<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://blog.qualys.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2018-06-22 12:33:31 GMT -->
	<url>
		<loc>https://blog.qualys.com/news/2018/06/22/qsc18-virtual-edition-global-it-asset-discovery-inventory-and-management</loc>
		<lastmod>2018-06-22T17:45-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/06/22/qualys-cloud-platform-vm-sca-pc-8-14-new-features</loc>
		<lastmod>2018-06-22T11:33-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/indication-of-compromise/2018/06/21/qsc18-virtual-edition-securing-hybrid-it-environments-from-endpoints-to-clouds</loc>
		<lastmod>2018-06-22T06:26-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/06/19/gdpr-is-here-web-app-security-is-a-must</loc>
		<lastmod>2018-06-19T10:36-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/06/18/get-emerging-threats-visibility-with-qualys-ioc-widgets</loc>
		<lastmod>2018-06-18T10:34-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/06/15/qsc18-virtual-edition-building-security-in-the-qualys-cloud-platform-and-architecture</loc>
		<lastmod>2018-06-15T07:07-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/06/15/qsc18-virtual-edition-securing-our-networks-and-enabling-the-digital-transformation-one-app-at-a-time</loc>
		<lastmod>2018-06-15T06:50-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/indication-of-compromise/2018/06/14/indication-of-compromise-another-key-practice-for-gdpr-compliance-2</loc>
		<lastmod>2018-06-18T07:38-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2018/06/12/june-patch-tuesday-new-speculative-store-bypass-fixes-adobe-vulns</loc>
		<lastmod>2018-06-12T12:11-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/06/06/its-the-dawn-of-the-digital-transformation-age-do-you-know-where-your-certificates-are</loc>
		<lastmod>2018-06-05T08:50-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/06/05/gdpr-is-here-put-file-integrity-monitoring-in-your-toolbox</loc>
		<lastmod>2018-06-05T08:30-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/06/04/gain-visibility-and-continuous-security-across-all-your-public-clouds</loc>
		<lastmod>2018-06-04T13:25-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/05/31/gdpr-is-here-assess-the-security-configurations-of-your-it-systems</loc>
		<lastmod>2018-06-01T14:45-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/05/30/all-hands-memo-to-small-home-office-owners-reboot-your-routers</loc>
		<lastmod>2018-05-30T08:20-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/05/29/qualys-cloud-platform-2-33-new-features</loc>
		<lastmod>2018-06-14T15:22-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/05/29/gdpr-is-here-assess-risk-from-vendors-and-from-internal-teams</loc>
		<lastmod>2018-05-31T07:25-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/05/27/qsc-2018-mumbai-finds-qualys-at-the-forefront-of-digital-transformation-security</loc>
		<lastmod>2018-05-29T16:28-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/05/25/gdpr-compliance-manage-procedural-risk-assessments-with-new-gdpr-templates</loc>
		<lastmod>2018-05-29T16:31-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/05/24/qualys-policy-compliance-notification-policy-library-update-16</loc>
		<lastmod>2018-05-24T10:08-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/05/24/gdpr-is-here-manage-vulnerabilities-and-prioritize-threat-remediation</loc>
		<lastmod>2018-05-30T12:02-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/05/21/gdpr-is-here-achieve-the-superior-data-breach-prevention-and-detection-required-with-qualys</loc>
		<lastmod>2018-05-30T12:05-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/05/16/devsecops-practical-steps-to-seamlessly-integrate-security-into-devops</loc>
		<lastmod>2018-06-11T11:53-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/05/15/securing-the-hybrid-cloud-a-guide-to-using-security-controls-tools-and-automation</loc>
		<lastmod>2018-06-11T11:52-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/05/14/what-weve-got-here-is-failure-to-communicate-os-vendors-misread-cpu-docs-create-flaw</loc>
		<lastmod>2018-05-14T13:47-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2018/05/08/may-2018-patch-tuesday-medium-weight-but-one-active-exploit-needs-attention</loc>
		<lastmod>2018-05-08T11:59-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/05/07/timely-password-change-announcement-from-twitter-as-new-bugs-hit-webex-and-gpon-routers</loc>
		<lastmod>2018-05-11T12:26-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/05/07/how-to-prioritize-vulnerabilities-in-a-modern-it-environment</loc>
		<lastmod>2018-05-04T09:31-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/04/27/gaining-control-over-your-digital-certificates</loc>
		<lastmod>2018-04-30T15:26-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/04/25/when-preparing-for-gdpr-dont-neglect-public-cloud-security</loc>
		<lastmod>2018-06-06T08:52-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/indication-of-compromise/2018/04/24/orangeworm-targeting-healthcare-industry-since-2015-now-exposed</loc>
		<lastmod>2018-04-24T14:49-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/04/23/qualys-was-swagger-for-rest-api-security-testing</loc>
		<lastmod>2018-04-23T14:59-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/04/19/the-sky-is-falling-responding-rationally-to-headline-vulnerabilities</loc>
		<lastmod>2018-04-19T16:31-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/04/18/dr-michio-kaku-paints-fascinating-picture-of-the-future-at-qualys-rsa-boooth</loc>
		<lastmod>2018-04-18T11:04-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/04/16/qualys-cloud-security-must-move-towards-transparent-orchestration</loc>
		<lastmod>2018-04-16T17:56-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/04/13/indication-of-compromise-another-key-practice-for-gdpr-compliance</loc>
		<lastmod>2018-04-13T09:02-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2018/04/10/april-patch-tuesday-63-microsoft-vulnerabilities-19-for-adobe</loc>
		<lastmod>2018-04-10T11:37-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/04/09/vendor-risk-bites-sears-delta-and-best-buy-while-saks-and-lord-taylor-grapple-with-a-data-breach</loc>
		<lastmod>2018-04-09T13:36-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/04/06/call-for-customer-presentations-at-black-hat-usa-2018</loc>
		<lastmod>2018-04-06T11:56-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/04/04/put-fim-in-your-gdpr-toolbox</loc>
		<lastmod>2018-04-04T12:35-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/04/02/microsoft-misfires-with-meltdown-patch-while-wannacry-pops-up-at-boeing</loc>
		<lastmod>2018-04-02T16:51-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2018/03/30/a-patch-for-the-meltdown-patch-released-out-of-band-thursday-night</loc>
		<lastmod>2018-03-30T13:41-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/03/30/continuous-web-security-assessment-for-production-and-devops-environments</loc>
		<lastmod>2018-04-25T07:53-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/03/29/securing-your-cloud-and-container-devops-pipeline</loc>
		<lastmod>2018-03-29T10:04-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/03/28/qid-86725-f5-big-ip-load-balancer-internal-ip-address-disclosure</loc>
		<lastmod>2018-04-02T11:48-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/03/26/feds-take-on-foreign-hackers-while-880k-orbitz-customers-likely-affected-by-data-breach</loc>
		<lastmod>2018-04-02T11:03-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/03/22/qualys-cloud-platform-vm-pc-8-13-new-features</loc>
		<lastmod>2018-03-22T15:50-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/03/19/webcast-qa-the-gdpr-deadline-readiness-and-impact-to-global-organizations-outside-the-eu</loc>
		<lastmod>2018-04-04T12:36-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/03/14/qualys-policy-compliance-notification-policy-library-update-15</loc>
		<lastmod>2018-03-14T09:54-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2018/03/13/march-patch-tuesday-75-microsoft-vulnerabilities-2-for-adobe</loc>
		<lastmod>2018-03-13T16:48-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/03/13/pci-dss-v3-2-exposing-session-id-in-url</loc>
		<lastmod>2018-03-13T09:48-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/03/09/cryptomining-is-all-the-rage-among-hackers-as-ddos-amplification-attacks-grow</loc>
		<lastmod>2018-03-09T14:25-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/03/07/gdpr-the-stakes-are-high-and-time-is-of-the-essence</loc>
		<lastmod>2018-04-04T12:40-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/03/05/tls-1-0-deprecation-for-qualys-cloud-platform</loc>
		<lastmod>2018-05-08T11:27-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/03/02/apple-in-the-infosec-spotlight-as-github-falls-prey-to-amplified-ddos-attack</loc>
		<lastmod>2018-03-02T07:46-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/02/27/recline-on-the-qualys-couch-examining-patching-behavior</loc>
		<lastmod>2018-02-27T10:08-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/02/20/qualys-platform-suite-2-32-new-features</loc>
		<lastmod>2018-03-23T08:17-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/02/16/hackers-hit-the-olympics-while-patch-tuesday-and-meltdown-spectre-keep-it-departments-on-edge</loc>
		<lastmod>2018-06-22T17:20-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2018/02/13/february-patch-tuesday-55-microsoft-vulnerabilities-patched-45-for-adobe</loc>
		<lastmod>2018-02-13T11:49-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/02/12/securing-it-assets-by-prioritizing-protection-and-remediation</loc>
		<lastmod>2018-02-12T09:38-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/02/09/intel-makes-spectre-patch-progress-while-adobe-grapples-with-latest-flash-bug</loc>
		<lastmod>2018-02-09T08:37-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/02/06/if-you-think-file-integrity-monitoring-is-boring-think-again</loc>
		<lastmod>2018-04-04T11:18-07:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/02/05/for-gdpr-compliance-web-app-security-is-a-must</loc>
		<lastmod>2018-02-13T13:42-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2018/02/02/forward-secrecy-authenticated-encryption-and-robot-grading-update</loc>
		<lastmod>2018-03-06T11:40-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/02/02/meltdown-spectre-new-concerns-over-intel-patches-as-hackers-test-exploits</loc>
		<lastmod>2018-02-02T12:53-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/01/31/continuous-security-and-compliance-monitoring-for-global-it-assets</loc>
		<lastmod>2018-02-08T14:26-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/01/26/meltdown-spectre-intel-nixes-patches-tech-ceos-questioned-on-information-blackout</loc>
		<lastmod>2018-01-31T17:05-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/01/24/qualys-cloud-suite-8-12-new-features</loc>
		<lastmod>2018-01-31T17:48-08:00</lastmod>
		<priority>0.9</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/01/18/meltdown-and-spectre-arent-business-as-usual</loc>
		<lastmod>2018-01-22T06:09-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2018/01/16/meltdown-spectre-mitigation-is-a-work-in-progress</loc>
		<lastmod>2018-03-30T12:23-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/01/16/continuous-security-compliance-webcast-series</loc>
		<lastmod>2018-05-30T13:15-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/01/15/qualys-policy-compliance-notification-policy-library-update-14</loc>
		<lastmod>2018-01-31T17:25-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2018/01/09/january-patch-tuesday-meltdown-spectre-16-critical-microsoft-patches-1-adobe-patch</loc>
		<lastmod>2018-01-10T14:00-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2018/01/08/meltdown-spectre-and-qualys-cloud-platform</loc>
		<lastmod>2018-03-21T13:16-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/01/08/pci-dss-v3-2-private-ip-address-disclosure</loc>
		<lastmod>2018-01-31T17:29-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/01/05/visualizing-spectre-meltdown-impact-and-remediation-progress</loc>
		<lastmod>2018-01-05T17:30-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2018/01/05/qualys-cloud-platform-2-31-new-features</loc>
		<lastmod>2018-02-20T12:20-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2018/01/03/processor-vulnerabilities-meltdown-and-spectre</loc>
		<lastmod>2018-01-12T18:04-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/12/14/cloud-security-improves-but-much-work-still-remains-to-be-done</loc>
		<lastmod>2018-06-11T11:53-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/12/13/call-for-customer-presentations-at-rsa-conference-2018</loc>
		<lastmod>2018-02-05T14:11-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/12/12/december-patch-tuesday-quiet-end-to-the-year</loc>
		<lastmod>2017-12-12T13:08-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/12/07/implementing-the-cis-20-critical-security-controls-make-your-infosec-foundation-rock-solid</loc>
		<lastmod>2017-12-13T13:21-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/12/04/implementing-the-cis-20-critical-security-controls-delving-into-more-sophisticated-techniques</loc>
		<lastmod>2018-06-11T11:55-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/11/30/qualys-policy-compliance-notification-policy-library-update-13</loc>
		<lastmod>2017-11-30T12:59-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/11/30/qualys-cloud-suite-8-11-2-new-features</loc>
		<lastmod>2017-12-01T15:46-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/11/28/qualys-was-new-detections-for-xml-external-entities-xxe</loc>
		<lastmod>2017-12-22T08:30-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/11/28/implementing-the-cis-20-critical-security-controls-building-upon-foundational-cyber-hygiene</loc>
		<lastmod>2017-12-05T18:14-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/11/14/november-patch-tuesday-53-vulnerabilities-and-a-massive-adobe-update</loc>
		<lastmod>2017-11-14T12:29-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/11/14/implementing-the-cis-20-critical-security-controls-slash-risk-of-cyber-attacks-by-85</loc>
		<lastmod>2018-06-06T09:39-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/11/08/webcast-qa-devsecops-building-continuous-security-into-it-and-app-infrastructures</loc>
		<lastmod>2017-11-08T09:36-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/11/02/new-silence-banking-trojan-copies-carbanak-to-steal-from-banks-analysis-with-iocs</loc>
		<lastmod>2017-11-02T11:12-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/11/01/case-study-cisco-group-bakes-security-into-web-app-dev-process</loc>
		<lastmod>2017-11-01T10:36-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/10/31/devsecops-building-continuous-security-into-it-and-app-infrastructures</loc>
		<lastmod>2018-04-25T07:58-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/10/27/infosec-pros-must-fasten-their-seatbelts-for-digital-transformation-ride</loc>
		<lastmod>2017-12-11T13:34-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/10/26/webcast-qa-automating-the-cis-critical-security-controls</loc>
		<lastmod>2017-10-26T09:51-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/10/24/bad-rabbit-ransomware</loc>
		<lastmod>2017-10-26T19:21-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/10/23/aclu-attorney-u-s-citizens-legally-unsheltered-from-abusive-surveillance</loc>
		<lastmod>2017-12-11T13:33-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/10/19/gartner-the-pursuit-of-perfection-weakens-infosec-effectiveness</loc>
		<lastmod>2017-12-11T13:21-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/10/19/qsc17-qualys-battles-the-silos-helps-protect-digital-transformation-efforts</loc>
		<lastmod>2017-12-11T13:20-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/10/18/the-shift-from-securing-our-networks-to-enabling-the-digital-transformation-of-our-enterprises</loc>
		<lastmod>2017-12-11T13:20-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/10/18/qualys-cloud-suite-8-11-new-features</loc>
		<lastmod>2017-10-18T11:44-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/10/18/qualys-policy-compliance-notification-policy-library-update-12</loc>
		<lastmod>2017-10-18T07:43-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/10/18/bugcrowd-integration-now-available-in-qualys-web-application-scanning</loc>
		<lastmod>2017-12-11T13:19-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/10/16/qsc17-focuses-on-digital-transformations-challenges-and-opportunities</loc>
		<lastmod>2017-12-11T13:19-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/10/12/the-critical-security-controls-basic-cyber-security-hygiene-for-your-organization</loc>
		<lastmod>2017-10-12T09:07-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/10/10/october-patch-tuesday-28-critical-microsoft-vulnerabilities</loc>
		<lastmod>2017-10-10T12:32-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/09/26/achieve-continuous-security-and-compliance-with-the-cis-critical-security-controls</loc>
		<lastmod>2017-09-26T13:16-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2017/09/26/google-and-mozilla-deprecating-existing-symantec-certificates</loc>
		<lastmod>2018-02-07T12:47-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2017/09/19/fixing-hpkp-with-certificate-constraints</loc>
		<lastmod>2017-09-26T07:29-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/09/12/september-patch-tuesday-27-critical-vulnerabilities-from-microsoft-plus-critical-adobe-patches</loc>
		<lastmod>2017-09-13T17:26-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2017/09/05/fixing-hpkp-with-pin-revocation</loc>
		<lastmod>2017-09-05T19:17-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/08/29/sans-institute-hackers-paint-a-bullseye-on-your-employees-and-endpoints</loc>
		<lastmod>2018-03-20T17:16-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/08/24/qualys-cloud-platform-2-30-new-features</loc>
		<lastmod>2018-02-20T12:21-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/08/10/call-for-papers-qualys-security-conference-2017</loc>
		<lastmod>2017-08-15T18:37-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/08/09/qualys-policy-compliance-notification-policy-library-update-11</loc>
		<lastmod>2017-08-09T11:42-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/08/09/countdown-to-gdpr-it-policy-compliance</loc>
		<lastmod>2018-02-13T13:41-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/08/08/qualys-cloud-suite-8-10-2-new-features</loc>
		<lastmod>2017-08-08T14:16-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/08/08/august-patch-tuesday-25-critical-microsoft-vulnerabilities-43-for-adobe</loc>
		<lastmod>2017-09-28T16:36-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/08/07/cybersecurity-report-threat-landscape-gets-more-sophisticated</loc>
		<lastmod>2017-08-07T09:43-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/08/02/countdown-to-gdpr-manage-vulnerabilities</loc>
		<lastmod>2018-02-13T13:43-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/07/26/how-to-secure-public-clouds-while-boosting-digital-transformation</loc>
		<lastmod>2018-03-20T17:18-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/07/24/introducing-the-qualys-new-look-and-positioning</loc>
		<lastmod>2017-07-24T17:46-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/07/19/countdown-to-gdpr-assess-vendor-risk</loc>
		<lastmod>2018-02-13T13:44-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/07/18/securing-public-clouds-for-digital-transformation-success</loc>
		<lastmod>2017-10-09T11:59-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/07/12/qa-conducting-cloud-based-vendor-risk-audits-with-qualys-saq</loc>
		<lastmod>2017-09-12T12:19-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/07/11/july-patch-tuesday-19-critical-vulnerabilities-from-microsoft-plus-critical-adobe-patches</loc>
		<lastmod>2017-07-12T09:39-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/07/11/countdown-to-gdpr-prioritize-vulnerability-remediation</loc>
		<lastmod>2018-03-28T09:09-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2017/06/30/ssl-labs-grading-redesign-preview-1</loc>
		<lastmod>2018-01-16T14:57-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/06/29/save-time-by-streamlining-vendor-risk-assessments-in-the-cloud</loc>
		<lastmod>2017-06-28T15:00-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/06/28/countdown-to-gdpr-get-2020-visibility-into-your-it-assets</loc>
		<lastmod>2018-02-13T13:45-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2017/06/27/petya-ransomware-what-you-need-to-know</loc>
		<lastmod>2017-06-28T08:19-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/06/26/qualys-cloud-suite-8-10-1-new-features</loc>
		<lastmod>2017-06-26T16:23-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/06/21/qualys-cloud-platform-2-28-new-features</loc>
		<lastmod>2018-02-20T12:24-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/06/21/countdown-to-gdpr-reduce-your-risk</loc>
		<lastmod>2018-02-13T13:45-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/06/19/qualys-cloud-platform-2-27-new-features</loc>
		<lastmod>2018-02-20T12:24-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/06/19/visualizing-the-stack-clash-vulnerability-with-dashboards</loc>
		<lastmod>2017-06-19T21:29-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash</loc>
		<lastmod>2017-06-28T11:04-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/06/13/microsoft-fixes-94-security-issues-in-massive-june-update</loc>
		<lastmod>2017-06-15T16:45-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/06/13/dynamic-questionnaire-accelerate-quick-and-efficient-responses-with-question-gating</loc>
