


<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/27/whats-new-in-divvycloud-by-rapid7-april-2021/</loc>
        
        
            <lastmod>2021-04-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/26/rapid7s-2021-icer-takeaways-email-security-among-the-fortune-500/</loc>
        
        
            <lastmod>2021-04-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/26/whats-new-in-insightvm-q1-2021-in-review/</loc>
        
        
            <lastmod>2021-04-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/23/metasploit-wrap-up-108/</loc>
        
        
            <lastmod>2021-04-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/22/mdr-vendor-must-haves-part-8-rapid7-incident-response-breach-support/</loc>
        
        
            <lastmod>2021-04-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/21/active-exploitation-of-pulse-connect-secure-zero-day-cve-2021-22893/</loc>
        
        
            <lastmod>2021-04-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/21/the-future-is-friction-free-drive-innovation-with-devops-security/</loc>
        
        
            <lastmod>2021-04-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/21/rapid7-and-velociraptor-join-forces/</loc>
        
        
            <lastmod>2021-04-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/20/overview-of-the-eus-draft-nis-2-directive/</loc>
        
        
            <lastmod>2021-04-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/20/how-to-turbocharge-your-phishing-response-plan/</loc>
        
        
            <lastmod>2021-04-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/19/rapid7-announces-kubernetes-integration-general-availability-in-insightvm/</loc>
        
        
            <lastmod>2021-04-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/16/metasploit-wrap-up-107/</loc>
        
        
            <lastmod>2021-04-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/16/codecov-discloses-supply-chain-compromise/</loc>
        
        
            <lastmod>2021-04-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/16/mdr-vendor-must-haves-part-7-managed-response-actions/</loc>
        
        
            <lastmod>2021-04-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/16/rapid7-releases-new-industry-cyber-exposure-report-icer-ftse-350/</loc>
        
        
            <lastmod>2021-04-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/16/rapid7-announces-general-availability-for-scoped-executive-summary-report-in-insightvm/</loc>
        
        
            <lastmod>2021-04-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/14/how-philip-reiner-created-the-ransomware-task-force/</loc>
        
        
            <lastmod>2021-04-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/13/patch-tuesday-april-2021/</loc>
        
        
            <lastmod>2021-04-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/13/cve-2021-26908-and-cve-2021-26909-automox-agent-information-disclosure-fixed/</loc>
        
        
            <lastmod>2021-04-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/12/mdr-must-haves-part-6-threat-validation-and-detailed-reporting/</loc>
        
        
            <lastmod>2021-04-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/09/metasploit-wrap-up-106/</loc>
        
        
            <lastmod>2021-04-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/09/mdr-vendor-must-haves-part-5-multiple-threat-detection-methodologies-including-deep-attacker-behavior-analysis/</loc>
        
        
            <lastmod>2021-04-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/09/whats-new-in-insightidr-q1-2021-in-review/</loc>
        
        
            <lastmod>2021-04-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/08/attackers-targeting-fortinet-devices-and-sap-applications/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/08/kubernetes-namespaces-are-not-as-secure-as-you-think/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/08/looking-back-and-moving-forward-with-rapid7s-cloud-security-solution/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/07/mdr-vendor-must-haves-part-4-ingestion-of-authentication-data-across-local-domain-and-cloud-sources/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/06/rapid7-releases-new-industry-cyber-exposure-report-icer-fortune-500/</loc>
        
        
            <lastmod>2021-04-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/05/insightidrs-log-search-recent-enhancements-and-upcoming-investments/</loc>
        
        
            <lastmod>2021-04-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/05/whats-new-in-insightappsec-and-tcell-q1-2021-in-review/</loc>
        
        
            <lastmod>2021-04-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/02/metasploit-wrap-up-105/</loc>
        
        
            <lastmod>2021-04-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/04/01/security-nation-beau-woods-and-fotios-chantzis-discuss-their-new-book-practical-iot-hacking/</loc>
        
        
            <lastmod>2021-04-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/30/mdr-vendor-must-haves-part-3-ingestion-of-other-technology-investments/</loc>
        
        
            <lastmod>2021-03-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/29/solarwinds-patches-four-new-vulnerabilities-in-their-orion-platform/</loc>
        
        
            <lastmod>2021-04-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/29/mdr-vendor-must-haves-part-2-ingestion-of-network-device-data/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/26/metasploit-wrap-up-104/</loc>
        
        
            <lastmod>2021-03-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/26/divvycloud-adds-support-for-iam-analyzer-policy-recommendations/</loc>
        
        
            <lastmod>2021-03-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/25/attack-vs-data-what-you-need-to-know-about-threat-hunting/</loc>
        
        
            <lastmod>2021-03-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/24/rapid7-recognized-as-a-strong-performer-in-the-inaugural-forrester-wave-for-mdr-q1-2021/</loc>
        
        
            <lastmod>2021-03-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/23/mdr-vendor-must-haves-part-1-deep-observation-of-real-time-endpoint-data/</loc>
        
        
            <lastmod>2021-03-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/23/defending-against-the-zero-day-analyzing-attacker-behavior-post-exploitation-of-microsoft-exchange/</loc>
        
        
            <lastmod>2021-03-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/22/soc-automation-with-insightidr-and-insightconnect-three-key-use-cases-to-explore-to-optimize-your-security-operations-2/</loc>
        
        
            <lastmod>2021-03-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/19/metasploit-wrap-up-103/</loc>
        
        
            <lastmod>2021-03-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/18/top-security-trends-driving-threat-detection-and-response-priorities-today/</loc>
        
        
            <lastmod>2021-03-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/18/f5-discloses-eight-vulnerabilities-including-four-critical-ones-in-big-ip-systems/</loc>
        
        
            <lastmod>2021-03-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/18/security-nation-nontraditional-paths-into-cybersecurity-part-3-starburst-datas-katie-ledoux/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/16/rapid7-announces-release-of-new-tcell-amazon-cloudfront-agent/</loc>
        
        
            <lastmod>2021-03-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/12/metasploit-wrap-up-102/</loc>
        
        
            <lastmod>2021-03-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/11/introducing-the-vulnerability-intelligence-report-50-cves-that-made-headlines-in-2020/</loc>
        
        
            <lastmod>2021-03-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/11/security-nation-the-cyberpeace-institutes-adrien-ogee-talks-launching-a-nonprofit-amid-covid-19-and-the-importance-of-healthcare-security/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/10/insightidrs-nta-capabilities-expanded-to-aws/</loc>
        
        
            <lastmod>2021-03-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/09/patch-tuesday-march-2021/</loc>
        
        
            <lastmod>2021-03-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/09/divvycloud-by-rapid7-february-2021-feature-release/</loc>
        
        
            <lastmod>2021-03-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/08/how-to-keep-up-with-vulnerability-management-challenges-in-ephemeral-cloud-environments/</loc>
        
        
            <lastmod>2021-03-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/05/metasploit-wrap-up-101/</loc>
        
        
            <lastmod>2021-03-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/03/mass-exploitation-of-exchange-server-zero-day-cves-what-you-need-to-know/</loc>
        
        
            <lastmod>2021-03-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/03/iam-never-gonna-give-you-up-never-gonna-breach-your-cloud/</loc>
        
        
            <lastmod>2021-03-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/03/rapid7s-insightidr-enables-detection-and-response-to-microsoft-exchange-0-day/</loc>
        
        
            <lastmod>2021-03-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/03/01/how-to-achieve-and-maintain-continuous-cloud-compliance/</loc>
        
        
            <lastmod>2021-03-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/27/security-nation-dattos-ryan-weeks-discusses-a-cisos-unique-role-in-crafting-a-pandemic-response/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/26/metasploit-wrap-up-100/</loc>
        
        
            <lastmod>2021-03-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/26/celebrating-black-history-today-and-every-day/</loc>
        
        
            <lastmod>2021-02-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/25/building-a-holistic-vrm-strategy-that-includes-the-web-application-layer/</loc>
        
        
            <lastmod>2021-02-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/25/multiple-unauthenticated-remote-code-control-and-execution-vulnerabilities-in-multiple-cisco-products/</loc>
        
        
            <lastmod>2021-04-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/24/vmware-vcenter-server-cve-2021-21972-remote-code-execution-vulnerability-what-you-need-to-know/</loc>
        
        
            <lastmod>2021-03-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/24/software-engineering-vulnerability-and-risk-management-revolutionizing-the-security-landscape-at-rapid7/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/22/how-to-combat-alert-fatigue-with-cloud-based-siem-tools/</loc>
        
        
            <lastmod>2021-02-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/19/metasploit-wrap-up-99/</loc>
        
        
            <lastmod>2021-02-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/19/take-the-full-stack-approach-to-securing-your-modern-attack-surface/</loc>
        
        
            <lastmod>2021-02-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/18/divvycloud-by-rapid7-feature-release-21-1-2/</loc>
        
        
            <lastmod>2021-04-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/18/securing-your-web-app-one-robot-at-a-time/</loc>
        
        
            <lastmod>2021-04-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/17/why-more-teams-are-shifting-security-analytics-to-the-cloud-this-year/</loc>
        
        
            <lastmod>2021-02-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/16/monitor-google-cloud-platform-gcp-data-with-insightidr/</loc>
        
        
            <lastmod>2021-02-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/12/metasploit-wrap-up-98/</loc>
        
