<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://insecureaboutsecurity.com/</loc></url><url><loc>https://insecureaboutsecurity.com/2007/11/08/next-generation-wlans/</loc></url><url><loc>https://insecureaboutsecurity.com/2008/03/19/missed-opportunities-in-log-management/</loc></url><url><loc>https://insecureaboutsecurity.com/2009/10/02/national-cybersecurity-awareness-month-more-than-a-pr-event/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2009/10/19/scary-security-statistics-just-in-time-for-halloween/</loc></url><url><loc>https://insecureaboutsecurity.com/2009/11/02/the-cisco-squeeze/</loc></url><url><loc>https://insecureaboutsecurity.com/2009/11/05/good-data-on-it-risk-management/</loc></url><url><loc>https://insecureaboutsecurity.com/2009/11/06/cybersecurity-coordinator-political-hot-potato/</loc></url><url><loc>https://insecureaboutsecurity.com/2009/11/11/ca-enters-encryption-key-management-market/</loc></url><url><loc>https://insecureaboutsecurity.com/2009/11/13/tracking-the-rise-and-fall-of-cisco-mars</loc></url><url><loc>https://insecureaboutsecurity.com/2009/12/03/the-vepa-standard-a-potential-game-changer</loc></url><url><loc>https://insecureaboutsecurity.com/2009/12/03/the-vepa-standard-a-potential-game-changer/</loc></url><url><loc>https://insecureaboutsecurity.com/2009/12/17/2010-will-cisco-minimize-or-invest-in-information-security</loc></url><url><loc>https://insecureaboutsecurity.com/2009/12/22/howard-schmidt-appointed-as-new-cybersecurity-coordinator/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/01/12/symantec-bolsters-public-sector-offering-with-acquisition-of-gideon-technologies/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/01/29/esg-research-points-to-lots-of-windows-7-migration-in-2010/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/01/what-types-of-organizations-are-investing-in-cloud-computing</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/03/microsoft-sdl-progresses-and-demonstrates-software-assurance-leadership/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/04/cisco-quarterly-results-impress-wall-st-but-not-this-security-analyst/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/05/vertical-industry-networking-spending-will-vary-by-industry-in-2010/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/09/people-may-be-the-weakest-link-in-the-server-virtualization-chain/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/10/house-cybersecurity-bill-passes-whats-next/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/11/note-to-cisco-pick-your-security-battle/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/12/feds-change-cybersecurity-strategy-again/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/12/feds-change-cybersecurity-strategy-again/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/19/does-mcafees-sales-program-highlight-a-morality-problem-in-the-cybersecurity-industry/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/22/what-will-be-hot-at-rsa-2010/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/25/security-spending-segmentation</loc></url><url><loc>https://insecureaboutsecurity.com/2010/02/25/security-spending-segmentation/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/03/02/rsa-2010-cloud-security-announcements-dominate-already/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/03/19/network-security-renaissance/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/03/24/fbi-leader-calls-cybercrime-an-existential-threat-to-our-nation/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/03/30/trends-in-computer-forensics/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/03/31/forensics-litigation-and-full-disk-encryption/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/04/01/state-of-michigan-rolls-out-cloud-computing-services-in-easy-to-consume-bites/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/04/02/interesting-data-about-data-breaches</loc></url><url><loc>https://insecureaboutsecurity.com/2010/04/02/interesting-data-about-data-breaches/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/04/05/mobile-device-security-woes/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/04/06/is-the-ipad-the-culmination-of-the-1990s-itv/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/04/08/brookings-institute-study-indicates-real-savings-from-cloud-computing/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/04/15/why-are-there-still-so-many-problems-with-the-federal-cybersecurity-effort/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/04/20/interop-2010-what-to-expect-beyond-cloud-computing-rhetoric</loc></url><url><loc>https://insecureaboutsecurity.com/2010/04/29/symantec-moving-to-define-an-encryption-architecture</loc></url><url><loc>https://insecureaboutsecurity.com/2010/04/29/symantec-moving-to-define-an-encryption-architecture/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/03/federal-government-remains-curious-but-skeptical-of-cloud-computing/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/05/fedramp-seeks-to-unify-cloud-computing-security-standards-across-the-u-s-government/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/06/nasa-nebula-scientific-focused-cloud-computing/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/06/nasa-nebula-scientific-focused-cloud-computing/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/11/the-illusion-of-due-diligence-another-cybersecurity-must-read/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/13/the-branch-office-network-form-factor-debate/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/20/symantec-verisign-cloud-security/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/20/symantec-verisign-cloud-security/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/21/symantecverisign-the