		<lastmod>2017-06-13T10:45-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/06/05/lessons-learned-from-sql-injection-fix-in-joomla-3-7-0</loc>
		<lastmod>2018-04-25T07:51-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2017/05/26/samba-vulnerability-cve-2017-7494</loc>
		<lastmod>2017-05-26T13:32-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/05/23/digging-into-wannacry-details-answers-to-your-burning-questions</loc>
		<lastmod>2018-03-20T17:24-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/05/19/no-more-tears-wannacry-highlights-importance-of-prompt-precise-vulnerability-remediation</loc>
		<lastmod>2018-03-20T17:25-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2017/05/18/visualizing-wannacry-shadow-brokers-with-dashboards</loc>
		<lastmod>2017-05-18T15:18-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/05/18/better-trusted-scanning-with-qualys-cyberark-integration</loc>
		<lastmod>2017-05-18T09:59-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/05/17/for-gdpr-readiness-you-need-visibility-into-your-it-assets</loc>
		<lastmod>2017-09-25T13:45-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/05/15/qualys-cloud-suite-8-10-new-features</loc>
		<lastmod>2017-05-15T18:20-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2017/05/12/how-to-rapidly-identify-assets-at-risk-to-wannacry-ransomware-and-eternalblue-exploit</loc>
		<lastmod>2017-06-01T12:42-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/05/11/qualys-policy-compliance-notification-policy-library-update-10</loc>
		<lastmod>2017-05-11T15:40-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2017/05/10/intel-amt-vulnerability</loc>
		<lastmod>2017-05-10T10:46-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/05/09/adobe-fixes-half-dozen-flash-vulnerabilities-and-more</loc>
		<lastmod>2017-05-09T17:48-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/05/09/microsoft-fixes-malware-protection-engine-and-several-0-day-vulnerabilities</loc>
		<lastmod>2017-05-10T10:35-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/05/04/virtual-patching-a-lifesaver-for-web-app-security</loc>
		<lastmod>2017-08-14T10:58-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/04/25/qualys-support-for-reserve-bank-of-india-rbi-cyber-security-guidelines</loc>
		<lastmod>2017-04-28T10:18-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/04/25/shadow-brokers-fix-for-ibm-lotus-domino-released</loc>
		<lastmod>2017-04-25T10:15-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/04/20/qualys-cloud-platform-2-26-new-features</loc>
		<lastmod>2018-02-20T12:24-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/04/18/oracle-plugs-struts-hole-along-with-299-total-vulnerabilities</loc>
		<lastmod>2017-04-18T16:37-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/04/18/pci-dss-v3-2-migrating-from-ssl-and-early-tls-v1-1</loc>
		<lastmod>2017-04-18T13:29-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2017/04/15/the-shadow-brokers-release-zero-day-exploit-tools</loc>
		<lastmod>2017-04-18T13:16-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/04/11/april-2017-patch-tuesday-video-highlights</loc>
		<lastmod>2017-04-26T11:59-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/04/11/microsoft-fixes-45-vulnerabilities-with-new-security-update-guide-says-goodbye-to-security-updates</loc>
		<lastmod>2017-04-26T11:59-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/04/11/adobe-fixes-flash-pdf-reader-and-photoshop-in-april</loc>
		<lastmod>2017-04-11T09:50-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/04/10/it-asset-inventory-systems-and-cmdbs-a-marriage-made-in-infosec-heaven</loc>
		<lastmod>2017-04-13T16:38-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/04/05/sans-2017-cybersecurity-trend-report-checklist</loc>
		<lastmod>2017-04-04T22:01-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2017/04/05/ssl-labs-distrusts-wosign-and-startcom-certificates</loc>
		<lastmod>2017-04-05T08:02-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2017/03/31/microsoft-iis-6-0-buffer-overflow-zero-day</loc>
		<lastmod>2017-03-31T19:11-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/03/30/protect-against-critical-iis-6-0-buffer-overflow-vulnerability-cve-2017-7269-with-qualys-waf</loc>
		<lastmod>2017-03-31T19:13-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/03/29/forresters-demartine-talks-devops-iot-flawed-tools-and-other-appsec-hot-topics</loc>
		<lastmod>2017-03-29T13:45-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/03/27/qualys-policy-compliance-notification-policy-library-update-9</loc>
		<lastmod>2017-03-27T15:57-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/03/27/qualys-cloud-platform-2-25-new-features</loc>
		<lastmod>2017-04-06T15:04-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/03/27/rest-api-testing-with-qualys-web-application-scanning</loc>
		<lastmod>2017-03-27T11:39-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/03/22/sans-study-to-take-on-new-infosec-challenges-first-get-the-basics-right</loc>
		<lastmod>2017-03-22T16:31-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2017/03/15/path-fuzzing-challenges</loc>
		<lastmod>2018-04-25T08:10-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2017/03/14/apache-struts-cve-2017-5638-vulnerability-and-the-qualys-solution</loc>
		<lastmod>2017-09-14T10:07-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/03/14/massive-security-update-from-microsoft-for-march</loc>
		<lastmod>2017-03-14T16:43-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2017/03/13/caa-mandated-by-cabrowser-forum</loc>
		<lastmod>2017-04-13T13:12-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/03/10/examining-the-current-state-of-database-security</loc>
		<lastmod>2017-03-09T15:21-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/03/09/qualys-waf-2-0-protects-against-critical-apache-struts2-vulnerability-cve-2017-5638</loc>
		<lastmod>2017-03-14T11:35-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/03/07/qualys-cloud-suite-8-9-3-new-features</loc>
		<lastmod>2017-03-07T15:34-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/03/06/smart-dom-xss-detection-in-qualys-was</loc>
		<lastmod>2017-03-07T20:22-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/02/28/making-asset-inventory-actionable-with-a-cloud-based-system</loc>
		<lastmod>2017-04-13T16:42-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/02/24/qualys-cloud-platform-2-23-new-features</loc>
		<lastmod>2017-02-24T14:39-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2017/02/23/ticketbleed-detection-added-to-ssl-labs</loc>
		<lastmod>2017-05-05T07:08-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/02/21/rsa-conference-2017-qualys-cloud-platform-expansions</loc>
		<lastmod>2017-03-08T12:01-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/02/21/for-complete-visibility-dive-deep-into-it-asset-discovery</loc>
		<lastmod>2017-04-13T16:41-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/02/16/simplifying-web-application-security-with-qualys-web-application-firewall-2-0</loc>
		<lastmod>2017-02-16T21:07-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/02/14/microsoft-february-patch-cliff-hanger-and-adobe-fix-for-flash</loc>
		<lastmod>2017-02-16T17:19-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/02/13/iot-security-a-hairy-issue-thats-simple-to-solve</loc>
		<lastmod>2017-02-13T15:58-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/02/13/qualys-policy-compliance-notification-policy-library-update-8</loc>
		<lastmod>2017-02-13T13:37-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/02/10/automated-asset-inventory-its-a-visibility-thing</loc>
		<lastmod>2017-04-13T16:40-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/02/07/checklist-qualys-top-10-tips-for-a-secure-compliant-2017</loc>
		<lastmod>2017-02-07T08:43-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/02/02/qualys-policy-compliance-notification-policy-library-update-7</loc>
		<lastmod>2017-02-02T12:18-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/02/01/qualys-cloud-suite-8-9-2-new-features</loc>
		<lastmod>2017-02-01T08:30-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/01/30/the-worlds-gone-web-app-crazy-tips-to-cut-risk-from-hacks-rogue-staff-and-faulty-code</loc>
		<lastmod>2018-04-25T08:04-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/webappsec/2017/01/26/cross-site-request-forgery-what-happened-to-the-sleeping-giant</loc>
		<lastmod>2018-04-25T07:46-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/01/24/slash-vendor-risk-and-sharpen-compliance-with-policies-standards-and-regulations</loc>
		<lastmod>2017-09-12T12:24-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2017/01/19/qualys-cloud-platform-2-21-new-features</loc>
		<lastmod>2017-07-14T13:29-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2017/01/18/ssl-labs-grading-changes-january-2017</loc>
		<lastmod>2017-04-03T09:44-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/01/17/oracle-january-2017-cpu-fixes-270-vulnerabilities</loc>
		<lastmod>2017-03-14T12:52-07:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/01/17/overwhelmed-by-security-vulnerabilities-heres-how-to-prioritize</loc>
		<lastmod>2017-01-18T10:56-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2017/01/13/whats-new-ssl-labs-1-26-5</loc>
		<lastmod>2017-01-16T16:14-08:00</lastmod>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/01/12/five-things-to-know-about-qualys-fedramp-authorization</loc>
		<lastmod>2017-01-12T11:39-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/01/10/january-2017-patch-tuesday-video-highlights</loc>
		<lastmod>2017-01-10T15:22-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/01/10/adobe-security-update-for-january-flash-and-acrobat-fixed</loc>
		<lastmod>2017-01-10T13:43-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2017/01/10/microsoft-starts-2017-with-record-low-security-updates</loc>
		<lastmod>2017-01-10T12:07-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2017/01/10/hackers-are-having-a-field-day-with-stolen-credentials</loc>
		<lastmod>2017-01-10T12:30-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/01/10/information-security-and-compliance-new-years-resolutions-you-can-keep</loc>
		<lastmod>2017-01-09T18:14-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2017/01/05/office-depot-extends-the-value-of-cloud-based-security-via-qualys-apis</loc>
		<lastmod>2017-01-04T18:09-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/12/15/what-you-need-to-know-about-the-upcoming-leap-second-2</loc>
		<lastmod>2016-12-15T17:11-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/12/13/2016-year-end-summary-for-adobe-and-another-0-day-fix-in-december</loc>
		<lastmod>2016-12-14T13:38-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/12/13/microsoft-ends-2016-with-15-increase-in-bulletin-volume</loc>
		<lastmod>2016-12-13T11:40-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/12/13/call-for-customer-presentations-at-rsa-conference-2017</loc>
		<lastmod>2016-12-13T08:49-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/12/12/ssl-deceptively-simple-yet-hard-to-implement</loc>
		<lastmod>2016-12-21T16:34-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/12/09/announcing-the-qualys-customer-portal</loc>
		<lastmod>2016-12-12T12:04-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/12/05/sans-survey-report-organizations-continuous-monitoring-programs-must-keep-maturing-to-yield-full-benefits</loc>
		<lastmod>2016-12-05T09:27-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/12/02/qualys-cloud-suite-8-9-1-new-features</loc>
		<lastmod>2016-12-02T16:01-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/12/01/qualys-cloud-platform-2-19-new-features</loc>
		<lastmod>2016-12-01T15:26-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2016/11/29/per-protocol-cipher-suite-detection-in-ssl-labs</loc>
		<lastmod>2016-11-29T12:51-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/11/28/web-and-mobile-apps-often-hide-complex-maze-of-insecure-connections</loc>
		<lastmod>2018-04-25T08:05-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/11/22/as-web-apps-become-top-data-breach-vector-protecting-them-is-critical</loc>
		<lastmod>2018-04-25T08:11-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2016/11/22/ssl-labs-now-showing-multiple-certificate-chains</loc>
		<lastmod>2016-11-22T02:39-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/11/21/bai-security-eyes-threat-prioritization-as-competitive-differentiator</loc>
		<lastmod>2016-11-22T11:01-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2016/11/16/announcing-ssl-labs-grading-changes-for-2017</loc>
		<lastmod>2017-03-28T04:29-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/11/08/november-2016-patch-tuesday-video-highlights</loc>
		<lastmod>2016-11-08T15:26-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/11/08/adobe-releases-flash-player-and-connect-vulnerability-fix</loc>
		<lastmod>2016-11-08T12:13-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/11/08/microsoft-patches-actively-exploited-kernel-vulnerability-three-previously-disclosed-browser-issues-and-sql-server</loc>
		<lastmod>2016-11-08T12:50-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/11/04/qualys-cloud-platform-2-18-new-features</loc>
		<lastmod>2018-02-20T12:28-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/11/04/qualys-cloud-suite-8-9-new-features</loc>
		<lastmod>2016-11-08T10:59-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/11/01/windows-kernel-0-day-actively-exploited</loc>
		<lastmod>2016-11-01T12:01-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/10/27/a-csos-view-of-vulnerability-management-essential-and-core-to-enterprise-security</loc>
		<lastmod>2017-08-15T18:36-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/10/26/emergency-flash-player-0-day-update-released-by-adobe</loc>
		<lastmod>2016-10-26T12:58-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/10/25/video-pulitzer-prize-winner-kaplan-talks-about-cyber-war-in-our-unsafe-internet</loc>
		<lastmod>2016-10-25T12:08-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/10/19/agility-and-flexibility-needed-to-manage-risk-throughout-vendor-relationship-lifecycle</loc>
		<lastmod>2018-02-05T12:50-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/10/18/oracle-october-2016-critical-patch-update</loc>
		<lastmod>2016-10-19T12:19-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/10/14/my-life-as-a-chief-security-officer</loc>
		<lastmod>2016-10-14T12:17-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/10/14/security-is-tough-but-infosec-pros-can-find-joy-in-the-work</loc>
		<lastmod>2016-10-14T08:29-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/10/13/infosec-teams-need-more-collaboration-and-automation-to-defend-their-organizations-and-help-them-succeed</loc>
		<lastmod>2016-10-13T13:34-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/10/13/the-big-year-2016-product-advances-highlighted-at-qsc</loc>
		<lastmod>2016-10-13T10:22-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/10/13/as-traditional-network-perimeters-dissolve-qualys-cloud-platform-provides-global-security-and-compliance-visibility</loc>
		<lastmod>2016-10-13T11:00-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/10/12/qualys-ceo-philippe-courtot-kicks-off-qsc16-with-call-for-organizations-to-secure-their-digital-transformations</loc>
		<lastmod>2016-10-13T07:26-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/10/12/lasso-in-employee-training-vendor-regulatory-compliance-with-automated-risk-assessments</loc>
		<lastmod>2018-02-05T12:47-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/10/11/october-patch-tuesday-2016-video-highlights</loc>
		<lastmod>2016-10-11T16:15-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/10/11/adobe-october-security-advisories</loc>
		<lastmod>2016-10-11T13:08-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/10/11/october-b-week-patch-tuesday-five-0-day-fixes</loc>
		<lastmod>2016-10-11T10:54-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/10/10/no-security-without-visibility-qsc16-to-focus-on-helping-enterprises-regain-clarity-into-their-it-environments</loc>
		<lastmod>2016-10-07T15:05-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/10/07/qualys-cloud-platform-2-17-new-features-2</loc>
		<lastmod>2016-10-19T18:15-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/10/05/to-gauge-risk-from-third-parties-and-employees-scalability-and-automation-are-essential</loc>
		<lastmod>2018-02-05T12:49-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2016/10/03/top-5-new-settings-in-security-compliance-manager-for-windows-10</loc>
		<lastmod>2016-10-03T11:26-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/09/28/assessing-risk-from-vendors-and-other-third-parties-is-key-to-business-success</loc>
		<lastmod>2018-02-05T12:52-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/09/26/problem-with-openssl-patches-of-september-22-2016</loc>
		<lastmod>2016-09-26T12:10-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/09/26/prioritizing-remediation-visualize-and-share-the-data-apply-it-to-your-organization</loc>
		<lastmod>2016-09-22T13:01-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/09/20/qualys-beefs-up-cloud-tool-for-security-consultants</loc>
		<lastmod>2016-09-30T17:10-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/09/19/prioritizing-remediation-plug-into-the-firehose-of-vulnerability-disclosures-and-correlate</loc>
		<lastmod>2018-02-05T12:55-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/09/13/patch-tuesday-september-2016-video-highlights</loc>
		<lastmod>2016-09-19T18:00-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/09/13/adobe-september-2016-security-update</loc>
		<lastmod>2016-09-19T18:01-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/09/13/large-microsoft-patch-tuesday-update-for-september-2016</loc>
		<lastmod>2016-09-30T16:46-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/09/12/end-the-nightmare-of-vulnerability-disclosure-overload-keep-calm-and-prioritize</loc>
		<lastmod>2016-09-19T17:30-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/09/09/qualys-malware-detection-2-11-time-zone-fix</loc>
		<lastmod>2018-02-20T12:31-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2016/09/06/is-http-public-key-pinning-dead</loc>
		<lastmod>2016-09-30T16:39-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2016/08/31/thwarting-sql-injection-defense-in-depth</loc>
		<lastmod>2018-04-25T08:05-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2016/08/31/improved-suite-detection-in-the-next-ssl-labs-update</loc>
		<lastmod>2016-09-05T12:31-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2016/08/29/how-policy-compliance-plays-a-mitigation-role-to-protect-your-system</loc>
		<lastmod>2016-08-26T17:01-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/08/26/mystery-magic-bytes-from-the-equation-leak</loc>
		<lastmod>2016-08-26T12:00-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/08/25/qualys-cloud-platform-2-16-new-features</loc>
		<lastmod>2016-08-30T11:44-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/08/18/equation-group-hack-cisco-asa-and-fortigate-vulnerabilities</loc>
		<lastmod>2016-08-26T11:14-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/08/09/patch-tuesday-august-2016-video-highlights</loc>
		<lastmod>2016-08-09T15:05-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/08/09/qualys-cloud-platform-2-15-new-features</loc>
		<lastmod>2016-08-31T12:59-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/08/09/microsoft-patch-tuesday-august-2016</loc>
		<lastmod>2016-08-09T11:34-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/08/04/was-4-9-introduces-global-exclusion-lists-and-scan-comparison-feature</loc>
		<lastmod>2016-08-30T11:48-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/08/03/testing-ajax-applications-with-json-input-for-vulnerabilities-using-qualys-was</loc>
		<lastmod>2018-04-25T08:11-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2016/08/02/tls-version-intolerance-in-ssl-pulse</loc>
		<lastmod>2017-01-13T04:59-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2016/07/21/handling-cross-site-scripting-attacks-sophisticated</loc>
		<lastmod>2017-01-10T17:20-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/07/19/oracle-july-2016-critical-patch-update</loc>
		<lastmod>2016-07-19T15:52-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/07/18/cgi-application-vulnerability-httpoxy-for-php-go-python-and-others</loc>
		<lastmod>2016-07-18T16:26-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/07/12/patch-tuesday-july-2016-video-highlights</loc>
		<lastmod>2016-07-12T14:21-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/07/12/patch-tuesday-july-2016-microsoft-and-adobe</loc>
		<lastmod>2016-07-13T09:24-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/07/11/are-your-vendors-partners-and-other-business-allies-putting-your-organization-at-risk</loc>
		<lastmod>2017-09-12T12:26-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/07/11/qualys-supports-new-cisco-threat-centric-nac</loc>
		<lastmod>2016-07-11T11:23-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/07/07/new-qualys-app-for-splunk-enterprise-adds-real-time-dashboard-and-analytics-for-web-application-scanning</loc>
		<lastmod>2016-07-07T12:14-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2016/06/27/new-release-of-ssltls-deployment-best-practices</loc>
		<lastmod>2016-06-27T15:51-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/06/23/qualys-cloud-suite-8-8-new-features</loc>