        
            <lastmod>2021-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/12/talkin-smac-alert-labeling-and-why-it-matters/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/12/new-insightvm-dashboard-helps-you-discover-significant-changes-in-your-environment-from-the-past-30-days/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/11/cve-2021-22652-advantech-iview-missing-authentication-rce-fixed/</loc>
        
        
            <lastmod>2021-02-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/10/soar-tools-what-to-look-for-when-investing-in-security-automation-tech/</loc>
        
        
            <lastmod>2021-02-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/09/patch-tuesday-february-2021/</loc>
        
        
            <lastmod>2021-02-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/05/metasploit-wrap-up-97/</loc>
        
        
            <lastmod>2021-02-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/05/security-nation-nontraditional-paths-into-security-part-2-how-steve-ragan-innovates-at-the-intersection-of-journalism-and-tech/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/04/cisco-patches-recently-disclosed-sudo-vulnerability-cve-2021-3156-in-multiple-products/</loc>
        
        
            <lastmod>2021-02-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/03/sonicwall-snwlid-2021-0001-zero-day-and-solarwinds-2021-cve-trifecta-what-you-need-to-know/</loc>
        
        
            <lastmod>2021-02-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/03/vulnerability-scanning-with-the-metasploit-remote-check-service-beta-release/</loc>
        
        
            <lastmod>2021-02-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/01/addressing-the-ot-it-risk-and-asset-inventory-gap/</loc>
        
        
            <lastmod>2021-02-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/02/01/rapid7-acquires-leading-kubernetes-security-provider-alcide/</loc>
        
        
            <lastmod>2021-02-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/29/metasploit-wrap-up-96/</loc>
        
        
            <lastmod>2021-01-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/29/nicer-protocol-deep-dive-internet-exposure-of-http-and-https/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/27/upcoming-webcast-how-far-does-your-vrm-strategy-go/</loc>
        
        
            <lastmod>2021-01-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/26/state-sponsored-threat-actors-target-security-researchers/</loc>
        
        
            <lastmod>2021-02-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/25/finding-results-at-the-intersection-of-security-and-engineering/</loc>
        
        
            <lastmod>2021-01-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/22/metasploit-wrap-up-95/</loc>
        
        
            <lastmod>2021-01-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/22/nicer-protocol-deep-dive-internet-exposure-of-ntp/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/22/security-nation-how-santanders-mark-carney-and-daniel-cuthbert-are-working-to-demystify-quantum-cryptography/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/22/security-nation-nontraditional-paths-into-cybersecurity-part-1-akamais-kathryn-kun/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/21/principles-for-personal-information-security-legislation/</loc>
        
        
            <lastmod>2021-01-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/20/you-can-now-buy-and-renew-five-more-rapid7-products-through-aws-marketplace/</loc>
        
        
            <lastmod>2021-01-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/19/insightidr-2020-highlights-and-whats-ahead-in-2021/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/15/metasploit-wrap-up-94/</loc>
        
        
            <lastmod>2021-01-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/15/nicer-protocol-deep-dive-internet-exposure-of-dns-over-tls/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/12/patch-tuesday-january-2021/</loc>
        
        
            <lastmod>2021-01-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/12/update-on-solarwinds-supply-chain-attack-sunspot-and-new-malware-family-associations/</loc>
        
        
            <lastmod>2021-03-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/08/metasploit-wrap-up-93/</loc>
        
        
            <lastmod>2021-01-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/08/whats-new-in-insightappsec-and-tcell-q4-2020-in-review/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/07/how-covid-19-reinforced-the-need-for-mobile-device-management/</loc>
        
        
            <lastmod>2021-01-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/06/whats-new-in-insightvm-q4-2020-in-review/</loc>
        
        
            <lastmod>2021-01-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/05/a-quick-look-into-cloud-infrastructure-entitlement-management-ciem/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/05/a-quick-look-into-cloud-workload-protection-platforms-cwpps/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/05/a-quick-look-into-cloud-security-posture-management-cspm/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/05/nicer-protocol-deep-dive-internet-exposure-of-dns/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/04/shifting-security-right-how-cloud-based-secops-can-speed-processes-while-maintaining-integrity/</loc>
        
        
            <lastmod>2021-01-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/02/haxmas-hardware-hacking/</loc>
        
        
            <lastmod>2021-01-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2021/01/02/predicting-the-unpredictable-what-will-the-cybersecurity-space-look-like-in-2021/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/30/metasploit-2020-wrap-up/</loc>
        
        
            <lastmod>2021-01-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/28/taking-inspiration-from-our-security-nation-in-an-otherwise-uninspiring-year/</loc>
        
        
            <lastmod>2021-01-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/25/rapid7-labs-2020-naughty-list-summary-report-to-santa/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/24/top-security-recommendations-for-2021/</loc>
        
        
            <lastmod>2021-01-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/23/metasploit-tips-and-tricks-for-haxmas-2020-2/</loc>
        
        
            <lastmod>2021-01-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/22/upnp-with-a-holiday-cheer/</loc>
        
        
            <lastmod>2021-01-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/22/set-new-insightvm-goals-and-share-with-your-team-for-increased-visibility-and-more-efficient-execution/</loc>
        
        
            <lastmod>2020-12-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/18/metasploit-wrap-up-92/</loc>
        
        
            <lastmod>2020-12-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/18/whats-new-in-insightidr-q4-2020-in-review/</loc>
        
        
            <lastmod>2020-12-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/18/security-nation-cub-llewellyn-davies-discusses-the-u-k-s-cyber-aware-campaign-and-quick-tips-to-shore-up-security/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/17/help-others-be-cyber-aware-this-festive-season-and-all-year-round/</loc>
        
        
            <lastmod>2021-01-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/17/how-to-gain-visibility-into-audit-logs-for-policy-customization-in-insightvm/</loc>
        
        
            <lastmod>2020-12-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/16/happy-haxmas-from-the-rapid7-team/</loc>
        
        
            <lastmod>2021-01-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/15/the-risky-business-rapid7-report-highlights-need-for-improved-vulnerability-management-practices/</loc>
        
        
            <lastmod>2020-12-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/14/solarwinds-sunburst-backdoor-supply-chain-attack-what-you-need-to-know/</loc>
        
        
            <lastmod>2021-03-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/11/divvycloud-by-rapid7-feature-release-20-7/</loc>
        
        
            <lastmod>2021-04-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/11/metasploit-wrap-up-91/</loc>
        
        
            <lastmod>2020-12-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/11/insightvm-now-integrates-with-snyk-for-deep-visibility-into-container-vulnerabilities/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/10/nicer-protocol-deep-dive-internet-exposure-of-etcd/</loc>
        
        
            <lastmod>2020-12-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/09/new-all-apps-and-asset-report-combines-power-of-insightvm-and-insightappsec-for-boosted-visibility/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/08/patch-tuesday-december-2020/</loc>
        
        
            <lastmod>2020-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/08/2020-under-the-hoodie-report-reveals-pen-testers-most-loved-vulnerabilities/</loc>
        
        
            <lastmod>2020-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/07/congrats-to-the-winners-of-the-2020-december-metasploit-community-ctf/</loc>
        
        
            <lastmod>2020-12-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/07/nicer-protocol-deep-dive-internet-exposure-of-memcached/</loc>
        
        
            <lastmod>2020-12-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/04/metasploit-wrap-up-90/</loc>
        
        
            <lastmod>2020-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/04/how-to-create-an-os-based-policy-scanning-workflow-in-insightvm/</loc>
        
        
            <lastmod>2020-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/04/rapid7s-insightidr-introduces-integration-with-cybereason/</loc>
        
        
            <lastmod>2020-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/03/a-holistic-approach-to-kubernetes-security-and-compliance/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/02/threat-and-vulnerability-management-best-practices/</loc>
        
        
            <lastmod>2020-12-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/12/01/rapid7-recognized-as-a-strong-performer-among-security-analytics-providers-by-leading-industry-report/</loc>
        
        
            <lastmod>2020-12-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/30/nicer-protocol-deep-dive-internet-exposure-of-redis/</loc>
        
        
            <lastmod>2020-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/27/metasploit-wrap-up-89/</loc>
        
        
            <lastmod>2020-11-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/24/cve-2020-7378-opencrx-unverified-password-change/</loc>
        
        
            <lastmod>2020-11-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/23/dont-let-these-top-cloud-myths-hamper-your-business-decision-makingby-aaron-sawitsky/</loc>
        
        
            <lastmod>2020-11-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/23/nicer-protocol-deep-dive-internet-exposure-of-microsoft-sql-server-ms-sql-udp-1434/</loc>
        
        
            <lastmod>2020-11-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/20/metasploit-wrap-up-88/</loc>
        
        
            <lastmod>2020-11-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/19/announcing-the-2020-december-metasploit-community-ctf/</loc>
        
        
            <lastmod>2020-12-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/19/this-one-time-on-a-pen-test-csrf-to-password-reset-phishing/</loc>
        
        
            <lastmod>2020-11-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/19/security-nation-how-rick-hollands-diverse-experience-helps-him-find-security-talent-in-unique-places/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/18/congress-unanimously-passes-federal-iot-security-law/</loc>
        
        
            <lastmod>2020-12-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/18/behind-the-scenes-under-the-hoodie-2020-video-series/</loc>
        