-latest-chapter-of-the-colossal-demise-of-verisign/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/25/open-email-encryption-issue-with-massachusetts-cmr-201-17</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/25/open-email-encryption-issue-with-massachusetts-cmr-201-17/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/05/25/open-email-encryption-issue-with-massachusetts-cmr-201-17/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/02/heterogeneous-server-virtualization/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/02/heterogeneous-server-virtualization/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/03/note-to-washington-read-and-react-to-richard-clarkes-new-book-cyber-war/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/07/what-is-the-average-cost-of-a-data-breach</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/07/what-is-the-average-cost-of-a-data-breach/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/16/end-of-life-for-csa-thats-okay/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/21/lieberman-cybersecurity-bill-fatal-flaws-and-what-the-it-industry-must-do/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/23/note-to-washington-you-own-the-information-security-communications-gap/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/25/interesting-audience-data-from-the-symantec-government-symposium</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/25/interesting-audience-data-from-the-symantec-government-symposium/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/25/interesting-audience-data-from-the-symantec-government-symposium?wpmp_switcher=mobile</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/30/log-management-the-next-generation</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/30/log-management-the-next-generation/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/06/30/log-management-the-next-generation?wpmp_switcher=mobile</loc></url><url><loc>https://insecureaboutsecurity.com/2010/08/03/junipers-mobile-device-security-gamble/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/08/06/blackberry-windows-still-own-the-enterprise-but/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/08/06/blackberry-windows-still-own-the-enterprise-but/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/08/13/the-dnssec-opportunity/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/08/19/why-intel-bought-mcafee-hint-its-all-about-massive-changes-in-the-security-market/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/08/23/making-sense-of-intel-and-mcafee-what-this-acquisition-is-and-is-not/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/08/26/wsj-reports-imminent-sale-of-arcsight-handicapping-the-suitors</loc></url><url><loc>https://insecureaboutsecurity.com/2010/08/26/wsj-reports-imminent-sale-of-arcsight-handicapping-the-suitors/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/09/03/feedback-on-the-national-strategy-for-trusted-identities-in-cyberspace/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/09/09/ibm-an-encryption-key-management-leader/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/09/13/hp-buys-arcsight-more-than-just-security-management</loc></url><url><loc>https://insecureaboutsecurity.com/2010/09/13/hp-buys-arcsight-more-than-just-security-management/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/09/15/the-many-reasons-why-ibmopenpages-makes-sense</loc></url><url><loc>https://insecureaboutsecurity.com/2010/09/15/the-many-reasons-why-ibmopenpages-makes-sense/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/09/16/networking-and-virtualization-vendors-should-join-the-open-vswitch-effort/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/09/22/first-impressions-from-oracle-open-world/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/09/23/ibm-to-buy-brocade-and-other-stupid-ma-rumors/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/09/29/will-ibmblade-networks-hurt-juniper-nope/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/05/nitrosecurity-and-stuxnet/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/06/cisco-bolts-into-high-end-network-security-again/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/07/ciscos-kitchen-sink-product-announcements/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/19/cloud-computing-we-still-havent-mastered-server-virtualization/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/25/server-virtualization-security-a-lot-more-work-is-needed/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/26/get-ready-for-multiple-virtualization-platforms</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/26/get-ready-for-multiple-virtualization-platforms/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/26/get-ready-for-multiple-virtualization-platforms?wpmp_switcher=mobile</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/28/disa-cloud-computing-and-the-last-mile-in-afghanistan/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/29/the-cia-and-the-encrypted-enterprise</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/29/the-cia-and-the-encrypted-enterprise/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/10/29/the-cia-and-the-encrypted-enterprise?wpmp_switcher=mobile</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/01/enterprises-want-broad-functionality-for-mobile-device-security/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/03/technology-ceo-councils-lightweight-federal-it-recommendations/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/08/its-time-for-a-new-name-for-data-loss-prevention-dlp</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/08/its-time-for-a-new-name-for-data-loss-prevention-dlp/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/09/oracle-server-virtualization