		<lastmod>2016-06-27T16:24-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/06/23/qualys-policy-compliance-notification-policy-library-update-6</loc>
		<lastmod>2017-01-04T12:07-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/06/23/so-many-vulnerabilities-so-little-time-threatprotect-identifies-the-assets-you-must-patch-now</loc>
		<lastmod>2016-07-11T17:14-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/06/14/more-on-microsoft-and-adobe-patches-june-2016</loc>
		<lastmod>2016-06-14T19:22-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/06/14/patch-tuesday-june-2016</loc>
		<lastmod>2016-06-14T14:08-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/05/27/qualys-cloud-platform-2-14-new-features</loc>
		<lastmod>2016-05-27T10:57-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/05/25/was-4-8-features-vulnerability-retest-function-and-finding-severity-customization</loc>
		<lastmod>2016-05-25T14:01-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/05/18/how-to-avoid-account-lockouts-when-scanning-web-applications</loc>
		<lastmod>2016-11-04T16:13-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2016/05/16/ssl-labs-in-2016-and-beyond</loc>
		<lastmod>2016-05-16T14:04-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/05/12/patch-tuesday-may-2015-2</loc>
		<lastmod>2016-05-12T10:46-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/05/11/protect-your-systems-against-samsam-and-prove-the-value-of-cyber-security-to-your-organization</loc>
		<lastmod>2016-05-11T15:09-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/05/10/more-on-may-2016-microsoft-and-adobe-patches</loc>
		<lastmod>2016-05-10T15:59-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2016/05/09/openssl-cve-2016-2107-grading-update</loc>
		<lastmod>2016-12-13T08:17-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2016/04/25/how-ignoring-low-level-security-risks-can-open-the-door-to-major-attacks</loc>
		<lastmod>2016-04-25T10:26-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/04/22/oracle-critical-patch-update-april-2016</loc>
		<lastmod>2016-04-22T11:58-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/04/21/qualys-cloud-platform-2-13-new-features</loc>
		<lastmod>2016-04-23T07:30-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/04/21/qualys-cloud-agent-client-1-4-now-available</loc>
		<lastmod>2016-04-21T16:58-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/04/18/was-4-7-adds-enhanced-support-for-redundant-link-checks</loc>
		<lastmod>2016-04-21T13:55-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/04/18/qualys-policy-compliance-notification-policy-library-update-5</loc>
		<lastmod>2016-04-18T11:32-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/04/12/more-on-april-2016-microsoft-and-adobe-patches-including-badlock</loc>
		<lastmod>2016-04-12T15:12-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/04/12/22939</loc>
		<lastmod>2016-04-12T11:07-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/04/06/adobe-to-release-patch-for-0-day-in-flash-player</loc>
		<lastmod>2016-04-08T13:16-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/04/05/was-4-6-ability-to-delete-unused-web-asset-when-deprovisioning</loc>
		<lastmod>2016-04-06T12:37-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/04/04/qualys-assetview-to-be-enabled-soon-for-all-accounts</loc>
		<lastmod>2016-04-18T15:31-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/04/04/cloud-platform-adds-default-landing-page-setting</loc>
		<lastmod>2018-02-20T12:30-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/04/04/qualys-was-4-6-new-features</loc>
		<lastmod>2016-04-06T14:05-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/03/29/qualys-vulnerability-management-notification-reference-data-formatting-change</loc>
		<lastmod>2016-03-29T17:29-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/03/29/qualys-cloud-platform-updates-now-available</loc>
		<lastmod>2016-03-29T17:28-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/03/28/heres-a-registration-discount-code-for-appsec-europe-courtesy-of-qualys</loc>
		<lastmod>2016-03-29T12:11-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2016/03/28/the-importance-of-a-proper-http-strict-transport-security-implementation-on-your-web-server</loc>
		<lastmod>2016-03-28T10:53-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/03/24/oracle-out-of-band-release-for-java-0-day</loc>
		<lastmod>2016-03-25T02:29-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/03/10/patch-tuesday-update-adobe-flash-0-day-apsb16-08</loc>
		<lastmod>2016-03-10T21:48-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/03/08/more-on-march-2016-microsoft-and-adobe-patches</loc>
		<lastmod>2016-03-08T17:29-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/03/08/patch-tuesday-march-2016</loc>
		<lastmod>2016-03-08T10:10-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2016/03/04/drown-grading-update</loc>
		<lastmod>2016-05-13T15:26-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2016/03/04/ssl-labs-drown-test-implementation-details</loc>
		<lastmod>2016-12-09T13:06-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2016/03/03/drown-at-qualys</loc>
		<lastmod>2016-03-03T16:05-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2016/03/01/drown-abuses-ssl-v2-to-attack-rsa-keys-and-tls</loc>
		<lastmod>2016-03-01T10:38-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/02/29/new-certified-qualys-app-for-servicenow-cmdb</loc>
		<lastmod>2017-05-01T08:22-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/02/23/qualys-cloud-suite-8-7-new-features</loc>
		<lastmod>2016-02-24T11:59-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/02/22/new-critical-glibc-vulnerability</loc>
		<lastmod>2016-02-24T11:31-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/02/12/qualys-policy-compliance-notification-policy-library-update-4</loc>
		<lastmod>2016-04-18T11:27-07:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/02/12/critical-cisco-vpn-flaw</loc>
		<lastmod>2016-02-12T08:19-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/02/09/more-on-february-2016-microsoft-and-adobe-patches</loc>
		<lastmod>2016-02-09T16:28-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/02/09/patch-tuesday-february-2016</loc>
		<lastmod>2016-02-09T13:06-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/02/08/newest-java-addresses-binary-planting-vulnerability</loc>
		<lastmod>2016-02-09T11:41-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/01/29/what-is-the-apex-predator-doing-to-get-your-information</loc>
		<lastmod>2016-01-30T00:28-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/01/20/oracle-critical-patch-update-january-2016</loc>
		<lastmod>2016-01-20T12:38-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2016/01/14/hunting-for-vulnerable-functions-in-microsoft-silverlight-ms16-006</loc>
		<lastmod>2016-01-14T17:33-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/01/12/more-on-january-2016-microsoft-and-adobe-patches-with-information-on-retired-internet-explorer</loc>
		<lastmod>2016-01-12T15:09-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2016/01/12/path-tuesday-january-2016</loc>
		<lastmod>2016-01-12T10:32-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2016/01/12/call-for-customer-presentations-at-rsa-conference-2016</loc>
		<lastmod>2016-01-12T09:08-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/01/11/qualys-assetview-211-new-features</loc>
		<lastmod>2018-02-20T12:31-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/01/11/qualys-was-45-new-features</loc>
		<lastmod>2016-01-11T09:08-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/01/11/qualys-md-28-new-features</loc>
		<lastmod>2016-01-11T09:07-08:00</lastmod>
		<priority>0.7</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2016/01/11/qualys-waf-20-new-feature</loc>
		<lastmod>2018-01-24T17:00-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2016/01/07/open-redirection-a-simple-vulnerability-threatens-your-web-applications</loc>
		<lastmod>2016-01-07T09:08-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/12/28/last-adobe-0-day-patched-for-the-year</loc>
		<lastmod>2015-12-28T10:58-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/12/21/qualys-policy-compliance-notification-policy-library-update-3</loc>
		<lastmod>2017-01-04T12:08-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/12/15/qualys-cloud-agent-client-13-for-windows-now-available</loc>
		<lastmod>2015-12-15T15:45-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/12/08/2015-58-increase-in-microsoft-patches</loc>
		<lastmod>2015-12-08T16:50-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/12/08/patch-tuesday-december-2015</loc>
		<lastmod>2015-12-08T09:59-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/11/25/edellroot-ssl-certificate-vulnerability-highlights-need-for-instant-asset-query</loc>
		<lastmod>2015-11-25T08:42-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/11/23/qualys-cloud-agent-for-windows-12-now-available</loc>
		<lastmod>2015-11-23T11:14-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/11/16/qualys-was-44-new-features</loc>
		<lastmod>2015-11-16T15:06-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/11/11/more-on-microsoft-and-adobe-patch-tuesday-november-2015</loc>
		<lastmod>2015-11-11T13:29-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/11/10/patch-tuesday-november-2015</loc>
		<lastmod>2015-11-10T09:55-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2015/11/06/version-1-20-28-now-running-in-production</loc>
		<lastmod>2016-09-30T17:11-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/11/04/qualys-policy-compliance-notification-policy-library-update-2</loc>
		<lastmod>2017-01-04T12:08-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/10/28/obtain-admin-rights-on-joomla-with-sql-injection</loc>
		<lastmod>2018-04-25T08:06-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/10/22/unrestricted-file-upload-vulnerability</loc>
		<lastmod>2015-10-22T10:36-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/10/21/oracle-critical-patch-update-october-2015</loc>
		<lastmod>2016-01-20T19:46-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/10/20/clickjacking-a-common-implementation-mistake-that-can-put-your-websites-in-danger</loc>
		<lastmod>2018-04-25T07:56-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/10/19/qualys-cloud-agent-13-new-features</loc>
		<lastmod>2015-10-19T09:08-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/10/19/qualys-md-27-new-features</loc>
		<lastmod>2015-10-19T09:07-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/10/19/qualys-was-43-new-features</loc>
		<lastmod>2016-05-25T14:20-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/10/19/qualys-cloud-suite-86-new-features</loc>
		<lastmod>2016-02-11T16:00-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/10/16/adobe-addresses-0-day-vulnerability-in-flash</loc>
		<lastmod>2015-10-16T11:52-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/10/13/more-on-patch-tuesday-october-2015</loc>
		<lastmod>2015-10-13T15:58-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/10/13/patch-tuesday-october-2015</loc>
		<lastmod>2015-10-13T10:08-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/10/09/implementing-the-tls-maturity-model</loc>
		<lastmod>2015-10-09T11:48-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/10/09/security-is-breaking-down-why-now-and-what-can-we-do-about-it-a-conversation-with-tyler-shields-principal-analyst-at-forrester</loc>
		<lastmod>2015-10-09T10:17-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/10/08/philippe-courtot-s-qualys-security-conference-keynote-achieving-security-when-everything-is-connected-to-everything</loc>
		<lastmod>2018-03-09T00:02-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/10/08/welcome-to-the-2015-qualys-security-conference</loc>
		<lastmod>2015-10-08T09:17-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/10/07/new-qualys-app-for-splunk-enterprise</loc>
		<lastmod>2016-05-02T11:40-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2015/10/06/qualys-named-to-cloud-top-500</loc>
		<lastmod>2015-10-06T08:08-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/09/30/qualys-policy-compliance-notification-policy-library-update</loc>
		<lastmod>2017-01-04T12:08-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/09/21/september-patch-adobe-flash</loc>
		<lastmod>2015-09-21T10:30-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/09/16/blindelephant-then-and-now</loc>
		<lastmod>2015-09-16T08:18-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2015/09/11/new-penalty-for-rc4-only-servers-in-october-2015</loc>
		<lastmod>2016-05-13T15:29-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/09/08/microsoft-patch-tuesday-september-2015</loc>
		<lastmod>2015-09-08T15:54-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/09/08/patch-tuesday-september-2015</loc>
		<lastmod>2015-09-08T10:03-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/08/28/pebble-smart-watch-developer-portal-vulnerability</loc>
		<lastmod>2015-08-28T09:59-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2015/08/24/no-change-to-rc4-grading-in-september</loc>
		<lastmod>2016-05-13T15:49-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/08/18/ms15-093-oob-fix-for-internet-explorer</loc>
		<lastmod>2015-08-18T14:24-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/08/11/adobe-microsoft-and-firefox-updates-august-2015</loc>
		<lastmod>2015-08-11T17:46-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/08/11/patch-tuesday-august-2015</loc>
		<lastmod>2015-08-11T10:02-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/07/22/multiple-0-days-in-internet-explorer</loc>
		<lastmod>2015-07-22T06:13-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/07/20/forescout-integrates-with-qualys</loc>
		<lastmod>2016-03-18T12:55-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/07/14/adobe-microsoft-and-oracle-patch-tuesday-july-2015</loc>
		<lastmod>2015-07-14T16:37-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/07/14/qualys-policy-compliance-notification-changes-required-for-oracle-assessments-2</loc>
		<lastmod>2015-07-14T12:49-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/07/14/patch-tuesday-july-2015</loc>
		<lastmod>2015-07-14T10:05-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/07/13/qualys-cloud-suite-85-new-features</loc>
		<lastmod>2015-07-13T17:07-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/07/08/openssl-vulnerability</loc>
		<lastmod>2015-07-08T11:43-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/07/06/hackingteam-0-day-for-flash</loc>
		<lastmod>2015-07-06T22:57-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/06/25/qualys-md-264-new-features</loc>
		<lastmod>2015-06-25T18:06-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/06/25/qualys-was-42-new-features</loc>
		<lastmod>2016-04-20T12:10-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/06/24/security-breach-on-concrete5</loc>
		<lastmod>2015-06-24T01:22-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/06/23/new-0-day-for-adobe-flash</loc>
		<lastmod>2015-06-23T12:29-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/06/22/top-4-new-settings-in-security-compliance-manager-for-windows-81</loc>
		<lastmod>2015-06-22T10:00-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/06/16/device-vulnerabilities-fixed-garrettcom-magnum-series</loc>
		<lastmod>2015-06-16T17:31-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/06/09/microsoft-and-adobe-patch-tuesday-june-2015</loc>
		<lastmod>2015-06-09T15:20-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/06/09/patch-tuesday-june-2015</loc>
		<lastmod>2015-06-09T10:06-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2015/06/08/introducing-tls-maturity-model</loc>
		<lastmod>2015-06-08T06:10-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2015/05/22/ssl-labs-increased-penalty-when-tls-12-is-not-supported</loc>
		<lastmod>2016-09-30T16:47-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2015/05/21/ssl-labs-117-obsolete-crypto-rc4-and-logjam</loc>
		<lastmod>2015-05-21T04:09-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/05/14/magento-rce-a-call-for-application-security-templates</loc>
		<lastmod>2015-05-14T08:00-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/05/13/venom-hypervisor-vulnerability</loc>
		<lastmod>2015-05-13T12:46-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/05/12/bsi-in-a-nutshell-patch-these-software-packages</loc>
		<lastmod>2015-05-12T23:48-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/05/12/microsoft-patch-tuesday-may-2015</loc>
		<lastmod>2015-05-12T15:58-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/05/12/patch-tuesday-may-2015</loc>
		<lastmod>2015-05-12T10:01-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2015/05/11/call-for-papers-qualys-security-conference-2015</loc>
		<lastmod>2015-05-11T08:00-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/05/06/wordpress-when-half-of-all-websites-are-vulnerable</loc>
		<lastmod>2018-04-25T08:08-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/05/05/qualys-policy-compliance-notification-monthly-policy-library-update-2</loc>
		<lastmod>2017-01-04T12:09-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/05/04/what-you-need-to-know-about-the-upcoming-leap-second</loc>
		<lastmod>2015-05-04T14:50-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/05/01/us-cert-top-30-vulnerabilities</loc>
		<lastmod>2015-05-01T13:32-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2015/04/28/whats-new-in-ssl-labs-116x</loc>
		<lastmod>2015-04-28T03:22-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2015/04/23/ssl-labs-rc4-deprecation-plan</loc>
		<lastmod>2015-04-23T00:14-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/04/21/deploy-virtual-patches-on-qualys-waf-automatically-based-on-detected-web-app-vulnerabilities</loc>
		<lastmod>2015-04-21T05:00-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/04/21/qualys-continuous-monitoring-now-looks-inside-your-network</loc>
		<lastmod>2015-04-21T05:00-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/04/21/introducing-the-new-groundbreaking-qualys-cloud-agent-platform</loc>
		<lastmod>2015-04-21T05:00-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/04/20/ms15-034-analyze-and-remote-detection</loc>
		<lastmod>2015-04-20T15:07-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/04/16/security-issues-discovered-and-fixed-in-searchblox</loc>
		<lastmod>2015-04-16T12:26-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/04/15/qualys-continuous-monitoring-17-new-features</loc>
		<lastmod>2015-04-15T19:11-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/04/15/update-new-detection-for-pci-dss-31</loc>
		<lastmod>2015-04-15T13:00-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/04/14/top-5-client-side-patch-tuesday-vulnerabilities-from-microsoft-oracle-and-adobe-april-2015</loc>
		<lastmod>2015-04-14T17:11-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/04/14/top-5-server-side-patch-tuesday-vulnerabilities-from-microsoft-oracle-and-adobe-april-2015</loc>
		<lastmod>2015-04-14T17:08-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/04/14/patch-tuesday-april-2015</loc>
		<lastmod>2015-04-14T10:11-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/04/13/qualys-was-41-new-features</loc>
		<lastmod>2016-04-20T12:11-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/04/06/new-detections-for-pci-dss-31</loc>
		<lastmod>2015-04-06T09:00-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/03/30/qualys-scap-auditor-12-certification-completed</loc>
		<lastmod>2015-03-30T09:00-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/03/25/qualys-cloud-suite-84-new-features</loc>
		<lastmod>2015-03-25T14:48-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2015/03/20/ssl-news-roundup</loc>
		<lastmod>2015-03-20T10:42-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/03/17/ghost-remote-code-execution-exploit</loc>
		<lastmod>2015-03-17T10:04-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/03/10/microsoft-patch-tuesday-march-2015</loc>
		<lastmod>2015-03-10T16:08-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/03/10/patch-tuesday-march-2015</loc>
		<lastmod>2015-03-10T10:07-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2015/03/09/call-for-customer-presenters-in-qualys-booth-at-rsa-conference-2015</loc>
		<lastmod>2015-03-09T11:09-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/03/06/addressing-cve-2015-0204-freak-with-qualys-vm</loc>
		<lastmod>2015-03-06T09:50-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/03/05/qualys-policy-compliance-notification-monthly-policy-library-update</loc>
		<lastmod>2017-01-04T12:09-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2015/03/03/openssl-cookbook-2nd-edition-released</loc>
		<lastmod>2015-03-03T10:57-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/03/03/top-10-vulnerabilities-february-2015</loc>
		<lastmod>2015-03-03T06:58-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/03/03/qualys-policy-compliance-notification-changes-required-for-oracle-assessments</loc>
		<lastmod>2015-03-03T06:31-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/02/25/qualys-and-bmc-join-forces-to-close-the-secops-gap</loc>
		<lastmod>2015-02-25T15:05-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/02/24/how-to-check-for-unprotected-mongodb-databases</loc>
		<lastmod>2018-02-05T13:44-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/02/19/how-a-missing-security-check-enabled-a-csrf-attack</loc>
		<lastmod>2018-04-25T07:55-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2015/02/13/qualys-named-a-finalist-for-seven-sc-awards</loc>
		<lastmod>2015-02-13T11:05-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/02/10/patch-tuesday-february-2015</loc>
		<lastmod>2015-02-10T11:19-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/02/02/february-0-day-for-adobe-flash</loc>
		<lastmod>2015-02-02T07:49-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability</loc>
		<lastmod>2015-01-27T09:32-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/01/26/protect-your-applications-from-hacker-research</loc>
		<lastmod>2015-01-26T09:09-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/01/23/multiple-vulnerabilities-detected-in-schneider-factorycast-hmi-gateway</loc>
		<lastmod>2015-01-23T10:55-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2015/01/22/ssl-labs-apis-now-available-in-beta</loc>
		<lastmod>2015-01-22T07:16-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/01/21/new-0-day-vulnerability-in-adobe-flash</loc>
		<lastmod>2015-01-21T15:23-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/01/20/patch-tuesday-january-2015-2nd-edition</loc>
		<lastmod>2015-01-20T13:20-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2015/01/15/qualys-policy-compliance-notification-technology-support-changes-for-windows-2012-r2windows-81</loc>
		<lastmod>2015-01-15T08:09-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2015/01/14/do-your-anti-csrf-tokens-really-protect-your-applications-from-csrf-attack</loc>
		<lastmod>2018-04-25T07:55-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/01/13/microsoft-and-adobe-patch-tuesday-january-2015</loc>
		<lastmod>2015-01-13T14:15-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/01/13/patch-tuesday-january-2015</loc>
		<lastmod>2015-01-13T10:51-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2015/01/08/patch-tuesday-january-2015-preview</loc>
		<lastmod>2015-01-08T10:51-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/12/09/microsoft-adobe-poodle-on-patch-tuesday-december-2014</loc>
		<lastmod>2014-12-09T15:28-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/12/09/december-2014-patch-tuesday</loc>
		<lastmod>2014-12-09T10:14-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2014/12/08/ssl-labs-end-of-year-2014-updates</loc>
		<lastmod>2014-12-08T12:02-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2014/12/08/poodle-bites-tls</loc>
		<lastmod>2017-03-20T14:07-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/12/04/december-2014-patch-tuesday-preview</loc>
		<lastmod>2014-12-04T18:09-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/11/26/november-patch-tuesday-part-3</loc>
		<lastmod>2014-11-26T02:00-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/11/25/qualys-83-new-features</loc>
		<lastmod>2014-11-25T16:14-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/11/25/qualys-was-40-new-features</loc>
		<lastmod>2018-03-08T22:28-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/11/18/november-patch-tuesday-part-2</loc>
		<lastmod>2014-11-18T10:25-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/11/11/microsoft-and-adobe-patch-tuesday-november-2014</loc>
		<lastmod>2014-11-11T16:47-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/11/11/november-2014-patch-tuesday</loc>
		<lastmod>2014-11-11T10:08-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/11/06/drupal-sql-critical-vulnerability-and-how-qualys-can-help</loc>
		<lastmod>2014-11-06T12:23-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/11/06/november-2014-patch-tuesday-preview</loc>
		<lastmod>2014-11-06T12:07-08:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/10/21/0-day-in-microsoft-ole-packagerpowerpoint</loc>
		<lastmod>2014-10-21T22:35-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/10/17/enterprise-iot-risk-is-getting-real</loc>
		<lastmod>2014-10-17T14:07-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/10/16/sslv3-and-poodle-attacks</loc>
		<lastmod>2014-10-16T23:51-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/10/16/qualys-ceo-courtot-in-qsc-keynote-security-now-a-challenge-of-scale-accuracy-speed-and-insight</loc>
		<lastmod>2014-10-16T12:30-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/10/16/qsc-keynote-preview-inflection-security-s-next-10-years</loc>
		<lastmod>2014-10-16T09:07-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2014/10/15/ssl-3-is-dead-killed-by-the-poodle-attack</loc>
		<lastmod>2016-09-30T16:44-07:00</lastmod>
		<priority>0.6</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/10/15/web-application-security-a-qa-with-will-bechtel</loc>
		<lastmod>2014-10-15T11:53-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/10/14/microsoft-oracle-and-adobe-patch-tuesday-october-2014</loc>
		<lastmod>2014-10-14T14:42-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/10/14/oracle-cpu-october-2014</loc>
		<lastmod>2014-10-14T14:16-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/10/14/qsc-panel-preview-internet-of-things-assessing-the-real-risk</loc>
		<lastmod>2014-10-14T13:26-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/10/14/october-2014-patch-tuesday</loc>
		<lastmod>2014-10-14T10:04-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/10/09/october-2014-patch-tuesday-preview</loc>
		<lastmod>2014-10-09T12:33-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/10/09/joomla-vulnerability-cve-2014-6631-qualys-web-application-scanning</loc>
		<lastmod>2018-04-25T07:53-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/10/09/custom-option-profile-to-detect-bash-shellshock</loc>
		<lastmod>2014-10-09T09:08-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/10/02/check-for-shellshock-using-qualys-freescan</loc>
		<lastmod>2014-10-02T18:22-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/10/02/using-qualys-was-scan-to-detect-shellshock-vulnerability</loc>
		<lastmod>2014-10-02T10:29-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/10/01/qualys-82-new-features</loc>
		<lastmod>2014-10-01T17:55-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/09/30/first-look-the-new-version-of-windows-code-named-threshold</loc>
		<lastmod>2014-09-30T09:08-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/09/29/get-bash-shellshock-alerts-using-qualys-continuous-monitoring</loc>
		<lastmod>2014-09-29T13:59-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/09/25/qualysguard-remote-detection-for-bash-shellshock</loc>
		<lastmod>2014-09-25T17:32-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/09/25/shellshock-is-your-webserver-under-attack</loc>
		<lastmod>2014-09-25T11:29-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/09/24/bash-remote-code-execution-vulnerability-cve-2014-6271</loc>
		<lastmod>2014-09-24T16:10-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/09/24/bash-shellshock-vulnerability</loc>
		<lastmod>2014-09-24T15:12-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/09/18/new-policies-in-qualys-pc-simplify-compliance-with-new-pci-dss-30-requirements</loc>
		<lastmod>2014-09-18T13:32-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/09/11/xss-vulnerability-shows-how-security-issues-can-creep-into-popular-software</loc>
		<lastmod>2018-04-25T07:49-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/09/09/qualys-was-36-new-features</loc>
		<lastmod>2014-09-09T17:38-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/09/09/more-on-patch-tuesday-september-2014</loc>
		<lastmod>2014-09-09T15:37-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/09/09/september-2014-patch-tuesday</loc>
		<lastmod>2014-09-09T10:21-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2014/09/09/sha1-deprecation-what-you-need-to-know</loc>
		<lastmod>2016-09-30T16:43-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/09/04/september-2014-patch-tuesday-preview</loc>
		<lastmod>2014-09-04T10:32-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/09/03/backoff-malware-what-you-should-know</loc>
		<lastmod>2014-09-03T14:06-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2014/09/02/my-new-book-bulletproof-ssl-and-tls</loc>
		<lastmod>2014-09-02T07:10-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/08/20/black-hat-usa-2014-recap</loc>
		<lastmod>2014-08-20T08:28-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/08/12/more-on-patch-tuesday-august-2014</loc>
		<lastmod>2014-08-12T16:24-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/08/12/patch-tuesday-august-2014</loc>
		<lastmod>2014-08-12T10:00-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/08/07/august-2014-patch-tuesday-preview</loc>
		<lastmod>2014-08-07T11:29-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/07/30/9-questions-for-jeffrey-leggett</loc>
		<lastmod>2014-07-30T12:54-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/07/29/qualys-continuous-monitoring-api</loc>
		<lastmod>2014-07-29T05:08-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/07/29/qualys-continuous-monitoring-14-release</loc>
		<lastmod>2014-07-29T05:08-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/07/24/yet-another-zerocms-cross-site-scripting-vulnerability-cve-2014-4710</loc>
		<lastmod>2014-07-24T14:20-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/07/23/download-your-vm-data-faster</loc>
		<lastmod>2014-07-23T12:22-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/07/21/10-questions-for-mark-from-managing-gazillion-vulnerabilities</loc>
		<lastmod>2014-07-21T11:03-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/07/15/oracle-critical-patch-update-july-2014-2</loc>
		<lastmod>2014-07-15T15:21-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/07/15/internet-explorer-half-life-2013</loc>
		<lastmod>2014-07-15T11:47-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/07/14/qualysguard-was-35-new-features</loc>
		<lastmod>2014-07-14T22:06-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/07/14/10-questions-for-michael-calvi-from-multiple-scanner-appliance-selector</loc>
		<lastmod>2014-07-14T10:14-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/07/10/oracle-critical-patch-update-july-2014</loc>
		<lastmod>2014-07-10T17:13-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/07/08/more-on-patch-tuesday-july-2014</loc>
		<lastmod>2014-07-08T16:33-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/07/08/patch-tuesday-july-2014</loc>
		<lastmod>2014-07-08T10:16-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/07/03/july-2014-patch-tuesday-preview</loc>
		<lastmod>2014-07-03T11:23-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/06/25/qualysguard-81-new-features</loc>
		<lastmod>2014-06-25T17:56-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/06/17/additional-june-security-advisories-by-microsoft</loc>
		<lastmod>2014-06-17T15:24-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2014/06/17/ssl-labs-new-grades-for-trust-t-and-mismatch-m-issues</loc>
		<lastmod>2014-06-17T02:27-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2014/06/13/ssl-pulse-49-vulnerable-to-cve-2014-0224-14-exploitable</loc>
		<lastmod>2014-06-13T01:37-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/06/10/more-on-patch-tuesday-june-2014</loc>
		<lastmod>2014-06-10T15:07-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/06/10/patch-tuesday-june-2014</loc>
		<lastmod>2014-06-10T10:00-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/06/05/june-2014-patch-tuesday-preview-and-new-openssl-mitm-issue</loc>
		<lastmod>2014-06-05T10:52-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/06/03/qualysguard-was-34-new-features</loc>
		<lastmod>2018-03-06T03:29-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/06/03/new-alert-filters-and-more-in-qualysguard-continuous-monitoring</loc>
		<lastmod>2014-06-03T14:06-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/06/02/qualys-sessions-at-gartner-security-risk-management-summit</loc>
		<lastmod>2014-06-02T11:46-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/05/22/new-ie8-0-day-by-zdi</loc>
		<lastmod>2014-05-22T08:36-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/05/14/qualys-community-new-features</loc>
		<lastmod>2014-05-14T10:20-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/05/13/more-on-patch-tuesday-may-2014</loc>
		<lastmod>2014-05-13T16:45-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/05/13/patch-tuesday-may-2014</loc>
		<lastmod>2014-05-13T10:06-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/05/08/pre-patch-tuesday-may-2014</loc>
		<lastmod>2014-05-08T11:47-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/05/01/new-internet-explorer-0-day</loc>
		<lastmod>2014-05-01T09:42-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/04/28/adobe-out-of-band-patch-for-flash-vulnerability</loc>
		<lastmod>2014-04-28T10:18-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/04/22/apple-security-update-for-mac-os-x-and-ios</loc>
		<lastmod>2014-04-22T12:50-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/04/21/heartbleed-post-mortem-webinar</loc>
		<lastmod>2014-04-21T16:24-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/04/16/more-on-patch-tuesday-april-2014</loc>
		<lastmod>2014-04-16T15:10-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/04/15/oracle-april-cpu-2014-java-takes-the-lions-share</loc>
		<lastmod>2014-04-15T18:14-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/04/15/heartbleed-certificate-report</loc>
		<lastmod>2014-04-15T16:41-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/04/14/qualysguard-80-new-features</loc>
		<lastmod>2014-04-14T19:27-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/04/09/heartbleed-detection-update</loc>
		<lastmod>2014-04-09T12:02-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2014/04/08/ssl-labs-test-for-the-heartbleed-attack</loc>
		<lastmod>2014-04-08T12:09-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/04/08/patch-tuesday-april-2014</loc>
		<lastmod>2016-05-25T15:45-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/04/07/comparing-windows-xp-usage-by-country-industry</loc>
		<lastmod>2014-04-07T11:10-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/04/04/new-0-day-out-for-microsoft-word</loc>
		<lastmod>2014-04-04T11:40-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/04/03/april-2014-patch-tuesday-preview</loc>
		<lastmod>2014-04-03T11:24-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/04/02/windows-xp-usage-lower-across-industries</loc>
		<lastmod>2014-04-02T14:53-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/04/02/top-4-controls-for-a-secure-pc-part-2</loc>
		<lastmod>2014-04-02T09:29-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/03/25/top-4-controls-for-a-secure-pc-part-1</loc>
		<lastmod>2014-03-25T16:26-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2014/03/19/https-mixed-content-still-the-easiest-way-to-break-ssl</loc>
		<lastmod>2014-03-19T06:39-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/03/13/qualysguard-was-33-new-features</loc>
		<lastmod>2014-03-13T18:07-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/03/12/cansecwest-pwn2own-overview</loc>
		<lastmod>2014-03-12T19:10-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/03/11/more-on-patch-tuesday-march-2014</loc>
		<lastmod>2014-03-11T19:24-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/03/11/march-2014-patch-tuesday</loc>
		<lastmod>2014-03-11T10:01-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/03/06/march-2014-patch-tuesday-preview</loc>
		<lastmod>2014-03-06T10:54-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/03/03/qualys-at-rsa-conference</loc>
		<lastmod>2014-03-03T10:37-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/02/28/qualys-wins-best-security-company-at-sc-magazine-awards</loc>
		<lastmod>2014-02-28T09:57-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/02/27/mediawiki-djvu-and-pdf-file-upload-remote-code-execution-vulnerability-cve-2014-1610</loc>
		<lastmod>2014-02-27T09:23-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/02/26/rsa-2014-automating-the-20-critical-security-controls</loc>
		<lastmod>2014-02-26T22:57-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/02/26/web-application-firewall-defends-your-web-apps</loc>
		<lastmod>2014-02-26T11:34-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/02/26/qualys-launches-new-free-top-4-service</loc>
		<lastmod>2014-02-26T10:32-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/02/25/the-new-continuous-monitoring-service-and-the-ga-of-qualysguard-waf</loc>
		<lastmod>2014-02-25T07:38-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/02/24/risk-io-partners-with-qualys-to-monitor-perimeter-security-risks</loc>
		<lastmod>2014-02-24T11:16-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2014/02/24/ssl-labs-testing-for-apples-tls-authentication-bug</loc>
		<lastmod>2014-02-24T07:20-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/02/20/adobe-out-of-band-release-for-flash</loc>
		<lastmod>2014-02-20T10:27-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/02/19/algosec-partners-with-qualys</loc>
		<lastmod>2014-02-19T10:30-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/02/13/new-internet-explorer-0-day-out-in-the-wild</loc>
		<lastmod>2014-02-13T18:20-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/02/11/more-on-patch-tuesday-february-2014</loc>
		<lastmod>2014-02-11T15:28-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/02/11/february-2014-patch-tuesday</loc>
		<lastmod>2014-02-11T10:09-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/02/06/february-2014-patch-tuesday-preview</loc>
		<lastmod>2014-02-06T10:59-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/02/04/pathfinder-to-deliver-qualysguard-solutions-as-part-of-mcafee-secure-services</loc>
		<lastmod>2016-01-29T10:57-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/02/04/out-of-band-patch-for-adobe-flash</loc>
		<lastmod>2014-02-04T10:30-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/02/03/accuvant-partners-with-qualys-for-continuous-vulnerability-management-solution</loc>
		<lastmod>2014-02-03T11:25-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/01/29/qualysguard-713-new-features</loc>
		<lastmod>2014-01-29T17:45-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/01/29/qualys-to-decommission-scan-job-dispatcher-migrate-all-subscriptions-to-new-scanner-services</loc>
		<lastmod>2014-01-29T16:08-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/01/28/qualysguard-was-32-notification</loc>
		<lastmod>2016-05-25T15:39-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/01/21/lumension-partners-with-qualys-to-deliver-award-winning-vulnerability-management</loc>
		<lastmod>2014-01-21T11:38-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2014/01/21/how-qualysguard-detects-vulnerability-to-ntp-amplification-attacks</loc>
		<lastmod>2014-01-21T11:33-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2014/01/21/ssl-labs-stricter-security-requirements-for-2014</loc>
		<lastmod>2014-01-21T07:28-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/01/16/detect-ntp-amplifiction-flaws</loc>
		<lastmod>2014-01-16T10:18-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2014/01/15/qualys-receives-frost-sullivan-global-vulnerability-management-market-leadership-award</loc>
		<lastmod>2014-01-15T10:49-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/01/14/more-on-patch-tuesday-january-2014</loc>
		<lastmod>2014-01-14T15:31-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/01/14/january-2014-patch-tuesday</loc>
		<lastmod>2014-01-14T10:07-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2014/01/09/january-2014-patch-tuesday-preview</loc>
		<lastmod>2014-01-09T11:22-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2014/01/06/top-13-of-13-qualys-community</loc>
		<lastmod>2014-01-06T08:57-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/12/16/automate-the-delivery-of-security-intelligence-of-new-assets</loc>
		<lastmod>2013-12-16T12:32-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/12/10/more-on-patch-tuesday-december-2013</loc>
		<lastmod>2013-12-10T17:33-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/12/10/year-closing-december-2013-patch-tuesday</loc>
		<lastmod>2013-12-10T10:05-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/12/09/internal-mitm-attack-in-french-government-agency</loc>
		<lastmod>2013-12-09T10:53-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/12/09/the-best-of-owasp-web-application-security-people-of-the-year-waspy-awards</loc>
		<lastmod>2018-04-25T08:01-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/12/05/december-2013-patch-tuesday-preview</loc>
		<lastmod>2013-12-05T12:06-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/11/27/new-local-0-day-for-windows-xp</loc>
		<lastmod>2013-11-27T14:50-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/11/27/secure-your-browser-before-shopping-online</loc>
		<lastmod>2013-11-27T14:17-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/11/25/qualysguard-712-update-multiple-new-enhancements</loc>
		<lastmod>2013-11-25T17:58-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/11/22/risk-based-security-and-the-ideal-system-interview-with-judie-ayoola</loc>
		<lastmod>2013-11-22T14:13-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/11/13/qualys-named-a-finalist-in-five-2014-sc-magazine-awards</loc>
		<lastmod>2013-11-13T17:39-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/11/12/more-on-patch-tuesday-november-2013</loc>
		<lastmod>2013-11-12T16:52-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/11/12/november-2013-patch-tuesday</loc>
		<lastmod>2013-11-12T10:02-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/11/07/november-2013-patch-tuesday-preview</loc>
		<lastmod>2013-11-07T11:01-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/11/05/new-microsoft-0-day-vulnerability-under-attack</loc>