        
            <lastmod>2020-11-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/17/dont-put-it-on-the-internet-tesla-backup-gateway-edition/</loc>
        
        
            <lastmod>2020-11-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/16/what-is-modern-vulnerability-management/</loc>
        
        
            <lastmod>2020-11-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/13/metasploit-wrap-up-87/</loc>
        
        
            <lastmod>2020-11-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/13/nicer-protocol-deep-dive-internet-exposure-of-mysql/</loc>
        
        
            <lastmod>2020-11-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/13/whats-new-in-insightvm-q3-2020-in-review/</loc>
        
        
            <lastmod>2020-12-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/11/2021-detection-and-response-planning-part-4-planning-for-success-with-a-cloud-siem/</loc>
        
        
            <lastmod>2020-11-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/11/patch-tuesday-november-2020/</loc>
        
        
            <lastmod>2020-11-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/11/vmware-esxi-openslp-remote-code-execution-vulnerability-cve-2020-3992-and-cve-2019-5544-what-you-need-to-know/</loc>
        
        
            <lastmod>2020-11-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/10/saltstack-pre-authenticated-remote-root-cve-2020-16846-and-cve-2020-25592-what-you-need-to-know/</loc>
        
        
            <lastmod>2020-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/10/visualizing-network-traffic-data-to-drive-action/</loc>
        
        
            <lastmod>2020-11-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/09/advance-your-career-life-as-a-rapid7-belfast-software-engineer/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/06/metasploit-wrap-up-86/</loc>
        
        
            <lastmod>2020-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/06/this-one-time-on-a-pen-test-how-i-hacked-a-self-driving-car/</loc>
        
        
            <lastmod>2020-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/05/tcell-by-rapid7-now-available-for-the-european-region/</loc>
        
        
            <lastmod>2020-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/04/nicer-protocol-deep-dive-internet-exposure-of-citrix-adc-netscaler/</loc>
        
        
            <lastmod>2020-11-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/03/the-story-behind-security-breaches/</loc>
        
        
            <lastmod>2020-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/11/02/overview-of-content-security-policies-csp-on-the-web/</loc>
        
        
            <lastmod>2020-11-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/30/metasploit-wrap-up-85/</loc>
        
        
            <lastmod>2020-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/30/national-cybersecurity-awareness-month-security-pros-offer-top-tips-for-staying-safe-online/</loc>
        
        
            <lastmod>2020-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/30/security-nation-how-to-combat-the-spread-of-misinformation-and-disinformation-ahead-of-the-election/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/29/oracle-weblogic-unauthenticated-complete-takeover-cve-2020-14882-what-you-need-to-know/</loc>
        
        
            <lastmod>2020-11-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/29/how-maria-barsallo-lynch-helps-combat-the-spread-of-misinformation-and-disinformation-ahead-of-the-election/</loc>
        
        
            <lastmod>2020-10-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/29/trick-or-treat-what-we-can-learn-from-the-spookiest-vulnerabilities-of-the-year/</loc>
        
        
            <lastmod>2020-10-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/28/rapid7-announces-improvements-to-goals-and-slas-in-insightvm-2/</loc>
        
        
            <lastmod>2020-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/27/2021-detection-and-response-planning-part-3-why-2021-is-the-year-for-soc-automation/</loc>
        
        
            <lastmod>2020-11-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/26/scan-template-best-practices-in-insightvm/</loc>
        
        
            <lastmod>2020-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/23/metasploit-wrap-up-84/</loc>
        
        
            <lastmod>2020-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/23/from-the-dorm-room-to-the-white-house-how-researcher-jack-cable-works-to-ensure-election-security/</loc>
        
        
            <lastmod>2020-10-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/23/nicer-protocol-deep-dive-internet-exposure-of-remote-desktop-rdp/</loc>
        
        
            <lastmod>2020-10-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/22/whats-new-in-insightappsec-and-tcell-q3-2020-in-review/</loc>
        
        
            <lastmod>2020-10-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/21/this-one-time-on-a-pen-test-thanks-for-sharing-your-wi-fi/</loc>
        
        
            <lastmod>2020-10-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/</loc>
        
        
            <lastmod>2020-11-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/19/are-you-still-running-end-of-life-windows-servers/</loc>
        
        
            <lastmod>2020-10-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/19/nicer-protocol-deep-dive-internet-exposure-of-imap-and-pop/</loc>
        
        
            <lastmod>2020-10-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/16/metasploit-wrap-up-83/</loc>
        
        
            <lastmod>2020-10-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/15/fewer-false-alarms-faster-reporting-insightvm-introduces-new-one-click-fix-for-false-positives/</loc>
        
        
            <lastmod>2020-10-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/15/introducing-enhanced-endpoint-telemetry-eet-in-insightidr/</loc>
        
        
            <lastmod>2020-10-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/14/heartland-dentals-ambitions-land-them-in-the-cloud/</loc>
        
        
            <lastmod>2020-10-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/14/there-goes-the-neighborhood-dealing-with-cve-2020-16898-a-k-a-bad-neighbor/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/13/patch-tuesday-october-2020/</loc>
        
        
            <lastmod>2020-10-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/13/2021-detection-and-response-planning-part-2-driving-soc-efficiency-with-a-detections-first-approach-to-siem/</loc>
        
        
            <lastmod>2020-11-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/12/whats-new-in-insightidr-q3-2020-in-review/</loc>
        
        
            <lastmod>2020-10-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/09/metasploit-wrap-up-82/</loc>
        
        
            <lastmod>2020-10-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/09/psa-increase-in-rdp-attacks-means-its-time-to-mind-your-rdps-and-qs/</loc>
        
        
            <lastmod>2020-10-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/09/nicer-protocol-deep-dive-internet-exposure-of-vnc/</loc>
        
        
            <lastmod>2020-10-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/08/how-insightvm-helps-you-save-time-and-prove-value/</loc>
        
        
            <lastmod>2020-10-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/07/this-one-time-on-a-pen-test-doing-well-with-xml/</loc>
        
        
            <lastmod>2020-10-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/07/security-nation-from-the-dorm-room-to-the-white-house-how-researcher-jack-cable-works-to-ensure-election-security/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/06/easily-explore-your-log-data-with-a-single-query-in-insightidr/</loc>
        
        
            <lastmod>2020-10-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/06/ransomware-payments-and-sanctions-u-s-treasury-advisory/</loc>
        
        
            <lastmod>2020-11-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/05/why-every-organization-needs-a-vulnerability-management-policy/</loc>
        
        
            <lastmod>2020-10-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/02/metasploit-wrap-up-81/</loc>
        
        
            <lastmod>2020-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/02/hp-device-manager-cavalcade-of-critical-cves-cve-2020-6925-6927-what-you-need-to-know/</loc>
        
        
            <lastmod>2020-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/02/nicer-protocol-deep-dive-internet-exposure-of-smtp/</loc>
        
        
            <lastmod>2020-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/02/this-one-time-on-a-pen-test-i-know-everything/</loc>
        
        
            <lastmod>2020-10-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/10/01/rapid7-introduces-active-response-for-end-to-end-detection-and-response/</loc>
        
        
            <lastmod>2020-10-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/30/exploitability-analysis-smash-the-ref-bug-class/</loc>
        
        
            <lastmod>2020-09-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/29/microsoft-exchange-2010-end-of-support-and-overall-patching-study/</loc>
        
        
            <lastmod>2020-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/29/2021-detection-and-response-planning-part-1-rapid7s-jeffrey-gardner-breaks-down-how-cisos-should-approach-security-planning-for-the-new-year/</loc>
        
        
            <lastmod>2020-11-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/26/security-nation-how-entrepreneur-christian-wentz-takes-on-identity-authentication-and-data-integrity-one-line-of-code-at-a-time/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/25/metasploit-wrap-up-80/</loc>
        
        
            <lastmod>2020-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/25/nicer-protocol-deep-dive-internet-exposure-of-rsync/</loc>
        
        
            <lastmod>2020-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/25/podcast-how-entrepreneur-christian-wentz-takes-on-identity-authentication-and-data-integrity-one-line-of-code-at-a-time/</loc>
        
        
            <lastmod>2020-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/23/this-one-time-on-a-pen-test-aint-no-fence-high-enough/</loc>
        
        
            <lastmod>2020-10-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/22/rapid7-releases-q2-2020-quarterly-threat-report/</loc>
        
        
            <lastmod>2020-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/21/define-what-to-parse-from-logs-with-the-custom-parsing-tool-in-insightidr/</loc>
        
        
            <lastmod>2020-11-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/18/untitled-6/</loc>
        
        
            <lastmod>2020-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/18/nicer-protocol-deep-dive-internet-exposure-of-smb/</loc>
        
        
            <lastmod>2020-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/17/a-step-closer-to-stronger-federal-iot-security/</loc>
        
        
            <lastmod>2020-12-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/17/title-decentralize-remediation-efforts-to-gain-more-efficiency-with-insightvm/</loc>
        
        
            <lastmod>2020-09-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/16/this-one-time-on-a-pen-test-outwitting-the-vexing-vpn/</loc>
        
        
            <lastmod>2020-10-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/15/rapid7-and-snyk-are-on-the-run-time-with-expanded-sca-capabilities/</loc>
        
