2015</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/3468-2</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/debunking-5-reasons-businesses-invest-computer-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/blind-trust-making-unsafe</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/cutcaster901308946BatteringRamvintageengravingsmall-1.jpg</image:loc><image:caption>cutcaster901308946BatteringRamvintageengravingsmall1</image:caption><image:title>cutcaster901308946BatteringRamvintageengravingsmall1</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-i-know-about-working-from-home</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/prada-vs-payless</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-us-issa-new-england-august-2017-sponsor-expo</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky-2.jpg</image:loc><image:caption>GaryMiliefsky2</image:caption><image:title>GaryMiliefsky2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/read-edas-report-malware-infections</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-speak-cumberland-county-colleges-2017-business-leaders-summit</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/malware-alert-vol-14-19</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/symantec-update-xp-systems-bsod</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-an-introduction-to-new-technology-automated-penetration-testing-1-16-1</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-information-security-update-vol-13-78-3-ways-outlook-com-account-safer</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/operationalizing-cybersecurity-evolution-seamlessness-and-holistic-thinking-as-key-drivers</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-i-know-about-business-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/important-steps-to-protect-you-from-the-solarwinds-hack-attack</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/cost-data-breach-2018</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/hackers-show-no-mercy-even-pot-dispensaries-anatomy-national-point-sale-breach-takedown-1000-plus-marijuana-dispensaries</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-donates-7k-to-massbay-foundation</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/mindset-entrepreneur-featuring-michelle-drolet</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Screen-Shot-2018-11-02-at-12_35_38-AM-1024x578.png</image:loc><image:caption>ScreenShot20181102at123538AM1024x578</image:caption><image:title>ScreenShot20181102at123538AM1024x578</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/google-running-late-to-the-enterprise-mobility-party</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-towerwall-information-security-summit-2013</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/8SecurityStrategiesforUnmanagedDevices-Cover.jpg</image:loc><image:caption>8SecurityStrategiesforUnmanagedDevicesCover</image:caption><image:title>8SecurityStrategiesforUnmanagedDevicesCover</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/the-evolving-threat-landscape-five-trends-to-expect-in-2020-and-beyond</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/introducing-towerwalls-threat-spotlight</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/8-cybersecurity-trends-to-watch-for-in-2018</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-published-web-security-journal-onboard-virtual-ciso</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-preventing-the-big-one-staying-ahead-of-the-breach</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-towerwall-snoopwall-timely-webinar-breach-prevention-near-term-roi</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky.jpg</image:loc><image:caption>GaryMiliefsky</image:caption><image:title>GaryMiliefsky</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky-2.jpg</image:loc><image:caption>GaryMiliefsky2</image:caption><image:title>GaryMiliefsky2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-infosec-concerns-colleges-universities</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/qa-panel-how-to-stay-cybersafe-in-2020</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/five-steps-for-creating-an-advanced-threat-detection-and-vulnerability-management-plan</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/stamp-spambots-no</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-best-practices-for-securing-your-cannabis-business-in-2020</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/why-every-business-needs-a-wisp</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Screen-Shot-2018-11-02-at-12_35_38-AM-1024x578.png</image:loc><image:caption>ScreenShot20181102at123538AM1024x578</image:caption><image:title>ScreenShot20181102at123538AM1024x578</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-what-exactly-is-automated-penetration-testing-2-27-19-2-2</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-open-source-intrusion-detection-systems-for-smbs</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/dont-bite-that-phishing-bait-bet-on-these-five-simple-safety-rules</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/mobile-device-policy</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/nists-cybersecurity-framework-matters</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-published-networkworld-throw-vendor-bus-breach-fast</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/watch-webinar-armis-eliminate-the-iot-security-blind-spot-featuring-nadir-izrael</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-towerwall-named-power-30-solution-provider-crns-2017-women-channel</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/introducing-lunch-vciso</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MichelleDrolet.png</image:loc><image:caption>MichelleDrolet</image:caption><image:title>MichelleDrolet</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-cybersecurity-trends-to-watch-for-in-2016</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/KnownVulnerabilities.jpg</image:loc><image:caption>KnownVulnerabilities</image:caption><image:title>KnownVulnerabilities</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/CloudServices.jpg</image:loc><image:caption>CloudServices</image:caption><image:title>CloudServices</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Ransomware-1.jpg</image:loc><image:caption>Ransomware1</image:caption><image:title>Ransomware1</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Spear-Phishing.jpg</image:loc><image:caption>SpearPhishing</image:caption><image:title>SpearPhishing</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/TheInternetofThings.jpg</image:loc><image:caption>TheInternetofThings</image:caption><image:title>TheInternetofThings</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/hired-guns-rise-virtual-ciso</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/introducing-towerwalls-vciso-services</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MichelleDrolet.png</image:loc><image:caption>MichelleDrolet</image:caption><image:title>MichelleDrolet</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-discusses-sophos-intercept-x-on-crntv</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/three-crucial-keys-understanding-hipaa-compliance</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/watch-latest-webinar-second-nature-security</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/webinar2-second-nature-security.png</image:loc><image:caption>webinar2secondnaturesecurity</image:caption><image:title>webinar2secondnaturesecurity</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/building-malware-defenses-control-email-web-browsers-and-ports</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/warning-java-vulnerable-hackers-u-s-government</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/harness-the-nist-csf-to-boost-your-security-and-compliance</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/a-cybersecurity-checklist-for-the-new-norm</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/true-cybersecurity-must-know-employees</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/malicious-apps-exploit-critical-android-bug-wild</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/trust-third-party-applications-again</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-cybersecurity-events-that-keep-ceos-up-at-night</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-massbay-successful-information-security-summit</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-i-know-about-cybersecurity-trends</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-us-dinner-seminar-darktrace</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky.jpg</image:loc><image:caption>GaryMiliefsky</image:caption><image:title>GaryMiliefsky</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/inside-infosec-panel-2-zero-trust-architectures-expert-panel</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-social-engineering</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/ensure-mobile-apps-secure-enterprise</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/enterprise-cloud.jpg</image:loc><image:caption>enterprisecloud</image:caption><image:title>enterprisecloud</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/build-a-strong-cybersecurity-posture-with-these-10-best-practices</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-tips-for-better-cloud-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/known-vulnerabilities-pose-biggest-it-security-threats</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/medical-marijuana-dispensaries-take-care-patient-health-information-pay-price</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-i-know-about-holiday-cyber-scams</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/watch-listen-to-michelle-drolet-on-radio-entrepreneurs</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/securing-your-future-with-a-virtual-ciso</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/save-the-date-issa-new-england-chapter-meeting-september-25-2018</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-cloud-security-basics-and-best-practices</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/snoopwall-towerwall-lunch-learn-7-secrets-offensive-security-august-16-2016</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky-2.jpg</image:loc><image:caption>GaryMiliefsky2</image:caption><image:title>GaryMiliefsky2</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/The-7-Secrets-of-Offensive-Security-email.jpg</image:loc><image:caption>The7SecretsofOffensiveSecurityemail</image:caption><image:title>The7SecretsofOffensiveSecurityemail</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/bank-account-threat</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/watch-recent-webinar-ransomware-today</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-what-exactly-is-automated-penetration-testing-2-27-19</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/CloudServices.jpg</image:loc><image:caption>CloudServices</image:caption><image:title>CloudServices</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/u-s-outgunned-hacker-war</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/battling-ransomware-how-to-prevent-a-ransomware-incident</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/3-ways-to-protect-data-and-control-access-to-it</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/meetup-armis-iot-security-thursday-january-11-2018</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky-2.jpg</image:loc><image:caption>GaryMiliefsky2</image:caption><image:title>GaryMiliefsky2</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/meet-ciso-1.png</image:loc><image:caption>meetciso1</image:caption><image:title>meetciso1</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/four-important-things-cannabis-businesses-can-learn-from-the-recent-equifax-data-breach</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/protect-unstructured-data-user-behavior-analytics</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/cannabis-privacy-compliance-health-information-protected</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/great-turnout-outstanding-women-business-awards</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/31102971916_944107ea52_o.jpg</image:loc><image:caption>31102971916944107ea52o</image:caption><image:title>31102971916944107ea52o</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/30317824984_d87c6e2ec9_o-1.jpg</image:loc><image:caption>30317824984d87c6e2ec9o1</image:caption><image:title>30317824984d87c6e2ec9o1</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/30317820674_e6cb06f324_o.jpg</image:loc><image:caption>30317820674e6cb06f324o</image:caption><image:title>30317820674e6cb06f324o</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/30771117950_d18f3089a6_o.jpg</image:loc><image:caption>30771117950d18f3089a6o</image:caption><image:title>30771117950d18f3089a6o</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/introducing-voip-assessment-services</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-open-source-intrusion-detection-tools-that-are-too-good-to-ignore</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-data-privacy-alert-vol-13-80-ces-2015-trends-impact-data-privacy</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-i-know-about-