		<lastmod>2013-11-05T10:42-08:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/10/31/apple-enabled-beast-mitigations-in-os-x-109-mavericks</loc>
		<lastmod>2013-10-31T09:26-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/10/23/qualysguard-712-new-features</loc>
		<lastmod>2013-10-23T16:51-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/10/23/continuous-security-monitoring-new-whitepaper-and-webcast</loc>
		<lastmod>2013-10-23T09:05-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/10/15/oracle-cpu-october-2013</loc>
		<lastmod>2013-10-15T15:12-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/10/14/qualysguard-was-wins-readers-choice-award-for-application-security</loc>
		<lastmod>2013-10-14T11:01-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/10/12/qualysguard-was-31-new-features</loc>
		<lastmod>2013-10-12T08:31-07:00</lastmod>
		<priority>0.5</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/10/09/ssl-pulse-now-tracking-forward-secrecy-and-rc4</loc>
		<lastmod>2013-10-09T04:00-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/10/08/patch-tuesday-october-2013</loc>
		<lastmod>2013-10-08T10:52-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/10/08/openssl-cookbook-v11-released</loc>
		<lastmod>2013-10-08T07:57-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/10/03/advance-notification-patch-tuesday-october-2013</loc>
		<lastmod>2013-10-03T10:36-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/10/02/qsc-2013-the-future-is-continuous-security</loc>
		<lastmod>2013-10-02T09:00-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/10/02/introducing-the-ssl-client-test</loc>
		<lastmod>2013-10-02T08:01-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/10/01/october-is-national-cyber-security-awareness-month</loc>
		<lastmod>2013-10-01T08:20-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/09/30/browsercheck-20-adds-automatic-daily-scanning-and-improved-macos-support</loc>
		<lastmod>2013-09-30T04:50-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/09/27/author-steven-levy-what-we-owe-to-the-hackers</loc>
		<lastmod>2013-09-27T08:50-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/09/25/firemon-traffic-engineer-for-the-corporate-network</loc>
		<lastmod>2013-09-25T09:20-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/09/24/rsa-oracle-tools-help-businesses-manage-qualys-vulnerability-data</loc>
		<lastmod>2013-09-24T13:15-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/09/23/september-2013-new-ie-0-day</loc>
		<lastmod>2013-09-23T10:04-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/09/23/focus-continuous-monitoring-efforts-where-breach-will-cause-blood-to-flow-in-the-streets-analyst-says</loc>
		<lastmod>2013-09-23T09:24-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/09/20/panel-it-s-time-to-put-security-first</loc>
		<lastmod>2013-09-20T09:34-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/09/19/qualys-ceo-courtot-in-qsc-keynote-says-security-should-be-felt-but-not</loc>
		<lastmod>2013-09-19T11:35-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/09/19/dhs-director-streufert-at-qsc-continuous-monitoring-stops-attacks-and-saves-money</loc>
		<lastmod>2013-09-19T10:19-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/09/17/qualys-rated-strong-positive-in-gartner-s-marketscope-for-vulnerability-assessment</loc>
		<lastmod>2013-09-17T11:01-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/09/17/updated-ssltls-deployment-best-practices-deprecate-rc4</loc>
		<lastmod>2013-09-17T07:25-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/09/16/lieberman-software-and-qualys-announce-integration</loc>
		<lastmod>2013-09-16T12:10-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/09/12/java-security-is-getting-better</loc>
		<lastmod>2013-09-12T14:16-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/09/11/outlook-2013-update-problem</loc>
		<lastmod>2013-09-11T16:07-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/09/10/more-on-patch-tuesday-september-2013</loc>
		<lastmod>2013-09-10T16:09-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/09/10/patch-tuesday-september-2013</loc>
		<lastmod>2013-09-10T10:09-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/09/10/is-beast-still-a-threat</loc>
		<lastmod>2016-09-30T16:46-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/09/05/september-2013-patch-tuesday-preview</loc>
		<lastmod>2013-09-05T10:59-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/08/27/java-6-0-day-exploit-in-the-wild</loc>
		<lastmod>2013-08-27T17:00-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/08/27/qualysguard-711-update-new-vulnerability-notification-feature</loc>
		<lastmod>2013-08-27T16:39-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/08/27/qualys-ranks-1-for-fifth-consecutive-year-in-device-vulnerability-assessment-worldwide</loc>
		<lastmod>2013-08-27T11:07-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/08/13/more-on-patch-tuesday-august-2013</loc>
		<lastmod>2013-08-13T16:52-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/08/13/disabling-ipv6</loc>
		<lastmod>2013-08-13T08:17-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/08/13/august-2013-patch-tuesday</loc>
		<lastmod>2016-03-07T13:49-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/08/12/kristi-m-rogers-joins-qualys-board-of-directors</loc>
		<lastmod>2013-08-12T14:10-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/08/12/black-hatdef-conb-sides-las-vegas-best-in-show-part-2</loc>
		<lastmod>2013-08-12T07:43-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/08/08/august-2013-patch-tuesday-preview</loc>
		<lastmod>2013-08-08T11:37-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/08/07/defending-against-the-breach-attack</loc>
		<lastmod>2013-08-07T04:52-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/08/06/black-hatdef-conb-sides-las-vegas-best-in-show-part-1</loc>
		<lastmod>2013-08-06T12:57-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/08/05/configuring-apache-nginx-and-openssl-for-forward-secrecy</loc>
		<lastmod>2016-09-22T01:32-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/07/31/qualys-announces-web-application-firewall-waf-beta-availability</loc>
		<lastmod>2013-07-31T08:29-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/07/26/qualysguard-711-new-features</loc>
		<lastmod>2013-07-26T11:54-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/07/26/going-to-las-vegas-next-week-skip-the-wi-fi-and-maybe-the-apps</loc>
		<lastmod>2013-07-26T09:01-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/07/16/oracle-cpu-july-2013</loc>
		<lastmod>2013-07-16T14:10-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/07/09/patch-tuesday-july-2013</loc>
		<lastmod>2013-07-09T17:21-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/07/09/more-on-patch-tuesday-july-2013</loc>
		<lastmod>2013-07-09T15:41-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/07/04/july-2013-patch-tuesday-preview</loc>
		<lastmod>2013-07-04T15:50-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/06/25/ssl-labs-deploying-forward-secrecy</loc>
		<lastmod>2016-09-30T16:41-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/06/19/hacking-into-wordpress-using-a-vulnerable-plug-in</loc>
		<lastmod>2018-04-25T08:09-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/06/19/microsoft-announces-bug-bounty-program</loc>
		<lastmod>2013-06-19T15:31-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/06/18/oracle-releases-java-se-fix-for-40-security-issues</loc>
		<lastmod>2013-06-18T14:10-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/06/18/cyber-security-education-day-explaining-cyber-mysteries</loc>
		<lastmod>2013-06-18T03:06-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/06/11/more-on-patch-tuesday-june-2013</loc>
		<lastmod>2013-06-11T20:06-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/06/11/qualysguard-710-release-notification</loc>
		<lastmod>2016-05-25T15:30-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/06/11/patch-tuesday-june-2013</loc>
		<lastmod>2013-06-11T10:38-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/06/10/qualys-announces-availability-of-qualysguard-private-cloud-platform-on-vce-vblock-systems</loc>
		<lastmod>2013-06-10T05:01-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/06/10/qualys-announces-availability-of-cloud-based-customizable-questionnaire-service</loc>
		<lastmod>2013-06-10T05:01-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/06/10/qualys-introduces-express-lite-for-small-businesses</loc>
		<lastmod>2013-06-10T05:01-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/06/10/new-qualysguard-express-lite-for-small-businesses</loc>
		<lastmod>2013-06-10T04:51-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/06/06/june-2013-patch-tuesday-preview</loc>
		<lastmod>2013-06-06T10:44-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/05/30/finding-html-injection-vulns-part-i</loc>
		<lastmod>2013-05-30T13:20-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/05/30/a-new-was-an-eternal-challenge</loc>
		<lastmod>2013-05-30T09:00-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/05/21/partnership-with-proficio-for-medium-sized-businesses</loc>
		<lastmod>2013-05-21T10:07-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/05/15/more-on-patch-tuesday-may-2013</loc>
		<lastmod>2013-05-15T15:12-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/05/14/patch-tuesday-may-2013</loc>
		<lastmod>2013-05-14T10:10-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/05/09/may-2013-patch-tuesday-preview</loc>
		<lastmod>2013-05-09T11:02-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/05/08/defense-for-the-0-day-in-ie8</loc>
		<lastmod>2013-05-08T12:10-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/05/04/new-0-day-in-microsoft-internet-explorer-8</loc>
		<lastmod>2013-05-04T18:07-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/04/30/automate-host-discovery-with-asset-tagging</loc>
		<lastmod>2013-04-30T09:01-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/04/25/verizon-data-breach-investigations-report-2013</loc>
		<lastmod>2013-04-25T13:24-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/04/23/exploit-for-java-7u17-in-use-in-the-wild</loc>
		<lastmod>2013-04-23T14:30-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/04/23/new-qualys-research-underscores-the-importance-of-regular-scanning-to-expedite-compliance</loc>
		<lastmod>2013-04-23T12:58-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/04/23/ssltls-deployment-best-practices-updated</loc>
		<lastmod>2013-04-23T10:08-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/04/22/qualys-and-firemon-integration-provides-real-time-network-risk-visibility-and-remediation</loc>
		<lastmod>2013-04-22T11:01-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/04/19/oracle-delays-java-8-to-fix-security-issues-in-java-7</loc>
		<lastmod>2013-04-19T14:32-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/04/19/using-java-decompilers-to-find-security-holes</loc>
		<lastmod>2013-04-19T08:00-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/04/18/focus-on-the-threat-browser-attacks</loc>
		<lastmod>2013-04-18T08:59-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/04/16/oracle-critical-patch-update-april-2013</loc>
		<lastmod>2013-04-16T15:36-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/04/15/wordpress-sites-targeted-by-brute-force-attack</loc>
		<lastmod>2013-04-15T15:17-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/04/12/ms13-036-causes-problems-in-certain-windows-7-installations</loc>
		<lastmod>2013-04-12T10:52-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/04/10/philippe-courtot-keynote-at-rsa-conference-2013</loc>
		<lastmod>2013-04-10T10:52-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/04/10/how-to-scan-across-an-air-gap-with-qualysguard</loc>
		<lastmod>2013-04-10T09:06-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/04/09/more-on-april-2013-patch-tuesday</loc>
		<lastmod>2013-04-09T17:01-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/04/09/april-2013-patch-tuesday</loc>
		<lastmod>2013-04-09T10:08-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/04/04/april-2013-patch-tuesday-preview</loc>
		<lastmod>2013-04-04T11:44-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/04/02/postgres-announces-upcoming-security-patch</loc>
		<lastmod>2013-04-02T11:07-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/03/26/browsercheck-business-edition-adds-no-plugin-download-option</loc>
		<lastmod>2013-03-26T11:12-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/03/19/rc4-in-tls-is-broken-now-what</loc>
		<lastmod>2016-09-30T16:43-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/03/14/apple-updates-mac-os-x-and-safari</loc>
		<lastmod>2013-03-14T14:50-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/03/12/more-on-patch-tuesday-march-2013</loc>
		<lastmod>2013-03-12T17:10-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/03/12/march-2013-patch-tuesday</loc>
		<lastmod>2013-03-12T10:14-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/03/07/march-2013-patch-tuesday-preview</loc>
		<lastmod>2013-03-07T10:35-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/03/05/qualys-wins-best-vulnerability-management-tool-at-sc-magazine-awards</loc>
		<lastmod>2013-03-05T05:00-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/03/01/new-0-day-for-oracle-java</loc>
		<lastmod>2013-03-01T09:57-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/02/27/qualys-and-verizon-join-forces-to-deliver-cloud-based-it-security-and-compliance-solutions</loc>
		<lastmod>2013-02-27T06:22-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/02/27/new-adobe-flash-addresses-attacks-on-firefox</loc>
		<lastmod>2013-02-27T05:44-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/02/25/new-qualysguard-v78-allows-user-to-continuously-monitor-vulnerability-remediation-performances-across-their-organization</loc>
		<lastmod>2013-02-25T14:51-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/02/25/qualys-kicks-off-rsa-conference-with-major-news-announcements</loc>
		<lastmod>2013-02-25T05:00-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/02/25/announcing-was-30-with-malware-detection-and-burp-suite-integration</loc>
		<lastmod>2013-02-25T04:46-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/02/22/chrome-beta-25-promoted-to-production</loc>
		<lastmod>2013-02-22T11:13-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/02/19/oracle-updates-the-java-february-2013-cpu</loc>
		<lastmod>2013-02-19T13:28-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/02/13/adobe-reader-0-day-update-3-patched</loc>
		<lastmod>2013-02-13T07:42-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/02/12/more-on-the-february-2013-patch-tuesday-release</loc>
		<lastmod>2013-02-12T14:55-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/02/12/february-2013-patch-tuesday</loc>
		<lastmod>2013-02-12T09:36-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/02/07/february-2013-patch-tuesday-preview</loc>
		<lastmod>2013-02-07T12:33-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2013/02/07/ssl-labs-update-increases-security-requirements</loc>
		<lastmod>2013-02-07T04:40-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/02/05/hugh-njemanze-joins-qualys-technical-advisory-board</loc>
		<lastmod>2013-02-05T08:11-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/02/04/qid-for-latest-java-se-critical-patch-will-be-released-tonight</loc>
		<lastmod>2018-02-05T13:11-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/02/01/oracle-releases-early-cpu-for-java-7</loc>
		<lastmod>2013-02-01T16:50-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2013/01/28/data-privacy-day-2013-tips-for-digital-citizens</loc>
		<lastmod>2013-01-28T06:06-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2013/01/22/qualys-gets-top-marks-in-customer-survey-from-451-research</loc>
		<lastmod>2013-01-22T05:01-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/01/15/oracle-critical-patch-update-january-2013</loc>
		<lastmod>2013-01-15T13:34-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/01/14/internet-explorer-0-day-bulletin-update</loc>
		<lastmod>2013-01-14T10:30-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2013/01/14/ruby-on-rails-framework-january-2013-vulnerability</loc>
		<lastmod>2013-01-14T10:01-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/01/10/new-java-0-day-vulnerability-update-3</loc>
		<lastmod>2013-01-10T11:29-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/01/08/more-on-the-january-2013-patch-tuesday-release</loc>
		<lastmod>2013-01-08T14:58-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/01/08/january-2013-patch-tuesday</loc>
		<lastmod>2013-01-08T09:03-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2013/01/03/january-2013-patch-tuesday-preview</loc>
		<lastmod>2013-01-03T11:29-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/12/29/new-0-day-vulnerability-in-internet-explorer</loc>
		<lastmod>2012-12-29T17:39-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/12/28/top-10-qualys-community-contributions-of-2012</loc>
		<lastmod>2012-12-28T14:43-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/12/20/be-prepared-4-steps-to-better-data-disaster-planning</loc>
		<lastmod>2012-12-20T13:32-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/12/19/du-partners-with-qualys-to-deliver-cloud-based-vulnerability-management-and-policy-compliance-solutions-in-the-united-arab-emirates</loc>
		<lastmod>2012-12-19T05:00-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/12/12/center-for-internet-security-publishes-consensus-based-security-configuration-benchmarks-for-key-database-platforms</loc>
		<lastmod>2012-12-12T08:53-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/12/11/more-on-the-december-2012-patch-tuesday-release</loc>
		<lastmod>2012-12-11T15:07-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/12/11/december-2012-patch-tuesday</loc>
		<lastmod>2012-12-11T09:54-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/12/06/december-2012-patch-tuesday-preview</loc>
		<lastmod>2012-12-06T10:49-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/12/05/qualys-offers-businesses-a-new-free-online-checkup-service-to-automatically-track-whether-users-pcs-are-safe-for-surfing-the-web</loc>
		<lastmod>2012-12-05T08:52-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/12/04/automatic-scanning-now-part-of-browsercheck-business-edition</loc>
		<lastmod>2012-12-04T18:27-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/12/04/qualys-named-finalist-in-five-2013-sc-magazine-awards-categories</loc>
		<lastmod>2012-12-04T08:11-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/11/29/south-carolina-cyberattack-takeaways</loc>
		<lastmod>2012-11-29T14:33-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/11/29/clickjacking-an-overlooked-web-security-hole</loc>
		<lastmod>2018-04-25T07:56-07:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/11/20/black-friday-cyber-monday-preparations</loc>
		<lastmod>2012-11-20T08:49-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/11/14/san-francisco-business-times-recognizes-philippe-courtot-as-a-2012-most-admired-ceo</loc>
		<lastmod>2012-11-14T10:23-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/11/13/more-on-the-november-2012-patch-tuesday-release</loc>
		<lastmod>2012-11-13T16:36-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/11/13/patch-tuesday-november-2012</loc>
		<lastmod>2012-11-13T10:14-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/11/12/automate-targeting-specific-vulnerabilities</loc>
		<lastmod>2012-11-12T06:00-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/11/08/november-2012-patch-tuesday-preview</loc>
		<lastmod>2012-11-08T10:33-08:00</lastmod>
		<priority>0.4</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/11/05/how-to-report-on-vulnerabilities-with-a-publish-date-older-than-x-days</loc>
		<lastmod>2012-11-05T08:19-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/11/01/apple-releases-new-safari-and-ios</loc>
		<lastmod>2012-11-01T15:18-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/10/25/security-improvements-in-windows-8</loc>
		<lastmod>2012-10-25T19:19-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/10/24/qualys-introduces-innovative-predictive-analytics-engine-for-zero-day-and-microsoft-patch-tuesday-vulnerabilities</loc>
		<lastmod>2012-10-24T10:08-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/10/24/qualys-releases-major-extensions-to-its-qualysguard-cloud-platform</loc>
		<lastmod>2012-10-24T10:00-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/10/22/10th-annual-qualys-security-conference-to-feature-renowned-security-experts-discussing-security-challenges-and-opportunities-in-the-era-of-cloud-computing</loc>
		<lastmod>2012-10-22T13:30-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/10/16/oracle-cpu-october-2012-update</loc>
		<lastmod>2012-10-16T14:43-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/10/16/national-cyber-security-awareness-month</loc>
		<lastmod>2012-10-16T09:06-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/10/11/oracle-cpu-october-2012-preview</loc>
		<lastmod>2012-10-11T16:46-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/10/11/qualys-expands-qualysguard-pci-cloud-platform-for-new-internal-scanning-requirements-of-pci-dss-62</loc>
		<lastmod>2012-10-11T10:37-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/10/09/more-on-the-october-2012-patch-tuesday-release</loc>
		<lastmod>2012-10-09T15:24-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/10/09/patch-tuesday-october-2012</loc>