        
            <lastmod>2020-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/14/cve-2020-1472-zerologon-critical-privilege-escalation/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/14/vulnerability-remediation-vs-mitigation-whats-the-difference/</loc>
        
        
            <lastmod>2020-09-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/14/nicer-protocol-deep-dive-internet-exposure-of-ftp-s-tcp-990/</loc>
        
        
            <lastmod>2020-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/11/metasploit-wrap-up-79/</loc>
        
        
            <lastmod>2020-09-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/10/how-to-track-and-remediate-default-account-vulnerabilities-in-insightvm/</loc>
        
        
            <lastmod>2020-09-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/09/this-one-time-on-a-pen-test-im-calling-my-lawyer/</loc>
        
        
            <lastmod>2020-10-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/09/how-rapid7-is-transforming-an-on-premises-soar-tool-into-a-cloud-first-automation-platform/</loc>
        
        
            <lastmod>2020-09-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/09/patch-tuesday-september-2020/</loc>
        
        
            <lastmod>2020-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/04/metasploit-wrap-up-78/</loc>
        
        
            <lastmod>2020-09-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/04/nicer-protocol-deep-dive-internet-exposure-of-ftp/</loc>
        
        
            <lastmod>2020-09-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/02/this-one-time-on-a-pen-test-playing-social-security-slots/</loc>
        
        
            <lastmod>2020-10-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/09/01/ask-a-pen-tester-part-2-a-q-a-with-rapid7-pen-testers-gisela-hinojosa-and-carlota-bindner/</loc>
        
        
            <lastmod>2020-09-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/31/why-i-joined-rapid7-5/</loc>
        
        
            <lastmod>2020-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/28/untitled-5/</loc>
        
        
            <lastmod>2020-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/28/nicer-protocol-deep-dive-secure-shell-ssh/</loc>
        
        
            <lastmod>2020-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/28/how-three-insightvm-customers-scaled-their-vulnerability-management-programs-with-rapid7/</loc>
        
        
            <lastmod>2020-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/27/internet-of-things-cybersecurity-regulation-and-rapid7/</loc>
        
        
            <lastmod>2020-08-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/26/rapid7-releases-2020-under-the-hoodie-report-lessons-learned-from-a-year-of-penetration-tests/</loc>
        
        
            <lastmod>2020-08-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/25/insightidr-demo-cloud-native-siem-vs-modern-security-challenges/</loc>
        
        
            <lastmod>2020-08-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/24/life-as-a-rapid7-rotato-launch-your-career/</loc>
        
        
            <lastmod>2020-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/21/metasploit-wrap-up-77/</loc>
        
        
            <lastmod>2020-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/21/nicer-protocol-deep-dive-internet-exposure-of-telnet-services/</loc>
        
        
            <lastmod>2020-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/20/automated-external-sonar-scanning-workflow-with-insightvm/</loc>
        
        
            <lastmod>2020-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/19/ask-a-pen-tester-part-1-a-q-a-with-rapid7-pen-testers-gisela-hinojosa-and-carlota-bindner/</loc>
        
        
            <lastmod>2020-09-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/18/join-team-moose-become-a-rapid7-bdr/</loc>
        
        
            <lastmod>2020-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/17/stop-attackers-in-their-tracks-with-insight-agent-quarantine/</loc>
        
        
            <lastmod>2020-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/15/security-nation-how-security-pro-dave-kennedy-keeps-his-infosec-skills-sharp-while-telecommuting/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/14/untitled-4/</loc>
        
        
            <lastmod>2020-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/14/how-security-guru-dave-kennedy-keeps-his-infosec-skills-sharp-while-telecommuting/</loc>
        
        
            <lastmod>2020-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/14/data-ingestion-and-data-digestion-what-siem-log-consumption-tells-us-about-modern-attack-patterns/</loc>
        
        
            <lastmod>2020-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/14/three-things-you-can-expect-as-an-intern-at-rapid7/</loc>
        
        
            <lastmod>2020-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/13/augmenting-native-cloud-service-provider-security/</loc>
        
        
            <lastmod>2021-04-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/12/patch-tuesday-august-2020/</loc>
        
        
            <lastmod>2020-08-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/11/rapid7-named-a-leader-in-the-2020-forrester-wave-for-midsize-managed-security-services-providers-q3-2020/</loc>
        
        
            <lastmod>2020-08-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/10/whats-new-in-insightvm-h1-2020-in-review/</loc>
        
        
            <lastmod>2020-08-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/07/virtual-black-hat-rapid7-experts-share-key-takeaways-from-day-2-sessions/</loc>
        
        
            <lastmod>2020-08-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/07/metasploit-wrap-up-76/</loc>
        
        
            <lastmod>2020-08-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/07/rapid7-tcell-now-supports-microsoft-agents-on-32-bit/</loc>
        
        
            <lastmod>2020-08-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/06/virtual-black-hat-rapid7-experts-share-key-takeaways-from-day-1-sessions-2/</loc>
        
        
            <lastmod>2020-08-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/06/metasploit-6-now-under-active-development/</loc>
        
        
            <lastmod>2020-08-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/08/04/insightidr-connects-to-zoom-for-easy-monitoring/</loc>
        
        
            <lastmod>2020-08-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/31/metasploit-wrap-up-75/</loc>
        
        
            <lastmod>2020-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/30/metasploit-open-source-security-meetup-ossm-virtual-edition/</loc>
        
        
            <lastmod>2020-08-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/30/cloud-best-practices-every-security-professional-should-know/</loc>
        
        
            <lastmod>2020-07-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/30/security-nation-joe-fitzpatrick-on-the-future-of-hardware-security-training-sessions/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/29/remote-code-execution-risks-in-secomea-moxa-and-hms-ewon-ics-vpn-vulnerabilities-what-you-need-to-know/</loc>
        
        
            <lastmod>2020-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/29/rapid7-statement-on-privacy-and-status-of-eu-us-data-transfers-post-schrems-ii/</loc>
        
        
            <lastmod>2020-12-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/29/joe-fitzpatrick-on-the-future-of-hardware-security-training-sessions/</loc>
        
        
            <lastmod>2020-08-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/28/plugin-development-made-easy-with-rapid7/</loc>
        
        
            <lastmod>2020-07-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/27/hear-from-your-peers-advice-for-your-first-90-days-using-a-vulnerability-management-solution/</loc>
        
        
            <lastmod>2020-07-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/24/metasploit-wrap-up-74/</loc>
        
        
            <lastmod>2020-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/24/rapid7life-in-a-remote-world-building-the-bridge-while-we-cross/</loc>
        
        
            <lastmod>2020-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/23/cve-2020-3452-cisco-asa-firepower-read-only-path-traversal-vulnerability-what-you-need-to-know/</loc>
        
        
            <lastmod>2021-01-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/23/whats-new-in-insightidr-h1-2020-in-review/</loc>
        
        
            <lastmod>2020-07-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/22/q-a-from-june-2020-customer-webcast-on-insightvm-custom-policy-builder/</loc>
        
        
            <lastmod>2020-07-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/21/defense-in-depth-using-deception-technology-in-insightidr/</loc>
        
        
            <lastmod>2020-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/20/rapid7-releases-2020-nicer-report/</loc>
        
        
            <lastmod>2020-08-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/17/metasploit-wrap-up-73/</loc>
        
        
            <lastmod>2020-07-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/17/how-to-operationalize-threat-response-from-chat-using-insightconnect-2/</loc>
        
        
            <lastmod>2020-07-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/16/understanding-security-as-an-investment-the-importance-of-pen-testing-for-startups/</loc>
        
        
            <lastmod>2020-07-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/15/top-5-ways-to-get-a-network-traffic-source-on-your-network/</loc>
        
        
            <lastmod>2020-07-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/15/patch-tuesday-july-2020/</loc>
        
        
            <lastmod>2020-07-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/14/windows-dns-server-remote-code-execution-vulnerability-cve-2020-1350-what-you-need-to-know/</loc>
        
        
            <lastmod>2020-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/14/pay-attention-to-your-sap-security/</loc>
        
        
            <lastmod>2020-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/14/unlocking-the-power-of-macro-authentication-in-application-security-part-three/</loc>
        
        
            <lastmod>2020-07-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/13/citizen-science-and-medical-consumerism-confronting-the-tech-wisdom-gap-in-modern-healthcare/</loc>
        
        
            <lastmod>2020-07-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/13/rapid7-joins-cfaa-brief-to-the-supreme-court/</loc>
        
        
            <lastmod>2020-07-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/10/metasploit-wrap-up-72/</loc>
        
        
            <lastmod>2020-07-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/10/how-insightconnects-vulnerability-remediation-toolkit-connects-teams-and-speeds-up-workflows/</loc>
        
        
            <lastmod>2020-07-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/09/the-net-effect-why-cloud-iam-is-so-difficult/</loc>
        
        
            <lastmod>2021-04-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/09/small-business-in-a-big-world-wide-web-what-you-should-know-to-stay-secure/</loc>
        
        
            <lastmod>2020-07-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/08/seeing-value-from-day-one-what-you-need-to-know-about-cloud-siem-deployment-and-configuration/</loc>
        
        
            <lastmod>2020-07-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/07/application-security-takes-center-stage-in-this-years-verizon-data-breach-investigations-report/</loc>
        