cloud-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/data-security-review-issue-2-threats</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/cutcaster901308946BatteringRamvintageengravingsmall-1.jpg</image:loc><image:caption>cutcaster901308946BatteringRamvintageengravingsmall1</image:caption><image:title>cutcaster901308946BatteringRamvintageengravingsmall1</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/views-inside-data-safe-free-cloud-services-guest-post</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/cybersecurity-strategies-best-breed-integrated-security-suites</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/ransomware-today.jpg</image:loc><image:caption>ransomwaretoday</image:caption><image:title>ransomwaretoday</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-i-know-about-setting-up-a-crisis-response-plan</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-named-as-a-top-25-women-in-cybersecurity-by-the-software-report</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MichelleDrolet_LeadersinCyber2021.jpg</image:loc><image:caption>MichelleDroletLeadersinCyber2021</image:caption><image:title>MichelleDroletLeadersinCyber2021</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-towerwall-new-england-bank-technology-retail-banking-conference</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/fake-groupon-discount-emails-carry-malware</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/cybersecurity-insurance-buyers-guide-5-tips-to-consider-when-buying-cybersecurity-insurance-0</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Cybersecurity-Insurance-Buyers-Guide_DownloadCard@2x.jpg</image:loc><image:caption>CybersecurityInsuranceBuyersGuideDownloadCard2x</image:caption><image:title>CybersecurityInsuranceBuyersGuideDownloadCard2x</image:title></image:image><lastmod>2021-08-26</lastmod></url><url><loc>https://blog.towerwall.com/five-things-to-keep-in-mind-before-adopting-a-zero-trust-security-approach</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-named-20-promising-enterprise-security-consulting-companies</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/linkedin-e-mail-scam</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-information-security-summit-highlighted-searchsecurity-com-article</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky-2.jpg</image:loc><image:caption>GaryMiliefsky2</image:caption><image:title>GaryMiliefsky2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/sophos-first-introduce-always-file-encryption-data-shared-across-windows-mac-ios-android-platforms</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/6-steps-to-building-a-strong-breach-response-plan</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/linkedin-data-breach-still-causing-problems</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/worcester-business-journals-forum-review</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-interview-wannacry-ransomware-attack</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-basic-and-easy-cybersecurity-steps</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-know-legal-weed</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/town-hall-cannabis-conversations-michelle-drolet-to-sit-on-panel-in-boston-event</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Michelle-Drolet-2020-crop-cricle-150x150.png</image:loc><image:caption>MichelleDrolet2020cropcricle150x150</image:caption><image:title>MichelleDrolet2020cropcricle150x150</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/how-csc-can-help-build-your-infosec-framework</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/making-bad-situation-worse-equifax-mishandled-breach</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/successful-breakfast-event-data-governance-hero</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/cybersecurity-skills-gap</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/infosec-services-meetup-7-secrets-offensive-security-invite-thursday-april-6-2017</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/meet-ciso-1.png</image:loc><image:caption>meetciso1</image:caption><image:title>meetciso1</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky-2.jpg</image:loc><image:caption>GaryMiliefsky2</image:caption><image:title>GaryMiliefsky2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/1-2-billion-logins-scooped-cybervor-hacking-crew</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/beware-byod-trend-wreaking-havoc</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/worry.jpg</image:loc><image:caption>worry</image:caption><image:title>worry</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/3447-2</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MSFT%20LOGO.png</image:loc><image:caption>MSFTLOGO</image:caption><image:title>MSFTLOGO</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/sophos_logo_PA4_rgb.png</image:loc><image:caption>sophoslogoPA4rgb</image:caption><image:title>sophoslogoPA4rgb</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/1024px-Peiter_Zatko_at_DARPA.jpg</image:loc><image:caption>1024pxPeiterZatkoatDARPA</image:caption><image:title>1024pxPeiterZatkoatDARPA</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Towerwall-ProtectingDataIntegrity-1.jpg</image:loc><image:caption>TowerwallProtectingDataIntegrity1</image:caption><image:title>TowerwallProtectingDataIntegrity1</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/gabriella-coleman.png</image:loc><image:caption>gabriellacoleman</image:caption><image:title>gabriellacoleman</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/guidepoint-sec.png</image:loc><image:caption>guidepointsec</image:caption><image:title>guidepointsec</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/securing-your-remote-workforce-in-the-new-norm</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/introducing-byod-policy-services</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/case-growing-application-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-recently-interviewed-by-superb-crew</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-i-know-about-ransomware-protection</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/malware-attack-spread-email-offices-hp-scanner</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/save-date-information-security-summit-2017</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/top-ten-malicious-lists</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/live-webcam-panel-operationalizing-cybersecurity-3-19-19</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-preventing-id-theft</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/when-it-comes-to-cyber-security