		<lastmod>2012-10-09T10:05-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/10/08/most-prevalent-severity-5-vulnerabilities-scorecard-report</loc>
		<lastmod>2012-10-08T16:14-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/10/08/update-for-adobe-flash-v11-and-air-v3</loc>
		<lastmod>2012-10-08T11:50-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/10/04/october-2012-patch-tuesday-preview</loc>
		<lastmod>2012-10-04T10:48-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/10/04/qualys-wins-readers-choice-awards-2012-for-best-vulnerability-management</loc>
		<lastmod>2012-10-04T09:05-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/09/26/hacking-web-apps</loc>
		<lastmod>2012-09-26T09:00-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/09/21/new-0-day-for-internet-explorer-update-3</loc>
		<lastmod>2012-09-21T10:42-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/09/19/apple-mac-os-x-security-updates</loc>
		<lastmod>2012-09-19T16:11-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2012/09/14/crime-information-leakage-attack-against-ssltls</loc>
		<lastmod>2016-03-07T13:40-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/09/11/more-on-the-september-2012-patch-tuesday-release</loc>
		<lastmod>2012-09-11T17:30-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/09/11/september-2012-patch-tuesday</loc>
		<lastmod>2012-09-11T09:40-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/09/06/september-2012-patch-tuesday-preview</loc>
		<lastmod>2012-09-06T10:45-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/09/05/ipv6-implementation-series</loc>
		<lastmod>2012-09-05T09:11-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/08/27/new-java-0-day-disclosed-update-4</loc>
		<lastmod>2012-08-27T10:55-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/08/27/how-to-enhance-web-application-scanning-with-selenium</loc>
		<lastmod>2012-08-27T09:06-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/08/24/qualys-named-in-inc-magazines-list-of-americas-fastest-growing-private-companies</loc>
		<lastmod>2012-08-24T10:31-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/08/21/adobe-flash-update-apsb12-19</loc>
		<lastmod>2012-08-21T12:32-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/08/21/av-protection-against-vulnerabilities</loc>
		<lastmod>2016-02-11T16:39-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/08/16/qualys-receives-strong-positive-rating-in-gartner-marketscope-for-vulnerability-assessment</loc>
		<lastmod>2012-08-16T12:49-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/08/15/would-you-let-your-grandma-use-websockets</loc>
		<lastmod>2012-08-15T09:06-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/08/14/more-on-the-august-2012-patch-tuesday-release</loc>
		<lastmod>2012-08-14T17:33-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/08/14/august-2012-patch-tuesday-update</loc>
		<lastmod>2012-08-14T09:56-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/08/13/qualys-ranks-26th-in-silicon-valleysan-jose-business-journals-largest-private-companies-list</loc>
		<lastmod>2012-08-13T09:28-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/08/10/oracle-releases-oob-patch-for-0-day-vulnerability</loc>
		<lastmod>2012-08-10T15:00-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/08/09/august-2012-patch-tuesday-preview</loc>
		<lastmod>2016-02-11T17:04-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/08/06/black-hat-def-con-2012-redux</loc>
		<lastmod>2012-08-06T13:08-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/08/03/the-tiny-mighty-waldo</loc>
		<lastmod>2012-08-03T09:06-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/07/30/how-malware-employs-anti-debugging-anti-disassembly-and-anti-virtualization-technologies</loc>
		<lastmod>2012-07-30T15:38-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/07/26/qualys-adds-ipv6-support-to-freescan-service</loc>
		<lastmod>2012-07-26T09:13-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/07/26/how-to-scan-ipv6-address-with-qualys-freescan</loc>
		<lastmod>2012-07-26T05:06-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/07/25/introducing-qualysguard-dynamic-asset-tagging-and-management</loc>
		<lastmod>2012-07-25T13:26-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/07/25/android-security-evaluation-framework-a-s-e-f</loc>
		<lastmod>2012-07-25T12:27-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2012/07/25/protocol-level-evasion-of-web-application-firewalls</loc>
		<lastmod>2012-07-25T11:36-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/07/25/apple-releases-safari-60</loc>
		<lastmod>2012-07-25T07:00-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/07/24/microsoft-security-advisory-exchangesharepoint</loc>
		<lastmod>2012-07-24T18:07-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/07/24/qualys-announces-general-availability-of-its-dynamic-asset-tagging-and-management-technology</loc>
		<lastmod>2012-07-24T12:13-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/07/24/qualys-introduces-cyberscope-reporting-capabilities-for-federal-and-government-agencies</loc>
		<lastmod>2012-07-24T11:57-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/07/17/oracle-cpu-july-2012</loc>
		<lastmod>2016-02-11T16:50-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/07/17/qualys-researchers-to-present-groundbreaking-malware-research-and-cybercriminal-evasion-techniques-at-black-hat-usa-2012</loc>
		<lastmod>2012-07-17T13:18-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2012/07/17/how-good-is-client-side-support-for-rc4</loc>
		<lastmod>2012-07-17T12:17-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/07/13/oracle-cpu-july-2012-preview</loc>
		<lastmod>2016-02-17T15:39-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/07/12/securelink-selects-qualys-to-provide-best-of-breed-vulnerability-management-services-in-the-middle-east</loc>
		<lastmod>2012-07-12T14:49-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/07/12/discovered-patterns-in-numeric-passwords-raise-new-questions</loc>
		<lastmod>2012-07-12T08:03-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/07/10/more-on-the-july-2012-patch-tuesday-release</loc>
		<lastmod>2012-07-10T16:47-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/07/10/july-2012-patch-tuesday</loc>
		<lastmod>2012-07-10T10:09-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/07/05/reminder-dns-changer-deadline-looming</loc>
		<lastmod>2012-07-05T12:09-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/07/05/july-2012-patch-tuesday-preview</loc>
		<lastmod>2012-07-05T10:52-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/07/02/av-or-no-av</loc>
		<lastmod>2012-07-02T10:11-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/06/26/safe-browsing-with-qualys-browsercheck-15</loc>
		<lastmod>2012-06-26T09:28-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/06/26/howard-a-schmidt-joins-qualys-board-of-directors</loc>
		<lastmod>2018-02-05T13:05-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/06/25/qualys-to-assist-organizations-with-eu-cookie-directive-compliance</loc>
		<lastmod>2012-06-25T09:29-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/06/25/using-qualysguard-was-for-compliance-with-uk-cookie-regulations</loc>
		<lastmod>2017-03-13T11:37-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/06/21/cisco-releases-updates-for-asa-ace-vpn</loc>
		<lastmod>2012-06-21T16:02-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/06/19/microsoft-vs-flame-part-2-update</loc>
		<lastmod>2012-06-19T14:05-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/06/19/meeting-pci-requirement-112-with-qualysguard</loc>
		<lastmod>2012-06-19T09:00-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2012/06/15/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses</loc>
		<lastmod>2012-06-15T02:53-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/06/12/more-on-the-june-2012-patch-tuesday-release</loc>
		<lastmod>2012-06-12T16:48-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/06/12/june-patch-tuesday-2012-update-2</loc>
		<lastmod>2012-06-12T10:18-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/06/11/qualys-introduces-private-cloud-offering</loc>
		<lastmod>2012-06-11T09:47-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/06/08/lessons-learned-from-cracking-2-million-linkedin-passwords</loc>
		<lastmod>2012-06-08T10:44-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/06/07/june-2012-patch-tuesday-preview</loc>
		<lastmod>2012-06-07T11:06-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/06/06/microsoft-updates-flame-advisory</loc>
		<lastmod>2012-06-06T13:09-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/05/22/risks-of-vulnerabilities-in-example-scripts-bundled-with-software</loc>
		<lastmod>2012-05-22T09:05-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/05/17/ten-ways-to-speed-up-your-patching</loc>
		<lastmod>2012-05-17T09:54-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/05/17/passing-the-internal-scan-for-pci-dss-20</loc>
		<lastmod>2012-05-17T09:21-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/05/16/automatic-vs-manual-data</loc>
		<lastmod>2012-05-16T08:05-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/05/15/apple-security-update-fixing-quicktime-vulnerabilities</loc>
		<lastmod>2012-05-15T13:46-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/05/14/new-security-and-industry-experts-join-qualys-ctocso-advisory-board</loc>
		<lastmod>2012-05-14T09:57-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/05/09/apple-may-2012-security-releases</loc>
		<lastmod>2012-05-09T16:22-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/05/08/more-on-the-may-2012-patch-tuesday-release</loc>
		<lastmod>2012-05-08T15:41-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/05/08/qualys-awarded-global-market-share-leadership-award-in-vulnerability-management-for-second-consecutive-year</loc>
		<lastmod>2012-05-08T10:09-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/05/08/may-patch-tuesday-2012</loc>
		<lastmod>2012-05-08T09:12-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/05/07/qualys-wins-information-security-vendor-of-the-year-at-sc-magazine-europe-awards</loc>
		<lastmod>2012-05-07T10:01-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/05/04/urgent-adobe-patch-for-flash-player</loc>
		<lastmod>2012-05-04T08:46-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/05/03/may-2012-patch-tuesday-preview</loc>
		<lastmod>2012-05-03T10:35-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/05/01/oracle-adresses-0-day-tns-poison</loc>
		<lastmod>2012-05-01T12:08-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2012/04/27/announcing-ssl-pulse</loc>
		<lastmod>2017-08-31T14:46-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/04/25/microsoft-sir-2012-new-conficker-statistics</loc>
		<lastmod>2012-04-25T08:40-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/04/23/logrhythm-partners-with-qualys</loc>
		<lastmod>2012-04-23T09:50-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/04/17/oracle-critical-patch-update-april-2012</loc>
		<lastmod>2012-04-17T13:19-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/04/13/oracle-cpu-april-2012-pre-release</loc>
		<lastmod>2012-04-13T10:58-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/04/12/apple-takes-cool-new-approach-to-flashback-trojan</loc>
		<lastmod>2012-04-12T14:07-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/04/11/securestate-partners-with-qualys-to-deliver-cloud-based-security-and-compliance-solutions</loc>
		<lastmod>2012-04-11T10:23-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/04/10/more-on-the-april-2012-patch-tuesday-release</loc>
		<lastmod>2012-04-10T16:26-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/04/10/april-patch-tuesday-2012</loc>
		<lastmod>2012-04-10T08:47-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/04/05/april-2012-patch-tuesday-preview</loc>
		<lastmod>2012-04-05T10:40-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/04/03/apple-patches-critical-java-flaw</loc>
		<lastmod>2012-04-03T14:12-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2012/03/30/qualys-supports-reform-at-cabrowser-forum</loc>
		<lastmod>2012-03-30T02:00-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/03/29/fast-updating-the-best-way-to-defend-against-java-attacks</loc>
		<lastmod>2012-03-29T15:28-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/03/29/six-ways-to-improve-scada-security</loc>
		<lastmod>2012-03-29T09:00-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/03/28/auto-update-for-adobe-flash</loc>
		<lastmod>2012-03-28T14:04-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/03/27/scada-system-fundamentals</loc>
		<lastmod>2012-03-27T09:00-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/03/23/verizon-breach-report-new-and-old-takeaways</loc>
		<lastmod>2012-03-23T08:29-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/03/22/lockpath-and-qualys-streamline-it-grc-risk-reporting</loc>
		<lastmod>2012-03-22T10:26-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/03/14/qualys-announces-new-integration-with-thycotics-secret-server</loc>
		<lastmod>2012-03-14T11:38-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/03/14/using-qualysguard-with-secret-server</loc>
		<lastmod>2012-03-14T04:54-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/03/13/more-on-the-march-2012-patch-tuesday-release</loc>
		<lastmod>2016-02-11T16:48-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/03/13/march-patch-tuesday-2012</loc>
		<lastmod>2012-03-13T09:55-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/03/08/march-2012-patch-tuesday-preview</loc>
		<lastmod>2012-03-08T11:10-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/03/07/rsac-2012-keynote-the-urgent-need-for-a-more-effective-approach-to-security</loc>
		<lastmod>2012-03-07T17:33-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2012/03/07/ssl-and-browsers-the-pillars-of-broken-security</loc>
		<lastmod>2012-03-07T10:22-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/02/27/qualys-introduces-new-services-and-major-technological-innovations-to-qualysguard-cloud-platform</loc>
		<lastmod>2012-02-27T06:33-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/02/27/using-qualysguard-70-idefense-threat-intelligence-and-zero-day-risk-analyzer</loc>
		<lastmod>2012-02-27T04:54-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/02/27/using-qualysguard-70-the-new-ui</loc>
		<lastmod>2012-02-27T04:54-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2012/02/23/announcing-the-ssltls-deployment-best-practices-guide</loc>
		<lastmod>2012-02-23T02:59-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/02/22/qualys-ceo-to-keynote-at-rsa-conference-usa-2012</loc>
		<lastmod>2012-02-22T12:40-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/02/16/more-on-the-february-2012-patch-tuesday-release</loc>
		<lastmod>2012-02-16T18:22-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/02/16/detecting-auto-answer-in-video-conferencing-equipment</loc>
		<lastmod>2012-02-16T08:01-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/02/15/qualys-named-a-finalist-for-three-sc-magazine-europe-awards-including-information-security-vendor-of-the-year</loc>
		<lastmod>2012-02-15T15:48-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/02/15/new-oracle-java-and-new-shockwave-player</loc>
		<lastmod>2012-02-15T09:46-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/02/14/february-patch-tuesday-2012</loc>
		<lastmod>2012-02-14T09:36-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2012/02/09/qualysguard-70</loc>
		<lastmod>2012-02-09T18:45-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/02/09/february-2012-patch-tuesday-preview</loc>
		<lastmod>2012-02-09T10:05-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/02/07/qualys-and-grcbizassurance-partner-to-deliver-cloud-based-vulnerability-management-services-in-south-africa</loc>
		<lastmod>2012-02-07T10:20-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/01/31/current-pcanywhere-security-issues</loc>
		<lastmod>2012-01-31T15:43-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/01/31/detecting-the-dns-changer-malware</loc>
		<lastmod>2012-01-31T07:15-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/01/27/data-privacy-day-2012</loc>
		<lastmod>2012-01-27T05:01-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/01/25/how-i-knocked-down-30-servers-from-one-laptop</loc>
		<lastmod>2017-04-10T16:12-07:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/01/24/leading-analyst-firm-ranks-qualys-1-for-third-consecutive-year-in-device-vulnerability-assessment</loc>
		<lastmod>2012-01-24T09:34-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/01/19/solving-the-secure-password-conundrum</loc>
		<lastmod>2012-01-19T07:38-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/01/18/qualys-expands-popular-freescan-service-for-smbs</loc>
		<lastmod>2012-01-18T09:06-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/01/17/oracle-critical-patch-update-january-2012-2</loc>
		<lastmod>2012-01-17T13:58-08:00</lastmod>
		<priority>0.3</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/01/13/oracle-critical-patch-update-january-2012</loc>
		<lastmod>2012-01-13T10:27-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/01/12/update-your-pcs-ok-but-how-about-printers</loc>
		<lastmod>2012-01-12T07:21-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/01/10/more-on-the-january-2012-patch-tuesday</loc>
		<lastmod>2012-01-10T16:08-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/01/10/january-2012-patch-tuesday</loc>
		<lastmod>2012-01-10T10:21-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/01/06/2011-year-in-review-trends-for-2012</loc>
		<lastmod>2012-01-06T12:19-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2012/01/05/january-2012-patch-tuesday-preview</loc>
		<lastmod>2012-01-05T10:50-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2012/01/05/slow-read</loc>
		<lastmod>2017-04-10T16:11-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2012/01/04/metricstream-partnership-brings-actionable-security-and-risk-intelligence-to-it-grc</loc>
		<lastmod>2012-01-04T11:37-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/12/29/microsoft-releases-ms11-100-for-aspnet-dos-attack</loc>
		<lastmod>2011-12-29T09:49-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/12/28/new-dos-attack-on-php-asp-java-disclosed-at-ccc-congress-updated</loc>
		<lastmod>2011-12-28T13:35-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/12/22/zion-securitys-security-for-life-benefits-belgian-red-cross</loc>
		<lastmod>2011-12-22T11:49-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/12/16/adobe-patch-for-newest-reader-0-day</loc>
		<lastmod>2011-12-16T08:24-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/12/15/silent-updating-for-internet-explorer</loc>
		<lastmod>2011-12-15T05:30-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/12/13/more-on-the-december-2011-patch-tuesday</loc>
		<lastmod>2011-12-13T16:29-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/12/13/december-2011-patch-tuesday</loc>
		<lastmod>2011-12-13T10:03-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/12/08/december-2011-patch-tuesday-preview</loc>
		<lastmod>2011-12-08T10:44-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/12/06/qualys-brings-web-application-scanning-to-next-level-of-automation</loc>
		<lastmod>2011-12-06T09:13-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/12/05/ms-isac-selects-qualys-to-bring-cloud-based-security-and-compliance-solutions-to-state-and-local-governments</loc>
		<lastmod>2011-12-05T09:19-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/12/02/ms11-077-from-patch-to-proof-of-concept</loc>
		<lastmod>2011-12-02T08:06-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/11/30/dissecting-targeted-attacks</loc>
		<lastmod>2011-11-30T08:06-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/11/28/free-security-services-from-qualys-this-holiday-season</loc>
		<lastmod>2011-11-28T09:42-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/11/23/apache-reverse-proxy-bypass-issue</loc>
		<lastmod>2011-11-23T11:00-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/11/17/advanced-persistent-threats-panel</loc>
		<lastmod>2011-11-17T15:11-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/11/11/morto-architecture-review</loc>
		<lastmod>2011-11-11T19:26-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/11/11/qualysguard-policy-compliance-supports-oracle-solaris-11</loc>
		<lastmod>2011-11-11T14:00-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/11/10/qualys-named-a-finalist-in-four-sc-awards-for-2012-including-best-security-company</loc>
		<lastmod>2011-11-10T08:47-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/11/08/more-on-the-november-2011-patch-tuesday</loc>
		<lastmod>2011-11-08T16:06-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/11/08/november-2011-patch-tuesday</loc>
		<lastmod>2011-11-08T09:46-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/11/07/on-the-microsoft-duqu-advisory-time-to-act-yet</loc>
		<lastmod>2011-11-07T10:06-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/11/03/update-november-2011-patch-tuesday-preview</loc>
		<lastmod>2011-11-03T10:41-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/11/02/dos-analysis-of-microsoft-host-integration-server-cve-2011-2008-in-ms11-082</loc>
		<lastmod>2011-11-02T11:38-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/11/02/how-to-protect-against-slow-http-attacks</loc>
		<lastmod>2011-11-02T09:08-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2011/10/31/tls-renegotiation-and-denial-of-service-attacks</loc>