        
            <lastmod>2020-07-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/06/rapid7-named-a-june-2020-gartner-peer-insights-customers-choice-for-siem/</loc>
        
        
            <lastmod>2020-07-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/06/12-most-exploited-vulnerabilities-how-to-navigate-vulnerabilities-in-a-security-program/</loc>
        
        
            <lastmod>2020-07-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/06/gain-a-more-dynamic-view-how-to-connect-cloud-configuration-assessment-in-insightvm-to-cloudtrail-in-aws/</loc>
        
        
            <lastmod>2020-07-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/03/metasploit-wrap-up-71/</loc>
        
        
            <lastmod>2020-07-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/01/insightappsec-release-roundup-whats-new-and-updated/</loc>
        
        
            <lastmod>2020-07-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/07/01/how-to-use-custom-policy-builder-to-customize-password-policies-in-insightvm/</loc>
        
        
            <lastmod>2020-07-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/30/unlocking-the-power-of-macro-authentication-in-application-security-part-two/</loc>
        
        
            <lastmod>2020-07-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/29/cve-2020-2021-authentication-bypass-in-pan-os-security-assertion-markup-language-saml-authentication-disclosed/</loc>
        
        
            <lastmod>2020-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/29/building-a-printed-circuit-board-probe-testing-jig/</loc>
        
        
            <lastmod>2020-06-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/26/metasploit-wrap-up-70/</loc>
        
        
            <lastmod>2020-06-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/26/rapid7-managed-detection-and-response-mdr-the-service-that-never-sleeps/</loc>
        
        
            <lastmod>2020-06-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/25/customer-spotlight-how-amedisys-ciso-proves-securitys-value-to-the-business/</loc>
        
        
            <lastmod>2020-06-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/24/back-to-basics-maintaining-cloud-migration-oversight-while-navigating-the-new-normal/</loc>
        
        
            <lastmod>2020-06-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/23/increasing-visibility-in-changing-threat-environments-a-conversation-with-anthony-edwards/</loc>
        
        
            <lastmod>2020-06-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/22/security-nation-advancements-in-vulnerability-reporting-in-the-post-pgp-era-a-conversation-with-art-manion/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/22/advancements-in-vulnerability-reporting-in-the-post-pgp-era-a-conversation-with-art-manion/</loc>
        
        
            <lastmod>2020-06-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/19/metasploit-wrap-up-69/</loc>
        
        
            <lastmod>2020-06-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/19/how-to-approach-risk-management-advice-from-rapid7-customers/</loc>
        
        
            <lastmod>2020-06-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/18/how-rapid7-customers-are-using-network-traffic-analysis-in-detection-and-response/</loc>
        
        
            <lastmod>2020-06-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/17/the-security-practitioners-intro-to-the-cloud-everything-you-ever-wanted-to-know-but-were-afraid-to-ask/</loc>
        
        
            <lastmod>2020-06-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/16/siem-security-tools-four-expensive-misconceptions/</loc>
        
        
            <lastmod>2020-06-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/16/unlocking-the-power-of-macro-authentication-part-one/</loc>
        
        
            <lastmod>2020-06-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/15/introducing-a-new-insightvm-dashboard-to-monitor-external-and-remote-workforce-assets-in-your-environment/</loc>
        
        
            <lastmod>2020-06-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/13/security-nation-citizen-science-and-medical-consumerism-confronting-the-tech-wisdom-gap-in-modern-healthcare/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/12/metasploit-wrap-up-68/</loc>
        
        
            <lastmod>2020-06-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/11/support-faqs-managing-your-organizations-security-in-response-to-covid-19/</loc>
        
        
            <lastmod>2020-06-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/10/how-team-collaboration-can-help-you-scale-the-vulnerability-mountain/</loc>
        
        
            <lastmod>2020-06-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/09/security-nation-developing-sustainable-vulnerability-management-with-katie-moussouris/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/09/patch-tuesday-june-2020/</loc>
        
        
            <lastmod>2020-06-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/09/developing-sustainable-vulnerability-management-with-katie-moussouris/</loc>
        
        
            <lastmod>2020-06-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/08/maturing-your-security-posture-around-the-clock-threat-detection-with-managed-detection-response-mdr-services/</loc>
        
        
            <lastmod>2020-06-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/05/metasploit-wrap-up-67/</loc>
        
        
            <lastmod>2020-06-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/05/confessions-of-a-former-ciso-shaming-people-for-bad-security/</loc>
        
        
            <lastmod>2020-06-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/04/amplifying-impact-to-reduce-friction-a-guide-to-security-team-efficiency/</loc>
        
        
            <lastmod>2020-06-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/03/custom-policy-builder-is-now-in-open-preview-in-insightvm/</loc>
        
        
            <lastmod>2020-07-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/03/standing-together-public-statement-from-rapid7-ceo-corey-thomas/</loc>
        
        
            <lastmod>2020-06-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/06/03/rapid7-quarterly-threat-report-2020-q1/</loc>
        
        
            <lastmod>2020-06-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/29/metasploit-wrap-up-66/</loc>
        
        
            <lastmod>2020-05-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/29/assessing-our-new-security-landscape-business-continuity-amid-shifting-priorities/</loc>
        
        
            <lastmod>2020-05-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/28/the-masked-synger-investigating-a-traffic-phenomenon/</loc>
        
        
            <lastmod>2020-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/27/finding-flexibility-in-your-vulnerability-management-solution/</loc>
        
        
            <lastmod>2020-05-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/26/supporting-our-medical-professionals-in-the-age-of-covid-19-cybersecurity-in-the-healthcare-sector/</loc>
        
        
            <lastmod>2020-05-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/22/metasploit-wrap-up-65/</loc>
        
        
            <lastmod>2020-05-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/21/managing-cybersecurity-in-the-real-estate-industry-a-rapid7-customer-story/</loc>
        
        
            <lastmod>2020-05-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/20/q-a-from-april-2020-customer-webcast-on-insightvm-dashboards-executive-summary-report/</loc>
        
        
            <lastmod>2020-05-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/19/dancing-with-the-breaches-a-quick-step-through-the-2020-verizon-data-breach-investigations-report-dbir/</loc>
        
        
            <lastmod>2020-05-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/19/integrity-is-indispensable-assessing-partnerships-and-performance-metrics-in-a-crisis-response/</loc>
        
        
            <lastmod>2020-05-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/18/rapid7s-insightvm-receives-five-stars-from-sc-magazine/</loc>
        
        
            <lastmod>2020-05-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/15/metasploit-wrap-up-64/</loc>
        
        
            <lastmod>2020-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/15/moving-toward-a-better-signature-metric-in-socs-detection-efficacy/</loc>
        
        
            <lastmod>2020-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/13/how-to-simplify-insightconnect-workflows-using-join-step/</loc>
        
        
            <lastmod>2020-05-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/12/patch-tuesday-may-2020/</loc>
        
        
            <lastmod>2020-05-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/12/three-switching-costs-to-consider-when-evaluating-a-new-vulnerability-management-solution/</loc>
        
        
            <lastmod>2020-05-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/12/divvycloud-by-rapid7-announces-new-infrastructure-as-code-security-capability/</loc>
        
        
            <lastmod>2021-03-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/11/preparing-for-the-cybersecurity-maturity-model-certification-cmmc-part-2-the-larger-picture/</loc>
        
        
            <lastmod>2020-05-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/11/optimizing-security-in-the-work-from-home-era/</loc>
        
        
            <lastmod>2020-05-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/08/may-2020-cisco-remote-vulnerabilities-guidance/</loc>
        
        
            <lastmod>2020-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/08/metasploit-wrap-up-63/</loc>
        
        
            <lastmod>2020-05-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/08/best-practices-for-securing-e-commerce-applications/</loc>
        
        
            <lastmod>2020-05-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/07/how-to-increase-your-security-teams-visibility-within-your-organization-and-what-happens-when-you-do/</loc>
        
        
            <lastmod>2020-05-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/06/why-soar-is-an-essential-cybersecurity-tool-for-financial-services-companies/</loc>
        
        
            <lastmod>2020-05-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/05/reduce-risk-with-cyberark-and-rapid7-integrations/</loc>
        
        
            <lastmod>2020-05-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/04/5-challenges-outsourced-detection-and-response-operations-can-help-solve/</loc>
        
        
            <lastmod>2020-05-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/01/security-nation-advocating-for-tech-literacy-and-transparency-a-discussion-with-i-am-the-calvarys-josh-corman-and-audra-hatch/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/01/metasploit-wrap-up-62/</loc>
        
        
            <lastmod>2020-05-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/05/01/advocating-for-tech-literacy-and-transparency-a-discussion-with-i-am-the-cavalrys-josh-corman-and-audra-hatch/</loc>
        
        
            <lastmod>2020-05-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/30/staying-healthy-and-secure-how-to-promote-a-culture-of-productivity-while-keeping-your-security-posture-intact/</loc>
        
        
            <lastmod>2020-04-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/30/rapid7s-full-stack-vulnerability-risk-management-portfolio-recognized-for-application-security-capabilities-2/</loc>
        
        
            <lastmod>2020-04-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/28/rapid7-announces-intent-to-acquire-divvycloud/</loc>
        
        
            <lastmod>2020-04-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/28/risks-in-disposing-of-iot-embedded-technology-2/</loc>
        