-the-quiet-killer-technology</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/09/oracle-server-virtualization-the-quiet-killer-technology/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/09/oracle-server-virtualization-the-quiet-killer-technology?wpmp_switcher=mobile</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/17/the-smart-fat-and-smart-thin-edge-of-the-network</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/17/the-smart-fat-and-smart-thin-edge-of-the-network/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/23/worthwhile-cloud-computing-security-resources-for-cios/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/29/new-esg-research-report-points-to-security-vulnerabilities-in-the-us-critical-infrastructure/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/11/30/critical-infrastructure-organizations-want-cyber-security-help-from-the-government/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/12/01/are-it-vendors-getting-a-free-pass-on-cyber-security/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/12/02/corporate-executives-remain-lukewarm-on-cyber-security/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/12/06/are-critical-infrastructure-organizations-unaware-of-security-incidents/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/12/07/wikileaks-critical-infrastructure-and-cyber-security/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/12/09/apple-and-google-make-the-department-of-defense-jump-through-hoops-for-mobile-device-security/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/12/16/wikileaks-and-cyber-security/</loc></url><url><loc>https://insecureaboutsecurity.com/2010/12/20/need-a-job-try-information-security/</loc></url><url><loc>https://insecureaboutsecurity.com/2011/01/03/will-there-be-a-shortage-of-cyber-security-professionals-in-2011/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2011/01/11/homegrown-software-is-not-secure/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2011/01/24/attention-rsa-conference-lets-not-dwell-on-cloud-security/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2011/01/25/identity-and-networking</loc></url><url><loc>https://insecureaboutsecurity.com/2011/01/25/identity-and-networking/</loc></url><url><loc>https://insecureaboutsecurity.com/2011/01/25/identity-and-networking/comment-page-1/</loc></url><url><loc>https://insecureaboutsecurity.com/2011/01/31/public-cloud-concerns</loc></url><url><loc>https://insecureaboutsecurity.com/2011/01/31/public-cloud-concerns/</loc></url><url><loc>https://insecureaboutsecurity.com/2011/02/02/its-time-to-re-examine-endpoint-security</loc></url><url><loc>https://insecureaboutsecurity.com/2011/02/02/its-time-to-re-examine-endpoint-security/</loc></url><url><loc>https://insecureaboutsecurity.com/2011/02/07/nasdaq-hack-just-another-example-of-cyber-security-vulnerabilities/</loc></url><url><loc>https://insecureaboutsecurity.com/2011/02/08/death-of-an-industry-giant-ken-olsen/</loc></url><url><loc>https://insecureaboutsecurity.com/2011/02/10/cisco-financial-results-demonstrate-real-networking-competition-finally/</loc></url><url><loc>https://insecureaboutsecurity.com/2011/02/18/final-musings-from-the-rsa-conference/</loc></url><url><loc>https://insecureaboutsecurity.com/?p=609</loc></url><url><loc>https://insecureaboutsecurity.com/?p=616</loc></url><url><loc>https://insecureaboutsecurity.com/?p=814</loc></url><url><loc>https://insecureaboutsecurity.com/?p=824</loc></url><url><loc>https://insecureaboutsecurity.com/?p=846</loc></url><url><loc>https://insecureaboutsecurity.com/?wpmp_switcher=mobile</loc></url><url><loc>https://insecureaboutsecurity.com/about</loc></url><url><loc>https://insecureaboutsecurity.com/about/</loc></url><url><loc>https://insecureaboutsecurity.com/author/joltsik/</loc></url><url><loc>https://insecureaboutsecurity.com/category/uncategorized/</loc></url><url><loc>https://insecureaboutsecurity.com/cloud-architect-roadmap-certifications-labs-and-portfolio-tips</loc></url><url><loc>https://insecureaboutsecurity.com/contact-me/</loc></url><url><loc>https://insecureaboutsecurity.com/media-inquiries/</loc></url><url><loc>https://insecureaboutsecurity.com/my-links-page/</loc></url><url><loc>https://insecureaboutsecurity.com/page-not-found</loc></url><url><loc>https://insecureaboutsecurity.com/page/2</loc></url><url><loc>https://insecureaboutsecurity.com/page/2/</loc></url><url><loc>https://insecureaboutsecurity.com/page/3</loc></url><url><loc>https://insecureaboutsecurity.com/page/3/</loc></url><url><loc>https://insecureaboutsecurity.com/subscription-billing-gotchas-proration-trials-and-dunning</loc></url><url><loc>https://insecureaboutsecurity.com/tag/android/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/anyconnect/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/arcsight/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/aruba-networks/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/barack-obama/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/brocade-networks/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/ca/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/check-point/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cia/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cip/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cisco-systems/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cisco/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/citrix/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cloud-computing/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/crossbeam-systems</loc></url><url><loc>https://insecureaboutsecurity.com/tag/crossbeam-systems/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/csc/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cyber-security/