-the-weakest-link-is-still-employees</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/secure-your-future-with-a-virtual-ciso-featured-in-infosecurity-magazine</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/patch-tuesday-wrap-up-march-2014-critical-fixes-microsoft-adobe</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-sophos</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-proud-named-trend-micro-platinum-partner</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/edr-xdr-and-mdr-understanding-the-differences-behind-the-acronyms</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/four-signs-your-mobile-app-may-be-at-risk</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/darwin-defense-can-genetic-algorithms-outsmart-malware</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-whats-new-in-pentera</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/the-evil-that-lurks-inside-mobile-apps-2</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/2017-community-leadership-breakfast</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-featured-banker-tradesman</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/top-social-media-scams-and-how-to-avoid-them</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/hackers-show-no-mercy-even-pot-dispensaries</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/vciso-a-pragmatic-path-to-cybersecurity-in-pandemic-times-and-beyond</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/how-to-keep-cybercriminals-out-of-your-apps</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/beware-byod-harming-company</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/7th-annual-information-security-summit-6-6-19</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/2015-international-compendium-of-data-privacy-laws</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-best-practices-for-securing-your-organization-in-2019-1-15-19</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-humans-are-the-new-malware</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/security-alert-anonymous-oppetrol-it-expect-care</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/hackers-leak-1-million-apple-device-ids</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/sophos-expert-talks-cryptolocker-bitcoin-ransom-cnbc-video</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/8-tips-secure-iot-devices</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/create-data-recovery-plan-secure-network</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-named-cyber-security-leader-2016-cyber-defense-magazine</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/microsoft-windows-update-emails-steal-gmail-yahoo-aol-passwords</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/meet-ciso-1.png</image:loc><image:caption>meetciso1</image:caption><image:title>meetciso1</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/do-you-have-the-right-person-for-the-job</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/cybersecurity-insurance-buyers-guide-5-tips-to-consider-when-buying-cybersecurity-insurance</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Cybersecurity-Insurance-Buyers-Guide_DownloadCard@2x.jpg</image:loc><image:caption>CybersecurityInsuranceBuyersGuideDownloadCard2x</image:caption><image:title>CybersecurityInsuranceBuyersGuideDownloadCard2x</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/watch-webinar-8-security-strategies-for-unmanaged-devices</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/8SecurityStrategiesforUnmanagedDevices-Cover.jpg</image:loc><image:caption>8SecurityStrategiesforUnmanagedDevicesCover</image:caption><image:title>8SecurityStrategiesforUnmanagedDevicesCover</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-what-are-your-layers-of-defense</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/6th-annual-information-security-summit-5-24-18</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/information-security-summit-2017-recap-ransomware-application-security-unstructured-data-cloud</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/webinar2-second-nature-security.png</image:loc><image:caption>webinar2secondnaturesecurity</image:caption><image:title>webinar2secondnaturesecurity</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/IMG_3983.jpg</image:loc><image:caption>IMG3983</image:caption><image:title>IMG3983</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/IMG_3978.jpg</image:loc><image:caption>IMG3978</image:caption><image:title>IMG3978</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-mobile-security</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MichelleDrolet_LeadersinCyber2021.jpg</image:loc><image:caption>MichelleDroletLeadersinCyber2021</image:caption><image:title>MichelleDroletLeadersinCyber2021</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/managed-detection-response-how-does-it-play-in-your-cyber-security-program</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/3-keys-enterprise-clouds-secure</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/enterprise-cloud.jpg</image:loc><image:caption>enterprisecloud</image:caption><image:title>enterprisecloud</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Castle%20walls01_0_0.jpg</image:loc><image:caption>Castlewalls0100</image:caption><image:title>Castlewalls0100</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/throw-vendor-bus-fast</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/attention-smbs-be-proactive-in-outsourcing-your-cybersecurity-needs</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MDR_ServiceCard.jpg</image:loc><image:caption>MDRServiceCard</image:caption><image:title>MDRServiceCard</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/PenTestService-Card-1024x405.jpg</image:loc><image:caption>PenTestServiceCard1024x405</image:caption><image:title>PenTestServiceCard1024x405</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/mobile-apps-enterprise-secure</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-named-cyber-security-leader-2016</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/business-threat-mobile-malware-seriously</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Screen-Shot-2018-08-15-at-11_45_30-AM.png</image:loc><image:caption>ScreenShot20180815at114530AM</image:caption><image:title>ScreenShot20180815at114530AM</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/massbay-receives-10000-donation-cyber-security-scholarships</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/mobile-devices-means-tamper-evident-forensic-auditing-2</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/drown-attack-sinks-security-millions-websites