        
            <lastmod>2020-04-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/27/cve-2020-12271-sophos-xg-firewall-pre-auth-sql-injection-vulnerability-remediation-guidance-and-exposure-overview/</loc>
        
        
            <lastmod>2020-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/27/the-healthcare-security-pros-guide-to-ransomware-attacks/</loc>
        
        
            <lastmod>2020-04-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/24/security-nation-where-tech-meets-legal-discussing-crowdsourced-security-testing-with-bugcrowds-casey-ellis/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/24/metasploit-wrap-up-61/</loc>
        
        
            <lastmod>2020-04-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/24/where-tech-meets-legal-discussing-crowdsourced-security-testing-with-bugcrowds-casey-ellis/</loc>
        
        
            <lastmod>2020-04-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/22/stuck-inside-top-books-we-recommend-security-pros-read-during-quarantine/</loc>
        
        
            <lastmod>2020-04-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/21/how-insightidr-is-accelerating-detection-and-response-in-modern-environments/</loc>
        
        
            <lastmod>2020-04-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/20/confessions-of-a-former-ciso-promoting-individual-contributors-into-leadership-roles/</loc>
        
        
            <lastmod>2020-04-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/20/resources-on-the-main-street-lending-program-to-support-small-and-mid-sized-businesses/</loc>
        
        
            <lastmod>2020-04-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/17/metasploit-wrap-up-60/</loc>
        
        
            <lastmod>2020-04-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/17/uncooking-eggs-manual-dridex-dropper-malicious-document-deobfuscation-methods/</loc>
        
        
            <lastmod>2020-04-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/16/security-nation-how-the-masscybercenter-helps-elevate-cybersecurity-initiatives-in-municipalities/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/16/how-the-masscybercenter-helps-elevate-cybersecurity-initiatives-in-municipalities/</loc>
        
        
            <lastmod>2020-04-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/16/nmap-service-detection-for-nexpose-and-insightvm-scan-engines/</loc>
        
        
            <lastmod>2020-04-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/15/preparing-for-the-cybersecurity-maturity-model-certification-cmmc-part-1-practice-and-process/</loc>
        
        
            <lastmod>2020-05-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/15/meet-attackerkb/</loc>
        
        
            <lastmod>2020-04-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/14/patch-tuesday-april-2020/</loc>
        
        
            <lastmod>2020-04-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/13/remote-work-readiness-how-to-keep-a-security-mindset/</loc>
        
        
            <lastmod>2020-04-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/10/metasploit-wrap-up-59/</loc>
        
        
            <lastmod>2020-04-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/09/answers-to-three-faqs-about-the-new-and-improved-cloud-configuration-assessment-remediation-content-in-insightvm/</loc>
        
        
            <lastmod>2020-04-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/08/security-nation-shifting-security-conferences-to-virtual-the-new-face-of-events-in-2020-and-beyond-with-john-strand/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/08/self-isolation-home-networking-and-open-source-recog-and-rumble/</loc>
        
        
            <lastmod>2020-04-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/08/shifting-security-conferences-to-virtual-the-new-face-of-events-in-2020-and-beyond/</loc>
        
        
            <lastmod>2020-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/07/8-steps-to-successfully-implement-the-cis-top-20-controls-in-your-organization/</loc>
        
        
            <lastmod>2020-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/06/financial-resources-for-small-businesses-grappling-with-covid-19/</loc>
        
        
            <lastmod>2020-04-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/06/phishing-for-system-on-microsoft-exchange-cve-2020-0688/</loc>
        
        
            <lastmod>2020-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/06/4-common-goals-for-vulnerability-risk-management-programs/</loc>
        
        
            <lastmod>2020-04-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/03/metasploit-wrap-up-58/</loc>
        
        
            <lastmod>2020-04-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/03/analyze-security-data-faster-with-visual-search-in-insightidr/</loc>
        
        
            <lastmod>2020-04-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/02/dispelling-zoom-bugbears-what-you-need-to-know-about-the-latest-zoom-vulnerabilities/</loc>
        
        
            <lastmod>2020-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/02/soc-automation-accelerate-threat-detection-and-response-with-siem-and-soar/</loc>
        
        
            <lastmod>2020-04-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/04/01/how-to-measurably-reduce-false-positive-vulnerabilities-by-up-to-22/</loc>
        
        
            <lastmod>2020-04-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/31/security-nation-a-chat-with-jonathan-cran-about-intrigue-and-security-in-the-covid-19-pandemic/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/31/a-chat-with-jonathan-cran-about-intrigue-and-security-in-the-covid-19-pandemic/</loc>
        
        
            <lastmod>2020-03-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/30/working-from-home-wi-fi-security-and-tips-and-tricks/</loc>
        
        
            <lastmod>2020-03-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/27/metasploit-wrap-up-57/</loc>
        
        
            <lastmod>2020-03-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/27/how-to-participate-in-our-metasploit-pro-customer-survey/</loc>
        
        
            <lastmod>2020-12-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/26/rapid7-named-a-march-2020-gartner-peer-insights-customers-choice-for-vulnerability-assessment/</loc>
        
        
            <lastmod>2020-03-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/25/automating-multi-factor-authentication-time-based-one-time-passwords/</loc>
        
        
            <lastmod>2020-03-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/24/active-exploitation-of-unpatched-windows-font-parsing-vulnerability/</loc>
        
        
            <lastmod>2020-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/24/security-nation-proactive-security-is-the-new-black-lessons-from-the-trenches-of-building-a-security-product/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/24/cybersecurity-vulnerability-disclosure-in-trade-agreements/</loc>
        
        
            <lastmod>2020-03-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/24/proactive-security-is-the-new-black-lessons-from-the-trenches-of-building-a-security-product/</loc>
        
        
            <lastmod>2020-03-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/20/metasploit-wrap-up-56/</loc>
        
        
            <lastmod>2020-03-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/20/top-3-outcomes-organizations-try-to-achieve-in-their-incident-detection-and-response-programs/</loc>
        
        
            <lastmod>2020-03-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/19/the-importance-of-network-visibility-with-a-remote-workforce/</loc>
        
        
            <lastmod>2020-03-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/18/how-to-maintain-your-cybersecurity-posture-in-uncertain-times/</loc>
        
        
            <lastmod>2020-03-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/17/redefining-how-to-measure-the-success-of-your-vulnerability-management-program/</loc>
        
        
            <lastmod>2020-04-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/16/how-rapid7-customer-hilltop-holdings-integrates-security-tools-for-a-multi-layered-approach/</loc>
        
        
            <lastmod>2020-03-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/16/our-commitment-to-keeping-your-organization-secure-during-covid-19/</loc>
        
        
            <lastmod>2020-03-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/16/how-to-wfh-and-keep-your-digital-self-safe/</loc>
        
        
            <lastmod>2020-03-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/13/metasploit-wrap-up-55/</loc>
        
        
            <lastmod>2020-03-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/13/how-to-understand-the-tco-and-roi-of-your-vulnerability-management-program/</loc>
        
        
            <lastmod>2020-03-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/12/cve-2020-0796-microsoft-smbv3-remote-code-execution-vulnerability-analysis/</loc>
        
        
            <lastmod>2020-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/12/network-traffic-analysis-3-common-threats-found-in-network-data/</loc>
        
        
            <lastmod>2020-03-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/11/why-our-future-in-infosec-depends-on-automation/</loc>
        
        
            <lastmod>2020-03-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/10/security-nation-how-nick-percoco-built-chicago-security-conference-thotcon-from-the-ground-up/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/10/patch-tuesday-march-2020/</loc>
        
        
            <lastmod>2020-03-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/10/talking-the-origins-of-thotcon-with-founder-nick-percoco/</loc>
        
        
            <lastmod>2020-03-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/09/how-to-secure-containers-applications-and-serverless-environments/</loc>
        
        
            <lastmod>2020-03-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/06/metasploit-wrap-up-54/</loc>
        
        
            <lastmod>2020-03-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/06/how-insightconnect-customer-hilltop-holdings-benefits-from-strategic-soar-workflows/</loc>
        
        
            <lastmod>2020-03-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/05/r7-2019-39-cve-2019-5648-ldap-credential-exposure-in-barracuda-load-balancer-adc-fixed/</loc>
        
        
            <lastmod>2020-03-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/04/lessons-learned-from-an-unlikely-path-to-my-oscp-certification/</loc>
        
        
            <lastmod>2020-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/03/rapid7-2020-threat-report-exposing-common-attacker-trends/</loc>
        
        
            <lastmod>2020-03-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/03/02/is-it-possible-to-use-data-science-magic-to-predict-key-rsa-2020-takeaways/</loc>
        
        
            <lastmod>2020-03-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/28/metasploit-wrap-up-53/</loc>
        
        
            <lastmod>2020-02-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/28/how-to-improve-vulnerability-patching-efficiency-through-automation/</loc>
        
        
            <lastmod>2020-02-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/27/defining-business-value-for-security-programs/</loc>
        
        
            <lastmod>2020-02-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/26/how-mdr-soc-customer-tony-hamill-leverages-the-automation-of-insightconnect/</loc>
        
        
            <lastmod>2020-02-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/25/new-rapid7-discuss-forum-lets-users-chat-extensions-with-peers/</loc>
        
        
            <lastmod>2020-02-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/24/securing-cloud-native-apps-requires-partnership/</loc>
        