		<lastmod>2011-10-31T11:39-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/10/31/qualys-makes-the-san-francisco-business-times-fast-100-list</loc>
		<lastmod>2011-10-31T10:40-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/10/19/dept-of-homeland-security-unites-groups-to-combat-cyber-crime</loc>
		<lastmod>2011-10-19T12:40-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2011/10/17/mitigating-the-beast-attack-on-tls</loc>
		<lastmod>2011-10-17T11:34-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/10/17/qualys-named-in-fastest-growing-silicon-valley-private-companies-list-for-fourth-consecutive-year</loc>
		<lastmod>2011-10-17T11:04-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/10/12/risk-io-partners-with-qualys-to-automate-vulnerability-detection-management-and-remediation</loc>
		<lastmod>2011-10-12T10:06-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/10/12/qualys-partners-with-risk-io-for-better-vulnerability-management</loc>
		<lastmod>2016-02-11T17:37-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/10/11/more-on-the-october-2011-patch-tuesday</loc>
		<lastmod>2011-10-11T15:57-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/10/11/october-2011-patch-tuesday</loc>
		<lastmod>2011-10-11T10:16-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/10/11/new-free-audit-service-to-secure-web-sites-from-malware-and-vulnerabilities</loc>
		<lastmod>2011-10-11T09:57-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/10/11/microsoft-sir-2011-focus-is-on-malware</loc>
		<lastmod>2011-10-11T03:54-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/10/06/october-2011-patch-tuesday-preview</loc>
		<lastmod>2011-10-06T12:09-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/10/05/qualys-and-keynectis-announce-partnership-to-ensure-proper-ssl-implementation-detection-of-vulnerabilities-and-elimination-of-malware-infections</loc>
		<lastmod>2011-10-05T09:49-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2011/09/29/ssl-labs-announcing-launch-of-two-convergence-notaries</loc>
		<lastmod>2011-09-29T15:53-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/09/29/qualys-showcases-significant-expansions-to-its-qualysguard-security-as-a-service-platform</loc>
		<lastmod>2011-09-29T06:56-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/09/29/allgress-to-provide-free-licenses-of-vulnerability-analysis-module-vam-to-qualys-customers</loc>
		<lastmod>2011-09-29T06:52-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2011/09/29/ssl-labs-announcing-launch-of-two-convergence-notaries-2</loc>
		<lastmod>2011-09-29T05:01-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/09/27/dashboard-and-drill-down-reporting-in-policy-compliance</loc>
		<lastmod>2018-06-14T12:41-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/09/27/transporting-policies-in-policy-compliance</loc>
		<lastmod>2011-09-27T17:07-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/09/21/integrated-vulnerability-risk-management-and-it-risk-and-compliance-with-qualysguard-and-modulo</loc>
		<lastmod>2011-09-21T13:00-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/09/21/qualys-and-modulo-showcase-integrated-vulnerability-management-with-it-grc</loc>
		<lastmod>2011-09-21T11:17-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/09/19/testing-web-servers-for-slow-http-attacks</loc>
		<lastmod>2011-09-19T13:17-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/09/13/more-on-the-september-2011-patch-tuesday</loc>
		<lastmod>2011-09-13T16:26-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/09/13/september-2011-patch-tuesday</loc>
		<lastmod>2011-09-13T10:26-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/09/08/september-2011-patch-tuesday-preview-update</loc>
		<lastmod>2011-09-08T12:07-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/09/06/new-qualysguard-zero-day-module-with-verisign-idefense-security-intelligence</loc>
		<lastmod>2011-09-06T11:10-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/08/25/new-open-source-tool-for-slow-http-attack-vulnerabilities</loc>
		<lastmod>2017-04-10T16:07-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/08/23/patch-analysis-for-ms11-058</loc>
		<lastmod>2011-08-23T12:40-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/08/18/turkish-browser-security-and-av-updatedness</loc>
		<lastmod>2011-08-18T07:37-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/08/10/the-was-approach-to-csrf</loc>
		<lastmod>2011-08-10T16:46-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/08/09/more-on-the-august-2011-patch-tuesday</loc>
		<lastmod>2011-08-09T15:59-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/08/09/august-2011-patch-tuesday-update</loc>
		<lastmod>2016-02-11T16:51-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/08/08/defcon-kids-preparing-us-for-our-future-in-the-digital-domain</loc>
		<lastmod>2011-08-08T13:59-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/08/04/august-2011-patch-tuesday-preview</loc>
		<lastmod>2011-08-04T13:09-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/08/03/qualys-presents-new-consultant-edition-was-20-and-new-ui-at-black-hat-2011</loc>
		<lastmod>2011-08-03T07:24-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/07/19/huge-july-oracle-cpu</loc>
		<lastmod>2011-07-19T13:47-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/07/18/qualys-makes-the-2011-alwayson-global-250-top-private-companies-list</loc>
		<lastmod>2011-07-18T09:35-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/07/12/more-on-julys-patch-tuesday-3</loc>
		<lastmod>2011-07-12T16:17-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/07/12/july-2011-patch-tuesday</loc>
		<lastmod>2011-07-12T10:30-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/07/07/patch-tuesday-preview-for-july-2011</loc>
		<lastmod>2011-07-07T12:19-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/07/07/identifying-slow-http-attack-vulnerabilities-on-web-applications</loc>
		<lastmod>2017-04-10T16:04-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/06/30/why-you-should-always-use-https</loc>
		<lastmod>2011-06-30T12:22-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/06/20/dell-secureworks-partners-with-qualys-to-deliver-saas-based-vulnerability-management-services</loc>
		<lastmod>2011-06-20T06:18-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/06/20/qualys-announces-browsercheck-business-edition</loc>
		<lastmod>2011-06-20T05:52-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/06/16/qualys-to-present-the-business-case-for-moving-to-security-as-a-service-at-gartner-security-risk-management-summit</loc>
		<lastmod>2011-06-16T13:15-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/06/15/stopbadware-state-of-badware-june-2011</loc>
		<lastmod>2011-06-15T15:22-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/06/15/more-on-junes-patch-tuesday-3</loc>
		<lastmod>2011-06-15T14:20-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/06/14/june-2011-patch-tuesday</loc>
		<lastmod>2011-06-14T08:18-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/06/09/patch-tuesday-june-2011-preview</loc>
		<lastmod>2011-06-09T11:31-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/06/07/qualys-recertifies-its-cloud-computing-fdcc-auditing-service</loc>
		<lastmod>2011-06-07T08:35-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/06/07/recertifying-fdcc-and-strengthening-scap-support</loc>
		<lastmod>2018-06-14T12:39-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/05/31/windows-share-enumeration-detailed-audit-settings-and-exploitkit-mapping</loc>
		<lastmod>2011-05-31T09:15-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/05/24/good-software-hygiene-new-tool-in-qualysguard</loc>
		<lastmod>2011-05-24T19:40-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/05/10/more-on-mays-patch-tuesday-3</loc>
		<lastmod>2011-05-10T16:19-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/05/10/may-2011-patch-tuesday</loc>
		<lastmod>2011-05-10T10:03-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/05/09/analysis-malware-win32rimecudb</loc>
		<lastmod>2011-05-09T02:06-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/05/05/patch-tuesday-preview-may-2011</loc>
		<lastmod>2011-05-05T10:46-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/05/04/qualys-receives-highest-possible-rating-of-strong-positive-in-gartner-vulnerability-assessment-marketscope-report</loc>
		<lastmod>2011-05-04T11:21-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/04/26/good-software-hygiene-is-effective-in-combat-of-malware-driven-data-breaches</loc>
		<lastmod>2011-04-26T12:06-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/04/26/qualys-wins-ceo-of-the-year-and-best-sme-security-solution-at-the-2011-european-sc-magazine-awards</loc>
		<lastmod>2011-04-26T10:36-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/04/20/new-browsercheck-plug-ins-vs-javascript-and-mobile-support</loc>
		<lastmod>2011-04-20T14:09-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/04/20/microsoft-cvd-and-efforts-for-industry-collaboration</loc>
		<lastmod>2011-04-20T11:51-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/04/19/more-on-microsoft-excel-vulnerability-ms11-021-w-the-researcher-who-discovered-it</loc>
		<lastmod>2011-04-19T14:22-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/04/19/dimension-data-partners-with-qualys</loc>
		<lastmod>2011-04-19T12:28-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/04/18/adobe-patch-for-flash-0-day</loc>
		<lastmod>2011-04-18T19:23-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/04/18/pci-version-53-open-services-report</loc>
		<lastmod>2011-04-18T06:02-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2011/04/15/placeholder</loc>
		<lastmod>2011-04-15T14:04-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/04/12/more-on-aprils-patch-tuesday-2</loc>
		<lastmod>2011-04-12T22:17-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/04/11/patch-tuesday-april-2011</loc>
		<lastmod>2011-04-11T19:20-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/04/07/patch-tuesday-april-2011-preview</loc>
		<lastmod>2011-04-07T14:00-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/04/05/improving-policy-editing-and-reporting</loc>
		<lastmod>2011-04-05T18:07-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/03/29/qualys-partners-with-stopbadware-to-help-combat-malware-on-the-internet</loc>
		<lastmod>2011-03-29T11:04-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/03/14/0-day-for-adobe-flash-and-reader-updated</loc>
		<lastmod>2011-03-14T12:29-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/03/09/cansecwest-results-day-1</loc>
		<lastmod>2011-03-09T16:52-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/03/08/more-on-marchs-patch-tuesday-2</loc>
		<lastmod>2011-03-08T18:31-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/03/08/patch-tuesday-march-2011</loc>
		<lastmod>2011-03-08T10:00-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/03/03/qualys-named-finalist-for-five-sc-magazine-europe-awards</loc>
		<lastmod>2011-03-03T12:38-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/03/03/patch-tuesday-march-2011-preview</loc>
		<lastmod>2011-03-03T12:04-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/02/22/qualys-rsa-conference-usa-2011</loc>
		<lastmod>2011-02-22T17:22-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/02/18/sc-magazine-names-qualys-best-security-company</loc>
		<lastmod>2011-02-18T13:33-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/02/16/rsa-usa-2011-presentation-on-browser-security</loc>
		<lastmod>2011-02-16T15:16-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/02/15/qualys-publishes-web-application-scanning-for-dummies-book</loc>
		<lastmod>2011-02-15T14:51-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/02/14/qualys-news-at-rsa-conference-2011-usa</loc>
		<lastmod>2011-02-14T06:14-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/02/14/qualysguard-adds-malware-correlation-and-virtual-patch-solutions</loc>
		<lastmod>2011-02-14T06:00-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/02/14/configuration-scanning-of-cisco-ios-now-available-in-qualysguard</loc>
		<lastmod>2011-02-14T05:00-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/02/14/integrating-qualysguard-data-with-rsa-archer</loc>
		<lastmod>2011-02-14T05:00-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/02/08/more-on-februarys-patch-tuesday-2</loc>
		<lastmod>2011-02-08T17:04-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/02/08/patch-tuesday-bottomline-february-2011</loc>
		<lastmod>2011-02-08T09:16-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/02/07/scap-scanning-of-windows-7-windows-7-firewall-and-internet-explorer-8-now-supported</loc>
		<lastmod>2011-02-07T18:05-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/02/07/filtering-frameworks-within-policy-compliance</loc>
		<lastmod>2011-02-07T18:05-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/02/07/qualys-ranks-1-in-device-vulnerability-assessment-worldwide</loc>
		<lastmod>2011-02-07T10:20-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/02/03/patch-tuesday-preview-february-2011-update</loc>
		<lastmod>2011-02-03T10:30-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/01/27/qualys-and-nerc-cip</loc>
		<lastmod>2018-06-14T12:44-07:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/01/27/microsoft-advisory-on-client-side-xss-2501696</loc>
		<lastmod>2011-01-27T17:04-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/01/11/more-on-januarys-patch-tuesday-2</loc>
		<lastmod>2011-01-11T16:49-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/01/11/patch-tuesday-bottomline-january-2011</loc>
		<lastmod>2011-01-11T08:09-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/01/06/notifying-users-of-new-controls</loc>
		<lastmod>2011-01-06T16:00-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2011/01/06/patch-tuesday-preview-for-january-2011-update-2</loc>
		<lastmod>2011-01-06T11:18-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2011/01/05/pci-saq-version-20-is-now-available</loc>
		<lastmod>2011-01-05T06:00-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2011/01/04/qualysguard-integration-with-beyondtrust-powerbroker</loc>
		<lastmod>2011-01-04T09:46-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/12/23/new-ie-0-day-vulnerability</loc>
		<lastmod>2010-12-23T12:32-08:00</lastmod>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/12/14/more-on-decembers-patch-tuesday-2</loc>
		<lastmod>2010-12-14T12:59-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/12/13/patch-tuesday-bottomline-december-2010</loc>
		<lastmod>2010-12-13T18:06-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/12/09/patch-tuesday-preview-for-december-2010</loc>
		<lastmod>2010-12-09T15:58-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2010/12/07/qualys-browsercheck-new-linux-support-and-more-plugins</loc>
		<lastmod>2018-06-14T12:26-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2010/11/23/making-passwords-more-secure</loc>
		<lastmod>2016-05-25T16:07-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/11/18/qualys-receives-market-share-leadership-of-the-year-award</loc>
		<lastmod>2010-11-18T10:07-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/11/17/adobe-update-addresses-0-days-in-reader</loc>
		<lastmod>2010-11-17T15:14-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/11/15/qualys-named-a-finalist-in-california-game-changer-awards</loc>
		<lastmod>2010-11-15T11:51-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2010/11/11/verizon-2010-pci-compliance-report</loc>
		<lastmod>2010-11-11T14:37-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/11/10/new-rsam-grc-integration-with-qualysguard-policy-compliance</loc>
		<lastmod>2010-11-10T10:43-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/11/09/more-on-novembers-patch-tuesday-2</loc>
		<lastmod>2010-11-09T15:46-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/11/09/patch-tuesday-bottomline-november-2010</loc>
		<lastmod>2010-11-09T10:19-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/11/07/november-msft-and-adobe-0-days-update2</loc>
		<lastmod>2010-11-07T13:42-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/11/04/patch-tuesday-preview-for-november-2010</loc>
		<lastmod>2010-11-04T11:46-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/11/03/0-day-vulnerabilities-for-internet-explorer-and-flashreader</loc>
		<lastmod>2010-11-03T09:30-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/11/01/qualys-named-a-finalist-in-four-sc-award-categories</loc>
		<lastmod>2010-11-01T14:52-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/11/01/qualys-named-in-san-francisco-business-times-fast-100</loc>
		<lastmod>2010-11-01T11:15-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2010/10/28/qualys-freemium-services</loc>
		<lastmod>2010-10-28T21:05-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2010/10/28/pci-dss-20-published</loc>
		<lastmod>2010-10-28T10:44-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/10/21/qualys-makes-deloitte-fast-500-for-fifth-consecutive-year</loc>
		<lastmod>2010-10-21T09:57-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/10/19/valleys-fastest-growing-companies-honored-qualys-44</loc>
		<lastmod>2010-10-19T18:27-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/10/19/fixing-java-vulnerabilities-by-industry-collaboration</loc>
		<lastmod>2010-10-19T11:07-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/10/15/accelerate-patching-progress-in-the-enterprise-rsa-europe-2010</loc>
		<lastmod>2010-10-15T01:09-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/10/13/two-factor-authentication-for-qualysguard-powered-by-verisign-identity-protection</loc>
		<lastmod>2010-10-13T09:20-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2010/10/12/qualysguard-adds-verisign-identity-protection</loc>
		<lastmod>2010-10-12T20:00-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/10/12/more-on-octobers-patch-tuesday-2</loc>
		<lastmod>2010-10-12T17:18-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/10/12/patch-tuesday-bottomline-october-2010</loc>
		<lastmod>2010-10-12T10:25-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/10/07/patch-tuesday-preview-for-october-2010</loc>
		<lastmod>2010-10-07T15:23-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2010/10/07/private-assessment-option-added-to-the-ssl-server-test</loc>
		<lastmod>2010-10-07T07:11-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2010/10/07/disabling-ssl-renegotiation-is-a-crutch-not-a-fix</loc>
		<lastmod>2010-10-07T07:11-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2010/10/07/qualys-ssl-labs-releases-raw-data-from-the-internet-ssl-survey</loc>
		<lastmod>2010-10-07T07:09-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2010/10/06/disabling-ssl-renegotiation-is-a-crutch-not-a-fix-2</loc>
		<lastmod>2010-10-06T06:25-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/10/05/new-adobe-reader-and-acrobat-addresses-23-vulnerabilites</loc>
		<lastmod>2010-10-05T15:46-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/10/05/announcing-the-acquisition-of-nemean-networks</loc>
		<lastmod>2010-10-05T08:54-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/10/04/new-integration-with-cyber-ark-privileged-identity-management-suite</loc>
		<lastmod>2018-05-23T14:36-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2010/10/04/trusted-scans-simplified-with-cyber-ark-pim-suite-integration</loc>
		<lastmod>2018-05-23T14:16-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/09/28/microsoft-addresses-high-profile-aspnet-issue-with-ms10-070</loc>
		<lastmod>2010-09-28T10:31-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/09/27/microsoft-readies-update-for-aspnet-issue</loc>
		<lastmod>2010-09-27T11:39-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/09/21/additional-september-security-advisories-update</loc>
		<lastmod>2010-09-21T14:41-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/09/17/congratulations-to-drew-maness-technicolor-winner-of-ise-west-peoples-choice-award</loc>
		<lastmod>2010-09-17T11:18-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/09/16/2010-top-cyber-security-risks-report-released</loc>
		<lastmod>2010-09-16T08:48-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/09/14/more-on-septembers-patch-tuesday-2</loc>
		<lastmod>2010-09-14T17:49-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/09/14/patch-tuesday-bottomline-september-2010</loc>
		<lastmod>2010-09-14T09:54-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/09/09/patch-tuesday-preview-for-september-2010</loc>
		<lastmod>2010-09-09T11:07-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/09/08/0-day-for-adobe-reader-934-and-flash-update-3</loc>
		<lastmod>2010-09-08T15:43-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/09/07/sourcefire-announces-new-qualys-integration</loc>
		<lastmod>2010-09-07T09:17-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/09/01/qualysguard-pci-50-released-to-support-new-asv-changes</loc>
		<lastmod>2010-09-01T09:04-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2010/09/01/important-changes-to-pci-scan-compliance-sept-1st-deadline</loc>
		<lastmod>2010-09-01T00:18-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/08/31/keeping-up-with-dll-hijacking</loc>
		<lastmod>2010-08-31T12:03-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/08/30/qualysguard-express-named-a-finalist-in-computing-security-awards</loc>
		<lastmod>2010-08-30T14:16-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/08/25/qualys-named-one-of-americas-fastest-growing-private-companies-by-inc-magazine-for-fourth-consecutive-year</loc>