</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-2012-database-security-top-threats-tips-webinar</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/iot-could-be-our-downfall</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/CloudServices.jpg</image:loc><image:caption>CloudServices</image:caption><image:title>CloudServices</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/6-ways-launch-targeted-cyberattack</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/apple-icloud-breach-proves-wozniaks-point-cloud-risks</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/expose-targeted-attacks-combat-apts</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-towerwall-sophos-end-ransomware-webinar</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/information-security-summit-2016-review-ransomware-application-vulnerability-hacking-as-an-industry-lead-our-discussion</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/great-article-fraud-speak-learn-lingo-beat-scammers</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/watch-webinar-countdown-to-gdpr</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/general-data-protection-regulation-care</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwalls-michelle-drolet-fox-25-present-massbay-scholarship-foundation-10000-donation</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Michelle-Drolet-2020-crop-cricle-150x150.png</image:loc><image:caption>MichelleDrolet2020cropcricle150x150</image:caption><image:title>MichelleDrolet2020cropcricle150x150</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/expose-cyber-attacks-combat-threats</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-information-securitymalware-alert-vol-13-67-notorious-gameover-malware-kernel-mode-rootkit</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-how-to-build-a-robust-incident-response-capability-for-financial-institutions-8-16-18-3-2</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-security-alert-2013</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/much-data-breach-actually-cost</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/customer-case-study-canna-care</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/byod-trend-continues-grow</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/bank-accountthreat</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-published-networkworld-mobile-apps-putting-data-risk</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-featured-wbj-building-walls-breaking-barriers</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-delivering-secure-compliant-remote-file-access-with-decentralized-cloud-computing</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/listen-recording-recent-webinar-know-risk-tolerance-role-vciso</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/dealing-phishing-messages</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-securityvulnerability-alert-vol-13-62</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-security-vulnerability-alert</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-celebrates-milestone-with-forbes-technology-council</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/internet-explorer-day-exploited-wild</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/reminder-join-information-security-summit-2014</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/nsa-duty-disclose-zero-day-exploits</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/top-10-mobile-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-michelle-drolet-worcester-business-journal-forum-wbjitforum</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-i-know-about-mass-data-security-rules</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/why-penetration-testing-is-critical-to-bolster-your-cybersecurity-efforts</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/PenTestService-Card-2.jpg</image:loc><image:caption>PenTestServiceCard2</image:caption><image:title>PenTestServiceCard2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-myths-about-data-encryption</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/mobile-apps-putting-data-risk-2</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-know-hiring-vciso</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/views-inside-successful-byod-policy-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/7-steps-proactive-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/dark-web-scan-tool-by-alertlogic</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-towerwall-at-these-upcoming-infosec-events</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/SecSumm_eviteNEW.jpg</image:loc><image:caption>SecSummeviteNEW</image:caption><image:title>SecSummeviteNEW</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/17b0b2d2231c49dd99e6b64a71ffa6ea.gif</image:loc><image:caption>17b0b2d2231c49dd99e6b64a71ffa6ea</image:caption><image:title>17b0b2d2231c49dd99e6b64a71ffa6ea</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/bsidesbos_est1.jpg</image:loc><image:caption>bsidesbosest1</image:caption><image:title>bsidesbosest1</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/the-gdpr-is-a-journey-not-a-destination</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/full-rules-protecting-net-neutrality-released-fcc</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/4-steps-to-launch-a-security-awareness-training-program</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-published-infosecurity-magazine-secure-future-virtual-ciso</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-to-join-offit-kurman-for-a-cannabis-infosec-webinar</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-security-vulnerability-alert-microsoft-announces-bulletins-patch-tuesday-including-office-mac</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/event-stooge-data-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-sophos-upcoming-event-todays-threat-landscape-stay-safe</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/metrowest-chamber-commerce-118th-annual-meeting</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/3406-2</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/ransomware-today.jpg</image:loc><image:caption>ransomwaretoday</image:caption><image:title>ransomwaretoday</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/much-will-non-compliance-gdpr-cost</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/the-worst-hacks-of-2015</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/the-challenges-of-third-party-risk-management</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/facebook-leaks-lot-leakier-facebook-letting</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