        
            <lastmod>2020-04-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/21/rapid7-named-2019-global-soar-company-of-the-year-by-frost-sullivan/</loc>
        
        
            <lastmod>2020-02-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/21/metasploit-wrap-up-52/</loc>
        
        
            <lastmod>2020-02-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/20/rapid7-named-a-leader-in-2020-gartner-magic-quadrant-for-security-information-and-event-management/</loc>
        
        
            <lastmod>2020-02-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/20/dig-deeper-in-insightappsec-with-new-custom-dashboards-feature/</loc>
        
        
            <lastmod>2020-02-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/19/come-meet-us-at-rsa-conference-2020/</loc>
        
        
            <lastmod>2020-03-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/18/servicenow-cmdb-asset-import-using-the-insightvm-integration-for-servicenow-cmdb/</loc>
        
        
            <lastmod>2020-02-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/14/hackers-on-the-hill-slides-and-recap-on-cybersecurity-policy/</loc>
        
        
            <lastmod>2020-02-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/14/metasploit-wrap-up-51/</loc>
        
        
            <lastmod>2020-02-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/14/insightvm-insightappsec-a-love-story/</loc>
        
        
            <lastmod>2021-02-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/13/ask-a-pen-tester-q-a-part-2-everything-you-need-to-know-about-the-art-of-penetration-testing/</loc>
        
        
            <lastmod>2020-02-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/12/how-to-handle-misconfigurations-in-the-cloud/</loc>
        
        
            <lastmod>2020-02-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/11/patch-tuesday-february-2020/</loc>
        
        
            <lastmod>2020-02-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/11/intro-to-the-soc-visibility-triad/</loc>
        
        
            <lastmod>2020-02-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/07/cdpwn-cve-2020-3118/</loc>
        
        
            <lastmod>2020-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/07/untitled/</loc>
        
        
            <lastmod>2020-02-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/07/insightconnect-customer-hendrick-automotive-group-benefits-from-integrations-and-alert-triggers/</loc>
        
        
            <lastmod>2020-02-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/06/security-isnt-a-four-letter-word-how-infrastructure-as-code-iac-amplifies-devops-through-the-inclusion-of-security/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/06/3-questions-to-ask-yourself-when-justifying-your-infosec-program/</loc>
        
        
            <lastmod>2020-02-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/05/how-to-identify-prioritize-and-remediate-vulnerabilities-in-the-cloud/</loc>
        
        
            <lastmod>2020-02-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/04/doublepulsar-over-rdp-baselining-badness-on-the-internet/</loc>
        
        
            <lastmod>2020-04-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/04/doublepulsar-rce-2-an-rdp-story/</loc>
        
        
            <lastmod>2020-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/03/congrats-to-the-winners-of-the-2020-metasploit-community-ctf/</loc>
        
        
            <lastmod>2020-02-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/02/03/what-you-need-to-know-to-get-started-in-the-penetration-testing-field/</loc>
        
        
            <lastmod>2020-02-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/31/metasploit-team-announces-beta-sign-up-for-attackerkb/</loc>
        
        
            <lastmod>2020-01-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/31/metasploit-wrap-up-50/</loc>
        
        
            <lastmod>2020-01-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/31/how-to-measure-the-roi-of-your-vulnerability-risk-management-solution/</loc>
        
        
            <lastmod>2020-09-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/30/how-the-innocent-lives-foundation-uses-osint-to-uncover-predators/</loc>
        
        
            <lastmod>2020-02-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/29/r7-2019-40-bloomsky-sky2-weather-camera-station-data-authenticity-and-exposure-vulnerabilities/</loc>
        
        
            <lastmod>2020-01-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/28/security-nation-how-chris-hadnagy-and-the-innocent-lives-foundation-use-osint-skills-to-bring-online-predators-to-justice/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/28/an-update-on-trade/</loc>
        
        
            <lastmod>2020-01-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/27/how-to-analyze-your-log-data-using-the-log-search-api-in-insightidr/</loc>
        
        
            <lastmod>2020-01-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/24/weekly-wrap-up/</loc>
        
        
            <lastmod>2020-01-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/24/seven-tips-for-better-cloud-security-in-2020/</loc>
        
        
            <lastmod>2020-06-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/23/discover-the-new-bmc-remedy-itsm-plugin-for-insightconnect/</loc>
        
        
            <lastmod>2020-01-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/22/vulnerability-management-in-the-cloud-addressing-the-aws-shared-responsibility-model/</loc>
        
        
            <lastmod>2020-02-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/21/better-together-how-to-collaborate-to-drive-vulnerability-remediation-among-security-it-and-devops-teams/</loc>
        
        
            <lastmod>2020-05-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/17/active-exploitation-of-citrix-netscaler-cve-2019-19781-what-you-need-to-know/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/17/metasploit-wrap-up-49/</loc>
        
        
            <lastmod>2020-01-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/17/how-to-get-started-with-the-insightvm-integration-for-servicenow-cmdb/</loc>
        
        
            <lastmod>2020-01-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/16/cve-2020-0601-windows-cryptoapi-spoofing-vulnerability-what-you-need-to-know/</loc>
        
        
            <lastmod>2020-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/16/how-pci-compliance-helps-keep-your-apps-credit-card-data-safe/</loc>
        
        
            <lastmod>2020-01-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/15/announcing-the-2020-metasploit-community-ctf/</loc>
        
        
            <lastmod>2020-12-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/14/patch-tuesday-january-2020/</loc>
        
        
            <lastmod>2020-01-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/14/how-to-define-and-communicate-vulnerability-risk-across-your-company/</loc>
        
        
            <lastmod>2020-04-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/13/simplify-your-data-search-with-query-builder-in-insightvm/</loc>
        
        
            <lastmod>2020-01-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/10/challenges-and-best-practices-with-vulnerability-risk-management-collaboration/</loc>
        
        
            <lastmod>2020-01-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/09/automating-application-security-processes-with-the-insightappsec-api/</loc>
        
        
            <lastmod>2020-01-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/08/insightconnect-announces-new-plugin-for-cisco-amp-for-endpoints/</loc>
        
        
            <lastmod>2020-01-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/07/insightidr-2019-year-in-review/</loc>
        
        
            <lastmod>2020-01-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/06/election-security-what-you-need-to-know/</loc>
        
        
            <lastmod>2020-10-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/03/metasploit-wrap-up-48/</loc>
        
        
            <lastmod>2020-01-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/03/10-detection-and-response-resolutions-for-2020/</loc>
        
        
            <lastmod>2020-01-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/02/7-vulnerability-risk-management-resolutions-to-consider-in-the-new-year/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2020/01/01/cheers-to-a-new-year-rapid7s-2020-security-predictions/</loc>
        
        
            <lastmod>2020-01-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/31/oh-behave-who-made-it-to-rapid7-labs-naughty-list-s-in-2019/</loc>
        
        
            <lastmod>2019-12-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/30/memorable-metasploit-moments-of-2019/</loc>
        
        
            <lastmod>2019-12-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/27/metasploit-wrap-up-47/</loc>
        
        
            <lastmod>2019-12-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/24/memory-laundering-is-cleaner-better/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/23/dont-spread-this-holiday-cheer-how-to-secure-your-leftover-technology/</loc>
        
        
            <lastmod>2019-12-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/21/cisco-self-signed-certificate-expiration-on-2020-01-01-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-12-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/19/a-visit-from-the-spirits-of-haxmas-past/</loc>
        
        
            <lastmod>2019-12-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/19/metasploit-wrap-up-46/</loc>
        
        
            <lastmod>2019-12-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/19/the-importance-of-updating-and-patching-your-new-electronic-presents/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/18/all-i-want-for-christmas-is-a-big-box-of-quirky-iot/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/17/security-nation-how-todd-beebe-used-the-mitre-att-ck-framework-to-build-his-own-automated-threat-simulation-system/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/17/building-a-daily-threat-simulation-tool-with-todd-beebe/</loc>
        
        
            <lastmod>2019-12-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/16/automating-application-security-testing-within-your-atlassian-bamboo-pipelines/</loc>
        
        
            <lastmod>2019-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/13/metasploit-wrap-up-45/</loc>
        
        
            <lastmod>2019-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/13/the-most-commonly-exploited-web-application-vulnerabilities-in-a-production-environment/</loc>
        
        
            <lastmod>2019-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/12/building-a-culture-of-security-awareness-how-to-use-performance-metrics-to-communicate-soc-effectiveness-throughout-your-org/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/11/global-artifacts-are-now-available-in-insightconnect/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/11/iot-vuln-disclosure-childrens-gps-smart-watches-r7-2019-57/</loc>
        
        
            <lastmod>2019-12-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/10/patch-tuesday-december-2019/</loc>
        
        
            <lastmod>2019-12-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/10/how-to-actually-reduce-risk-in-your-environment/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/09/how-i-shut-down-a-test-factory-with-a-single-layer-2-packet/</loc>
        
        
            <lastmod>2019-12-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/06/metasploit-wrap-up-44/</loc>
        
        
            <lastmod>2019-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/06/hidden-helpers-security-focused-http-headers-to-protect-against-vulnerabilities/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/05/insightidr-now-available-for-purchase-in-aws-marketplace/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/04/security-nation-discovering-a-new-path-in-asset-discovery-an-interview-with-metasploit-founder-hd-moore/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/04/discovering-a-new-path-in-asset-discovery-a-q-a-with-metasploit-founder-hd-moore/</loc>
        