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cyber-supply-chain-assurance-model/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cyber-supply-chain-assurance/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cyber-supply-chain-security/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cyber-supply-chain/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cybercrime/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cybersecurity-coordinator/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/cybersecurity/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/data-security/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/dell-computer/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/dell/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/dhs/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/disa/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/dod/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/droid/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/efs/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/emc/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/emulex/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/encrypted-enterprise/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/encryption/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/esg/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/esx/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/esxi/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/ethernet-switching/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/extreme-networks/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/f5-networks/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/fatal-system-error/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/federal-government/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/fisma</loc></url><url><loc>https://insecureaboutsecurity.com/tag/fisma/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/good-security/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/good-technology/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/google/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/gsa/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/gus-hunt/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/howard-schmidt/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/hp/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/hyper-v/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/ibm/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/ieee/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/information-security/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/intel/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/iphone/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/joseph-menn/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/juniper-networks/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/juniper/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/kmip/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/log-management/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/logrhythm/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/mainframe/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/mcafee/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/microsoft/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/mobile-active-defense/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/mobile-active-defenses/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/nist/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/nsa/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/oracle-virtual-assembly-builder/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/oracle/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/palm/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/pgp/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/pki/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/president-obama/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/q1-labs/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/riverbed/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/rsa/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/safeboot/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/safecode/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/saic/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/scansafe/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/sdl/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/security/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/server-virtualization/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/smobile</loc></url><url><loc>https://insecureaboutsecurity.com/tag/smobile/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/smobile?wpmp_switcher=mobile</loc></url><url><loc>https://insecureaboutsecurity.com/tag/symantec/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/tippingpoint/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/trend-micro/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/venafi</loc></url><url><loc>https://insecureaboutsecurity.com/tag/vepa</loc></url><url><loc>https://insecureaboutsecurity.com/tag/vepa/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/verisign/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/virtualization/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/vivek-kundra/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/vmware/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/vpro/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/weblogic/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/windows-7-phone/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/windows-7/</loc></url><url><loc>https://insecureaboutsecurity.com/tag/xen/</loc></url></urlset>