/cutcaster901308946BatteringRamvintageengravingsmall-1.jpg</image:loc><image:caption>cutcaster901308946BatteringRamvintageengravingsmall1</image:caption><image:title>cutcaster901308946BatteringRamvintageengravingsmall1</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-heartbleed-vulnerability-alert</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-securityvulnerability-alert-vol-13-96</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/worst-passwords-choose</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/build-security-app-development</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-quoted-techtarget</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/save-date-join-towerwall-information-security-summit-2014</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/the-end-of-ransomware</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-security-patch-alert-vol-13-63</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-towerwall-at-the-issa-new-england-september-chapter-meeting</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/4-dangerous-security-assumptions-to-avoid</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Screen-Shot-2018-11-02-at-12_35_38-AM-1024x578.png</image:loc><image:caption>ScreenShot20181102at123538AM1024x578</image:caption><image:title>ScreenShot20181102at123538AM1024x578</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/positive-signs-for-the-future-of-cybersecurity</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/vendor-review-helps-hospital-schedule-covid-vaccinations</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/PenTestService-Card-2.jpg</image:loc><image:caption>PenTestServiceCard2</image:caption><image:title>PenTestServiceCard2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/lets-meetup-learn-phishing-threats-organization</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky-2.jpg</image:loc><image:caption>GaryMiliefsky2</image:caption><image:title>GaryMiliefsky2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-know-securing-mobile-devices</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-talks-ted-magazine-companies-can-prepare-security-breach</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Michelle-Drolet-2020-crop-cricle-150x150.png</image:loc><image:caption>MichelleDrolet2020cropcricle150x150</image:caption><image:title>MichelleDrolet2020cropcricle150x150</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/save-the-date-information-security-summit-2016</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/ip-wars-whos-real-enemy</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-separation-corporate-personal-practices-securing-data-mobile-devices</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-listed-20-promising-security-consulting-companies</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/healthcare-gov-security-properly-tested</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/PenTestService-Card-2.jpg</image:loc><image:caption>PenTestServiceCard2</image:caption><image:title>PenTestServiceCard2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/introducing-security-training-toolkit</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/byod-brings-war-worry</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/worry.jpg</image:loc><image:caption>worry</image:caption><image:title>worry</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/sophos-launches-security-heartbeat-to-bring-together-network-endpoint-capabilities</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/firefox-32-0-fixes-holes-shakes-ssl-certs-introduces-certificate-pinning</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/protect-yourself-from-ad-threats-and-malvertising</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-informationvulnerability-alert-vol-13-69-cisco-security-notice</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-us-inaugural-infosec-services-meetup</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky-2.jpg</image:loc><image:caption>GaryMiliefsky2</image:caption><image:title>GaryMiliefsky2</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/meet-ciso-1.png</image:loc><image:caption>meetciso1</image:caption><image:title>meetciso1</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-information-security-alert-vol-14-07-watch-out-for-april-fools-scamming-on-friday</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-data-privacy-alert-vol-13-81-anthem-healthcare-breach</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-shares-tech-tips-on-how-to-get-devs-thinking-about-infosec</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/escalating-cyberattacks-on-healthcare-organizations-highlight-need-for-security-interventions</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/PenTestService-Card-2.jpg</image:loc><image:caption>PenTestServiceCard2</image:caption><image:title>PenTestServiceCard2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-cybersecurity-trends-watch-2017</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/skilledIT.jpg</image:loc><image:caption>skilledIT</image:caption><image:title>skilledIT</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Hackers-dont-need-experience.jpg</image:loc><image:caption>Hackersdontneedexperience</image:caption><image:title>Hackersdontneedexperience</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Third-party-vendors.jpg</image:loc><image:caption>Thirdpartyvendors</image:caption><image:title>Thirdpartyvendors</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/DDoS-attacks-on-IoT-devices.jpg</image:loc><image:caption>DDoSattacksonIoTdevices</image:caption><image:title>DDoSattacksonIoTdevices</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Ransomware.jpg</image:loc><image:caption>Ransomware</image:caption><image:title>Ransomware</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/can-machine-learning-used-shore-cyber-defenses</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/8-common-pen-testing-mistakes-and-how-to-avoid-them</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/PenTestService-Card-2.jpg</image:loc><image:caption>PenTestServiceCard2</image:caption><image:title>PenTestServiceCard2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/upcoming-partner-webinars</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky.jpg</image:loc><image:caption>GaryMiliefsky</image:caption><image:title>GaryMiliefsky</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-i-know-about-covid-19-scams</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-how-to-build-a-robust-incident-response-capability-for-financial-institutions-8-16-18-2</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