		<lastmod>2010-08-25T18:57-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/08/23/microsoft-provides-advisory-for-dll-hijacking-exploits</loc>
		<lastmod>2010-08-23T13:30-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/08/19/todays-news-intel-to-acquire-mcafee</loc>
		<lastmod>2010-08-19T18:47-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/08/19/adobe-patches-readeracrobat-on-windows-mac-and-unix</loc>
		<lastmod>2010-08-19T16:32-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2010/08/12/pci-dss-compliant-in-the-cloud</loc>
		<lastmod>2010-08-12T19:41-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/08/10/more-on-augusts-patch-tuesday</loc>
		<lastmod>2010-08-10T17:20-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/08/10/patch-tuesday-bottomline-august-2010</loc>
		<lastmod>2010-08-10T10:24-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/08/06/browsercheck-featured-on-computer-america-radio</loc>
		<lastmod>2010-08-06T15:43-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/08/05/adobe-prenotification-for-august-2010</loc>
		<lastmod>2010-08-05T11:51-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/08/05/patch-tuesday-preview-for-august-2010</loc>
		<lastmod>2010-08-05T11:13-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/08/04/agiliance-and-qualys-partner-to-provide-security-risk-assessment-on-demand</loc>
		<lastmod>2010-08-04T10:00-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/08/02/ms10-046-fixes-0-day-lnk-vulnerability-out-of-band</loc>
		<lastmod>2010-08-02T11:59-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/07/30/microsoft-issues-out-of-band-update-for-lnk</loc>
		<lastmod>2010-07-30T11:02-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2010/07/30/internet-ssl-survey-2010-results</loc>
		<lastmod>2016-02-11T17:01-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/07/29/qualys-announces-free-online-ssl-test-for-businesses-to-audit-the-ssl-implementation-of-their-web-sites</loc>
		<lastmod>2010-07-29T10:02-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/07/28/qualys-releases-blindelephant-as-an-open-source-tool-for-web-application-fingerprinting</loc>
		<lastmod>2010-07-28T18:38-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/07/27/qualys-adds-exploitability-data-to-qualysguard-vulnerability-management-from-core-security-immunity-metasploit-and-the-exploit-database</loc>
		<lastmod>2010-07-27T08:33-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/07/21/qualys-researchers-to-present-three-sessions-at-black-hat-usa-2010</loc>
		<lastmod>2010-07-21T13:03-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/07/20/qualys-leads-the-pack-in-independent-research-report-on-vulnerability-management</loc>
		<lastmod>2010-07-20T05:03-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/07/19/qualys-announces-browsercheck-free-browser-security-testing-service</loc>
		<lastmod>2010-07-19T09:44-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/07/17/new-windows-flaw-xp-sp2-users-not-covered-update</loc>
		<lastmod>2010-07-17T10:49-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/technology/2010/07/16/qualys-technology-blog</loc>
		<lastmod>2010-07-16T17:04-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/07/13/more-on-julys-patch-tuesday-2</loc>
		<lastmod>2010-07-13T18:03-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/07/13/msft-july-patch-tuesday-retires-windows-xp-sp2-and-2000</loc>
		<lastmod>2010-07-13T10:09-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/07/12/csa-summit-at-black-hat-usa-2010</loc>
		<lastmod>2010-07-12T09:43-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/07/08/msft-july-patch-tuesday-will-address-0-days</loc>
		<lastmod>2010-07-08T11:28-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/06/30/adobe-reader-0-day-patch-released-update2</loc>
		<lastmod>2010-06-30T13:34-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/06/24/deploying-a-global-vm-program-at-cisco</loc>
		<lastmod>2010-06-24T16:35-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/securitylabs/2010/06/21/ssl-labs-assessment-engine-v1059-improvements</loc>
		<lastmod>2010-06-21T15:23-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/06/21/qualysguard-patch-report-aligns-it-security-with-operations</loc>
		<lastmod>2010-06-21T10:25-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/06/17/qualys-party-at-black-hat-usa-featuring-integration-partners</loc>
		<lastmod>2010-06-17T10:48-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/06/15/new-0-day-for-windows-xp2003-update2</loc>
		<lastmod>2010-06-15T16:18-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/06/15/black-hat-usa-2010-preview-webcast</loc>
		<lastmod>2010-06-15T14:16-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/06/10/adobe-releases-update-for-flash-0-day</loc>
		<lastmod>2010-06-10T15:11-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/06/08/more-on-junes-patch-tuesday-2</loc>
		<lastmod>2010-06-08T16:04-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/06/08/patch-tuesday-bottomline-june-2010</loc>
		<lastmod>2010-06-08T11:22-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/06/07/adobe-flash-and-reader-0-day</loc>
		<lastmod>2010-06-07T15:59-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/06/03/cloud-security-qa-with-qualys-ceo-philippe-courtot</loc>
		<lastmod>2010-06-03T13:32-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/06/03/patch-tuesday-preview-for-june-2010</loc>
		<lastmod>2010-06-03T12:30-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/05/28/end-of-life-for-windows-xp-sp-2-time-to-migrate</loc>
		<lastmod>2010-05-28T09:40-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/05/11/more-on-mays-patch-tuesday-2</loc>
		<lastmod>2010-05-11T16:06-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/05/11/patch-tuesday-bottomline-may-2010</loc>
		<lastmod>2010-05-11T10:38-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/05/06/patch-tuesday-preview-for-may-2010</loc>
		<lastmod>2010-05-06T10:51-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/05/05/qualys-and-rsa-expand-it-grc-collaboration</loc>
		<lastmod>2010-05-05T05:30-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/05/04/qualys-wins-award-for-best-sme-security-solution</loc>
		<lastmod>2010-05-04T13:07-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/05/03/infosec-uk-2010-presentation-online</loc>
		<lastmod>2010-05-03T07:31-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/04/27/qualys-webcast-on-protecting-your-web-sites-from-malware</loc>
		<lastmod>2010-04-27T15:56-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/04/21/verisign-collaborates-with-qualys-and-other-industry-leaders-to-bring-trust-to-the-cloud</loc>
		<lastmod>2010-04-21T18:44-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/04/21/owasp-top-10-list-of-web-application-security-risks-for-2010</loc>
		<lastmod>2010-04-21T12:44-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/04/15/oracle-issues-java-update-for-0-day</loc>
		<lastmod>2010-04-15T15:29-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/04/13/april-13-microsoft-patch-tuesday-bottomline-podcast</loc>
		<lastmod>2010-04-13T21:03-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/04/13/patch-tuesday-bottomline-april-2010-update</loc>
		<lastmod>2010-04-13T10:20-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/04/09/new-0-day-in-java</loc>
		<lastmod>2010-04-09T13:38-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/04/08/patch-tuesday-preview-for-april-2010</loc>
		<lastmod>2010-04-08T12:03-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/04/05/qualys-ceo-featured-on-the-cloud-computing-show</loc>
		<lastmod>2010-04-05T10:07-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/04/01/qualys-cso-gives-an-inside-view-on-cloud-computing-security</loc>
		<lastmod>2010-04-01T12:55-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/03/30/critical-ie-update-ms10-018-released</loc>
		<lastmod>2010-03-30T10:42-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/30/dummies-guide-to-it-policy-compliance-now-available</loc>
		<lastmod>2010-03-30T10:25-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/29/qualys-cto-discusses-new-malware-detection-service</loc>
		<lastmod>2010-03-29T17:03-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/03/29/update2-on-internet-explorer-0-day-ms10-018</loc>
		<lastmod>2010-03-29T10:19-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/24/manitowoc-builds-a-secure-and-sustainable-infrastructure</loc>
		<lastmod>2010-03-24T12:20-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/24/ideal-innovations-reinforces-its-it-security-posture</loc>
		<lastmod>2010-03-24T12:17-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/23/intuit-vp-and-corporate-controller-jeffrey-p-hank-joins-qualys-board-of-directors</loc>
		<lastmod>2010-03-23T17:59-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/17/philippe-courtot-on-lessons-learned-at-rsa</loc>
		<lastmod>2010-03-17T11:55-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/16/qualys-featured-on-technow</loc>
		<lastmod>2010-03-16T16:12-07:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/12/best-of-the-qualys-security-tips-twitter-contest</loc>
		<lastmod>2010-03-12T11:58-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/11/the-qualys-booth-rsa-2010</loc>
		<lastmod>2010-03-11T17:17-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/11/rsa-conference-2010-pictures</loc>
		<lastmod>2010-03-11T14:46-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/03/11/update-on-internet-explorer-0-day</loc>
		<lastmod>2010-03-11T07:52-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/03/09/more-on-marchs-patch-tuesday</loc>
		<lastmod>2010-03-09T17:25-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/03/09/patch-tuesday-bottomline-march-2010</loc>
		<lastmod>2010-03-09T10:39-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/05/qualys-ceo-philippe-courtot-rsa-2010-keynote</loc>
		<lastmod>2010-03-05T16:59-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/04/qualys-wins-sc-magazine-award-2010-for-best-vulnerability-management</loc>
		<lastmod>2010-03-04T15:51-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/03/04/patch-tuesday-preview-for-march-2010</loc>
		<lastmod>2010-03-04T11:25-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/02/core-security-technologies-completes-integration-with-qualysguard-pci-connect</loc>
		<lastmod>2010-03-02T10:18-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/01/imperva-and-qualys-partner-to-help-enterprises-protect-against-malicious-attacks-on-web-applications</loc>
		<lastmod>2010-03-01T11:17-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/01/trend-micro-partners-with-qualys-to-strengthen-its-security-and-compliance-offerings</loc>
		<lastmod>2010-03-01T10:47-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/03/01/qualys-announces-new-services-to-help-businesses-protect-their-web-sites-from-malware-and-vulnerabilities</loc>
		<lastmod>2010-03-01T10:14-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/02/24/qualys-receives-highest-rating-in-gartner-marketscope-on-vulnerability-assessment</loc>
		<lastmod>2010-02-24T11:22-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/02/23/qualys-security-in-the-cloud-twitter-giveaway-how-to-win-an-ipod-shuffle-or-ipod-nano</loc>
		<lastmod>2010-02-23T10:36-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/02/23/qualys-introduces-first-certified-cloud-based-solution-for-federal-desktop-core-configuration-fdcc-compliance</loc>
		<lastmod>2010-02-23T08:52-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/02/22/philippe-courtot-and-wolfgang-kandek-named-2010-crn-security-superstars</loc>
		<lastmod>2010-02-22T12:07-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/02/22/csa-top-threat-report-coming</loc>
		<lastmod>2010-02-22T11:34-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/02/16/qualys-named-a-finalist-for-four-sc-magazine-europe-awards</loc>
		<lastmod>2010-02-16T10:39-08:00</lastmod>
		<priority>0.1</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/02/12/adobe-patching-out-of-band-updated</loc>
		<lastmod>2010-02-12T10:13-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/02/10/guest-post-on-pci-compliance-for-bt-securethinking</loc>
		<lastmod>2010-02-10T15:52-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/02/09/more-on-februarys-patch-tuesday</loc>
		<lastmod>2010-02-09T18:37-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/02/09/patch-tuesday-bottomline-february-2010</loc>
		<lastmod>2010-02-09T10:36-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/02/09/guest-blog-who-will-secure-the-clouds-of-tomorrow</loc>
		<lastmod>2010-02-09T09:00-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/02/02/qualys-named-one-of-the-coolest-cloud-security-vendors</loc>
		<lastmod>2010-02-02T09:41-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/02/01/podcast-series-rsa-conference-keynote-preview</loc>
		<lastmod>2010-02-01T18:08-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/01/27/the-business-approach-to-vulnerability-management</loc>
		<lastmod>2010-01-27T18:50-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/01/27/ntt-com-to-launch-biz-security-vulnerability-management-using-qualysguard</loc>
		<lastmod>2010-01-27T09:54-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/01/26/qa-session-for-cloud-computing-a-positive-disruption-for-it-security</loc>
		<lastmod>2010-01-26T11:14-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/01/21/ie-0-day-patched-out-of-band</loc>
		<lastmod>2010-01-21T12:30-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/01/19/ie-0-day-update</loc>
		<lastmod>2010-01-19T16:08-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/01/14/more-info-on-the-ie-0-day</loc>
		<lastmod>2010-01-14T16:30-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/01/14/ie-0-day-not-adobe-used-in-data-breaches</loc>
		<lastmod>2010-01-14T14:20-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/01/13/adobe-patches-0-day-flaw-used-in-stealth-attacks</loc>
		<lastmod>2010-01-13T14:17-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/01/12/more-on-januarys-patch-tuesday</loc>
		<lastmod>2010-01-12T19:58-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2010/01/12/patch-tuesday-bottomline-january-2010</loc>
		<lastmod>2010-01-12T14:08-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2010/01/05/qualysguard-pci-now-supports-pci-dss-prioritized-approach</loc>
		<lastmod>2010-01-05T16:50-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/12/28/first-federal-banks-on-trust</loc>
		<lastmod>2009-12-28T09:44-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/12/28/paylocity-sustainable-secure-business-growth</loc>
		<lastmod>2009-12-28T09:38-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/12/22/qualys-congratulates-howard-schmidt-on-his-appointment-as-white-house-cybersecurity-coordinator</loc>
		<lastmod>2009-12-22T23:29-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/12/21/on-adobe-qualys-cve-and-math</loc>
		<lastmod>2009-12-21T11:19-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/12/15/update-adobe-reader-0-day-vulnerability</loc>
		<lastmod>2009-12-15T11:33-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/12/10/qualys-nominated-for-three-sc-magazine-us-awards-in-2010</loc>
		<lastmod>2009-12-10T15:15-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/12/08/more-on-decembers-patch-tuesday</loc>
		<lastmod>2009-12-08T16:30-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/12/08/patch-tuesday-bottomline-december-2009</loc>
		<lastmod>2009-12-08T13:16-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/12/08/qualys-ranked-1-for-vulnerability-assessment</loc>
		<lastmod>2009-12-08T10:43-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/11/24/critical-0-day-flaw-in-internet-explorer-6-and-7</loc>
		<lastmod>2009-11-24T13:03-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/11/16/non-critical-0-day-for-windows-7-disclosed</loc>
		<lastmod>2009-11-16T10:51-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/11/10/more-on-novembers-patch-tuesday</loc>
		<lastmod>2009-11-10T16:42-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/11/10/patch-tuesday-bottomline-november-2009</loc>
		<lastmod>2009-11-10T12:03-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/11/06/sans-vlive-online-traning-and-courses</loc>
		<lastmod>2009-11-06T12:22-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/11/06/blueport-commerce-delivers-on-network-security-and-pci-dss-compliance</loc>
		<lastmod>2009-11-06T11:17-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/11/06/randy-barr-of-webex-joins-qualys-as-cso</loc>
		<lastmod>2009-11-06T10:12-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/ssllabs/2009/11/05/ssl-and-tls-authentication-gap-vulnerability-discovered</loc>
		<lastmod>2009-11-05T06:31-08:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/10/21/qualys-ranked-one-of-the-fastest-growing-companies-in-north-america-on-deloittes-2009-technology-fast-500</loc>
		<lastmod>2009-10-21T11:47-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/10/16/philippe-courtot-on-cloud-computing-with-itadviser</loc>
		<lastmod>2009-10-16T11:38-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/10/16/qualys-security-conference-2009-highlights-pictures</loc>
		<lastmod>2009-10-16T09:58-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/10/13/more-on-octobers-patch-tuesday</loc>
		<lastmod>2009-10-13T16:55-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/10/13/patch-tuesday-bottomline-october-2009</loc>
		<lastmod>2009-10-13T13:30-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/10/09/qualys-ranked-the-39th-fastest-growing-company-in-the-silicon-valley</loc>
		<lastmod>2009-10-09T12:09-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/10/01/qualys-featured-in-time-magazine</loc>
		<lastmod>2009-10-01T15:39-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/09/29/university-of-utah-writes-new-thesis-on-risk-management</loc>
		<lastmod>2009-09-29T10:08-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/09/21/qualysguard-pci-40-released</loc>
		<lastmod>2009-09-21T11:58-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/09/16/smb2-8-days-from-0-day-to-exploit</loc>
		<lastmod>2009-09-16T23:01-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/09/16/qualysguard-voted-best-vm-solution-by-search-security-readers-techtarget-for-3rd-year-in-a-row</loc>
		<lastmod>2009-09-16T17:45-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/09/15/new-report-the-top-cyber-security-risks</loc>
		<lastmod>2009-09-15T14:59-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/09/14/sans-qualys-and-tippingpoint-top-cyber-security-risks</loc>
		<lastmod>2009-09-14T22:40-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/09/09/officemax-mexico-maximizes-vulnerability-management-and-regulatory-compliance</loc>
		<lastmod>2009-09-09T12:12-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/09/08/more-on-septembers-patch-tuesday</loc>
		<lastmod>2009-09-08T17:30-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/09/08/patch-tuesday-bottomline-september-2009-updated</loc>
		<lastmod>2009-09-08T12:34-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/09/05/firefox-browser-to-check-for-flash-updates</loc>
		<lastmod>2009-09-05T14:36-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/09/02/iis-ftp-0-day-exploit-released-updated</loc>
		<lastmod>2009-09-02T09:38-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/09/01/sans-course-web-app-penetration-testing-and-ethical-hacking</loc>
		<lastmod>2009-09-01T17:02-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/09/01/its-time-to-embrace-and-prepare-for-the-shift-to-the-cloud</loc>
		<lastmod>2009-09-01T12:11-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/08/13/modulo-and-qualys-partner-to-integrate-security-risk-and-compliance-management-solutions</loc>
		<lastmod>2009-08-13T15:08-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/08/13/qualys-named-one-of-americas-fastest-growing-private-companies-by-inc-magazine-for-the-third-consecutive-year</loc>
		<lastmod>2009-08-13T08:07-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/08/11/patch-tuesday-bottomline-august-2009</loc>
		<lastmod>2009-08-11T18:04-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/08/10/why-companies-need-to-expedite-patching</loc>
		<lastmod>2009-08-10T16:00-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/08/10/qualys-and-archer-technologies-partner-to-expand-it-grc-capabilities-with-comprehensive-vulnerability-and-compliance-data</loc>
		<lastmod>2009-08-10T09:51-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/07/28/laws-of-vulnerabilities-20-black-hat-2009-edition</loc>
		<lastmod>2009-07-28T15:46-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/07/28/mini-patch-tuesday-july-2009-extremely-urgent</loc>
		<lastmod>2009-07-28T11:24-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/laws-of-vulnerabilities/2009/07/24/two-high-profile-zero-day-vulnerabilities-announced</loc>
		<lastmod>2009-07-24T16:43-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/07/23/sourcefire-and-qualys-partner-to-deliver-real-time-risk-analysis-capabilities</loc>
		<lastmod>2009-07-23T09:51-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/07/22/ing-singapore-fighting-it-security-risks-on-all-fronts</loc>
		<lastmod>2009-07-22T09:57-07:00</lastmod>
		<priority>0.0</priority>
	</url>
	<url>
		<loc>https://blog.qualys.com/news/2009/07/21/national-theatre-strengthens-its-payment-security</loc>
		<lastmod>2009-07-21T11:20-07:00</lastmod>
		<priority>0.0</priority>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