/software-vulnerabilities-hit-a-record-high-in-2014-report-says</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/passing-the-cybersecurity-baton-to-a-vciso</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/hundreds-cloud-apps-still-vulnerable-drown</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/congratulations-partner-snoopwall-named-one-50-fastest-growing-tech-companies-2016</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/phone-5s-phishing-mail-arrives-time-launch</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-know-pot-compliance</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Cybersecurity-Insurance-Buyers-Guide_DownloadCard@2x.jpg</image:loc><image:caption>CybersecurityInsuranceBuyersGuideDownloadCard2x</image:caption><image:title>CybersecurityInsuranceBuyersGuideDownloadCard2x</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MDR_ServiceCard.jpg</image:loc><image:caption>MDRServiceCard</image:caption><image:title>MDRServiceCard</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MichelleDrolet_LeadersinCyber2021.jpg</image:loc><image:caption>MichelleDroletLeadersinCyber2021</image:caption><image:title>MichelleDroletLeadersinCyber2021</image:title></image:image><lastmod>2021-07-20</lastmod></url><url><loc>https://blog.towerwall.com/microsoft-discovers-chinese-malware-pre-installed-pcs</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/save-the-date-information-security-summit-december-2020</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/an-important-message-from-towerwalls-ceo</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Michelle-Drolet-2020-crop-cricle-150x150.png</image:loc><image:caption>MichelleDrolet2020cropcricle150x150</image:caption><image:title>MichelleDrolet2020cropcricle150x150</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/the-7-deadly-sins-of-endpoint-detection-response</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/recommended-reading-entrepreneur</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/stay-secure-cloud-sophos-cloud-endpoint</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-how-to-build-a-robust-incident-response-capability-for-financial-institutions-8-16-18-3</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/patch-patch-can-software-flawed</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Strategy_468.gif</image:loc><image:caption>Strategy468</image:caption><image:title>Strategy468</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/infosec-services-meetup-staying-top-info-sec-game-candy-alexander-thursday-january-19-2017</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/meet-ciso-1.png</image:loc><image:caption>meetciso1</image:caption><image:title>meetciso1</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/GaryMiliefsky-2.jpg</image:loc><image:caption>GaryMiliefsky2</image:caption><image:title>GaryMiliefsky2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/get-serious-about-consumer-data-protection</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MichelleDrolet_LeadersinCyber2021.jpg</image:loc><image:caption>MichelleDroletLeadersinCyber2021</image:caption><image:title>MichelleDroletLeadersinCyber2021</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwalls-latest-article-bridging-the-cybersecurity-skills-gap-3-big-steps-featured-in-informationweek-dark-reading</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/deciding-vulnerability-scanning-penetration-testing</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-tips-to-help-you-block-ransomware</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/verify-security-mobile-apps</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-know-security-precautions</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/dont-be-mad-at-ransomware-attackers-be-grateful</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/internet-explorer-net-ipv6-shockwave-top-february-2014-patch-tuesday-list</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/applying-more-critical-security-controls-to-your-organization</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-ceo-michelle-drolet-voted-outstanding-woman-worcester-business-journal</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/30317820674_e6cb06f324_o.jpg</image:loc><image:caption>30317820674e6cb06f324o</image:caption><image:title>30317820674e6cb06f324o</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-creating-byod-policy</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/compliance-combines-vulnerability-scanning-create-aegify</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/security-professionals-creative-penetration-testing-and-it</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/another-successful-information-security-summit</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-towerwall-sophos-ransomware-webinar</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/cryptolocker-ransomware-works-learn-prevention-cleanup-recovery</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/critical-fixes-office-outlook-september-patch-tuesday</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/PenTestService-Card-2.jpg</image:loc><image:caption>PenTestServiceCard2</image:caption><image:title>PenTestServiceCard2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/marijuana-industry-brings-compliance-high-bar</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-how-to-build-a-robust-incident-response-capability-for-financial-institutions-8-16-18</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/tips-protect-business-ransomware</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/4-es-enterprise-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/tips-testing-mobile-app-security</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/build-right-nists-cybersecurity-framework</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/7-potential-security-concerns-for-wearables</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/introducing-quarterly-newsletter-data-security-review</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/devices-problems</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/webinar2-second-nature-security.png</image:loc><image:caption>webinar2secondnaturesecurity</image:caption><image:title>webinar2secondnaturesecurity</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/steps-respond-recover-sophisticated-security-attacks</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwalls-candy-alexander-receives-2014-issa-award-hall-fame</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/botnets-network-really-protected</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/the-ccpa-is-an-opportunity-to-get-your-data-security-house-in-order</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/shellshock-latest-mac-osx-linux-vulnerabilty</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-application-security-alert-vol-13-73</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/meetup-armis-iot-security-thursday-january-11-2018-2</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Screen-Shot-2018-08-15-at-11_45_30-AM.png</image:loc><image:caption>ScreenShot20180815at114530AM</image:caption><image:title>ScreenShot20180815at114530AM</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/meet-ciso-1.png</image:loc><image:caption>meetciso1</image:caption><image:title>meetciso1</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/achieving-long-term-resilience-nists-cybersecurity-framework</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/when-in-doubt-hire-virtually-making-the-case-for-virtual-security-expertise</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/military-teach-cybersecurity</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/scan-the-dark-web-for-threat-intelligence</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/join-us-for-the-issa-new-england-virtual-chapter-meeting-january-21-2016</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Towerwall-ProtectingDataIntegrity-1.jpg</image:loc><image:caption>TowerwallProtectingDataIntegrity1</image:caption><image:title>TowerwallProtectingDataIntegrity1</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/DigitalGuardian.jpg</image:loc><image:caption>DigitalGuardian</image:caption><image:title>DigitalGuardian</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/KasperskyLab.jpg</image:loc><image:caption>KasperskyLab</image:caption><image:title>KasperskyLab</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/ResilientSystems.jpg</image:loc><image:caption>ResilientSystems</image:caption><image:title>ResilientSystems</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/deidre-diamond.jpg</image:loc><image:caption>deidrediamond</image:caption><image:title>deidrediamond</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/meet-ciso-1.png</image:loc><image:caption>meetciso1</image:caption><image:title>meetciso1</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/using-third-party-vendors-keep-a-close-eye-on-them</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-i-know-about-email-scams</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/phishing-is-the-worst-thing-for-your-business-just-ask-colonial-pipeline</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-best-practices-for-protecting-your-business-from-cybercrime-2-19-19</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/PenTestService-Card-2.jpg</image:loc><image:caption>PenTestServiceCard2</image:caption><image:title>PenTestServiceCard2</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/seven-tips-for-a-successful-security-awareness-training-program</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-passwords</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/syria-launch-major-cyberattack-us</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/cutcaster901308946BatteringRamvintageengravingsmall-1.jpg</image:loc><image:caption>cutcaster901308946BatteringRamvintageengravingsmall1</image:caption><image:title>cutcaster901308946BatteringRamvintageengravingsmall1</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/get-smart-when-it-comes-to-using-cloud-based-services-for-file-sharing</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/mobile-devices-means-tamper-evident-forensic-auditing</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/introducing-towewalls-alternative-cloud-based-file-sharing-solutions</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/10-things-i-know-about-cybersecurity</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-profiled-boston-voyager</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Drolet_113145adj-682x1024.jpg</image:loc><image:caption>Drolet113145adj682x1024</image:caption><image:title>Drolet113145adj682x1024</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-join-sophos-twinstate-gdpr-webinar</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/cybersecurity-strong-weakest-link-employees</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/photo-zip-stolen-nude-photos-police-investigations</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/top-hacks-year</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-what-exactly-is-automated-penetration-testing-2-27-19-2</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-data-privacy-alert-vol-13-82-ghost-vulnerability</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/watch-webinar-the-rise-of-targeted-ransomware</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/great-turnout-inaugural-infosec-services-meetup</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Meetup2-e1477409535936.jpg</image:loc><image:caption>Meetup2e1477409535936</image:caption><image:title>Meetup2e1477409535936</image:title></image:image><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/Michelle-Drolet-2020-crop-cricle-150x150.png</image:loc><image:caption>MichelleDrolet2020cropcricle150x150</image:caption><image:title>MichelleDrolet2020cropcricle150x150</image:title></image:image><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/the-anatomy-of-a-sophisticated-large-scale-ransomware-attack</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/michelle-drolet-featured-in-women-ceos-on-blazing-a-trail-to-the-top</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/towerwall-information-security-alert-vol-13-50-making-phishing-complex-purpose</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/webinar-7-best-practices-for-securing-the-public-cloud</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/5-information-security-trends-2016</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/byod-means-bring-dilemma</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/moving-to-the-cloud-consider-these-security-best-practices-before-you-do</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/dont-let-attackers-weaponize-fear-use-these-cyber-resilience-recommendations</loc><lastmod>2021-07-01</lastmod></url><url><loc>https://blog.towerwall.com/alienvault-announces-new-training-incident-response-usm-appliance-analysts</loc><image:image><image:loc>https://9268980.fs1.hubspotusercontent-na1.net/hubfs/9268980/Imported_Blog_Media/MichelleDrolet_LeadersinCyber2021.jpg</image:loc><image:caption>MichelleDroletLeadersinCyber2021</image:caption><image:title>MichelleDroletLeadersinCyber2021</image:title></image:image><lastmod>2021-07-01</lastmod></url></urlset>