        
            <lastmod>2019-12-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/12/03/insightvm-delivers-342-roi-through-clarity-influence-and-progress/</loc>
        
        
            <lastmod>2019-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/27/happy-haxmas-join-our-new-twitter-tradition-for-the-best-of-security-in-2019-and-beyond/</loc>
        
        
            <lastmod>2019-12-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/27/5-types-of-cybersecurity-attacks-to-watch-out-for-this-black-friday-and-cyber-monday/</loc>
        
        
            <lastmod>2019-11-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/26/cybersecurity-traveling-tips-for-the-holiday-season/</loc>
        
        
            <lastmod>2019-11-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/25/six-things-retailers-can-do-to-shore-up-their-security-ahead-of-cyber-monday/</loc>
        
        
            <lastmod>2019-11-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/22/metasploit-wrap-up-43/</loc>
        
        
            <lastmod>2019-11-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/22/how-smbs-can-decrease-vulnerabilities-and-incident-response-time-with-automation/</loc>
        
        
            <lastmod>2019-11-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/21/metasploit-shellcode-grows-up-encrypted-and-authenticated-c-shells/</loc>
        
        
            <lastmod>2019-11-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/21/insightconnect-announces-new-plugin-for-microsoft-teams/</loc>
        
        
            <lastmod>2019-12-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/20/how-our-new-jenkins-integration-for-insightappsec-enables-devsecops-collaboration/</loc>
        
        
            <lastmod>2019-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/19/rapid7-quarterly-threat-report-2019-q3/</loc>
        
        
            <lastmod>2020-01-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/18/what-it-takes-to-successfully-embed-security-in-engineering/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/15/security-nation-how-to-get-your-engineering-team-to-take-on-security-initiatives-without-even-realizing-it/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/15/metasploit-wrap-up-42/</loc>
        
        
            <lastmod>2019-11-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/15/what-is-texas-senate-bill-820-and-how-will-it-affect-your-school-district/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/14/we-dont-want-white-font-office-macros-evasion-and-malicious-self-reference/</loc>
        
        
            <lastmod>2020-01-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/13/how-to-develop-a-common-language-for-security-buy-in-across-your-business/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/12/patch-tuesday-november-2019/</loc>
        
        
            <lastmod>2019-11-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/12/iot-security-and-risk-what-is-it-where-is-it-heading-and-how-do-we-embrace-it/</loc>
        
        
            <lastmod>2019-11-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/11/be-audit-you-can-be-part-2-how-to-parse-out-fields-in-your-logs/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/08/metasploit-wrap-up-41/</loc>
        
        
            <lastmod>2019-11-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/08/rapid7givesback-month-moose-that-drive-impact-together/</loc>
        
        
            <lastmod>2020-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/07/the-anatomy-of-rdp-exploits-lessons-learned-from-bluekeep-and-dejablue/</loc>
        
        
            <lastmod>2020-04-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/06/new-azure-devops-pipelines-extension-for-insightappsec-helps-improve-web-app-security/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/05/unlocking-the-power-of-the-insightidr-threat-api-part-2/</loc>
        
        
            <lastmod>2019-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/01/security-nation-how-to-create-a-security-champion-program-within-your-organization/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/01/metasploit-wrap-up-40/</loc>
        
        
            <lastmod>2019-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/11/01/from-security-police-to-security-advocates-how-to-create-a-champion-program/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/31/this-one-time-on-a-pen-test-halloween-edition-an-ode-to-our-favorite-pen-tester-disguises/</loc>
        
        
            <lastmod>2019-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/30/be-audit-you-can-be-part-1-how-to-securely-send-and-monitor-your-audit-logs-with-insightidr/</loc>
        
        
            <lastmod>2020-01-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/29/end-to-end-office-365-administration-with-insightconnect/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/28/application-security-testing-monitoring-with-dast-and-rasp-a-two-pronged-approach/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/25/metasploit-wrap-up-39/</loc>
        
        
            <lastmod>2019-11-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/25/national-cybersecurity-awareness-month-2019-must-read-blogs-on-protect-it/</loc>
        
        
            <lastmod>2019-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/24/accelerating-incident-response-with-threat-intelligence-and-alert-enrichment/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/23/national-cybersecurity-awareness-month-2019-must-read-blogs-on-secure-it/</loc>
        
        
            <lastmod>2019-11-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/23/building-custom-plugins-for-insightconnect/</loc>
        
        
            <lastmod>2019-10-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/22/how-to-transform-your-security-program-from-patch-management-to-vulnerability-management/</loc>
        
        
            <lastmod>2019-10-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/21/national-cybersecurity-awareness-month-2019-must-read-blogs-on-own-it/</loc>
        
        
            <lastmod>2019-11-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/21/cyber-takes-flight-my-experience-competing-in-the-atlantic-councils-cyber-9-12-strategy-challenge/</loc>
        
        
            <lastmod>2019-10-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/18/metasploit-wrap-up-38/</loc>
        
        
            <lastmod>2019-10-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/18/what-a-difference-a-year-makes-revisiting-our-inaugural-fortune-500-icer-one-year-later/</loc>
        
        
            <lastmod>2019-10-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/17/insightvm-vs-managed-vulnerability-management-how-to-choose-which-rapid7-offering-is-right-for-you/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/16/import-external-threat-intelligence-with-the-insightidr-threats-api/</loc>
        
        
            <lastmod>2019-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/15/podcast-blackice-creator-rob-graham-turns-security-textbook-author/</loc>
        
        
            <lastmod>2019-11-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/14/introducing-the-rapid7-insightconnect-app-for-splunk/</loc>
        
        
            <lastmod>2019-10-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/11/security-nation-from-blackice-to-typed-advice-rob-graham-talks-what-it-takes-to-write-a-cybersecurity-textbook/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/11/metasploit-wrap-up-37/</loc>
        
        
            <lastmod>2019-10-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/10/rapid7-introduces-industry-cyber-exposure-report-deutsche-borse-prime-standard-320/</loc>
        
        
            <lastmod>2019-11-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/09/avoiding-the-zombie-cloud-apocalypse-how-to-reduce-exposure-in-the-cloud/</loc>
        
        
            <lastmod>2019-11-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/08/patch-tuesday-october-2019/</loc>
        
        
            <lastmod>2019-10-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/08/r7-2019-32-denial-of-service-vulnerabilities-in-beckhoff-twincat-plc-environment-fixed/</loc>
        
        
            <lastmod>2019-11-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/07/why-do-managed-detection-and-response-mdr-services-exist-in-a-world-dominated-by-mssps/</loc>
        
        
            <lastmod>2019-10-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/04/metasploit-wrap-up-36/</loc>
        
        
            <lastmod>2019-10-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/04/this-one-time-on-a-pen-test-let-me-get-that-for-you/</loc>
        
        
            <lastmod>2020-10-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/03/saml-all-the-things-a-deep-dive-into-saml-sso/</loc>
        
        
            <lastmod>2019-10-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/02/open-source-command-and-control-of-the-doublepulsar-implant/</loc>
        
        
            <lastmod>2019-11-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/10/01/exim-vulnerability-cve-2019-16928-global-exposure-details-and-remediation-advice/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/30/podcast-cve-numbering-governance-and-advocacy-with-katie-trimble-and-chris-coffin/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/30/you-can-have-it-both-ways-with-appsec-security-and-speed/</loc>
        
        
            <lastmod>2019-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/27/security-nation-how-mitre-and-the-department-of-homeland-security-collaborate-to-validate-vulns/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/27/metasploit-wrap-up-35/</loc>
        
        
            <lastmod>2019-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/25/this-one-time-on-a-pen-test-our-accidental-win/</loc>
        
        
            <lastmod>2020-10-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/24/four-ways-to-improve-automated-vulnerability-management-efficiency-with-soar/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/23/scheduling-a-meeting-with-rapid7-support-just-got-way-easier/</loc>
        
        
            <lastmod>2020-09-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/20/metasploit-wrap-up-34/</loc>
        
        
            <lastmod>2019-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/19/this-one-time-on-a-pen-test-whats-in-the-box/</loc>
        
        
            <lastmod>2019-09-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/18/cloud-security-fundamentals-strategies-to-secure-cloud-environments/</loc>
        
        
            <lastmod>2019-10-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/17/the-fundamentals-of-building-a-threat-detection-and-response-program/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/16/podcast-digitizing-cybersecurity-in-healthcare-with-richard-kaufmann/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/13/security-nation-digitizing-cybersecurity-in-healthcare-with-richard-kaufmann/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/13/metasploit-wrap-up-33/</loc>
        
        
            <lastmod>2019-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/12/this-one-time-on-a-pen-test-the-pizza-of-doom/</loc>
        
        
            <lastmod>2020-10-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/11/automating-user-provisioning-and-deprovisioning-with-security-orchestration-automation-and-response-soar/</loc>
        
        
            <lastmod>2019-11-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/10/patch-tuesday-september-2019/</loc>
        
        
            <lastmod>2019-09-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/10/cve-2019-15846-privileged-remote-code-execution-vulnerability-in-the-exim-mailer-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-09-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/10/r7-2019-09-cve-2019-5617-cve-2019-5643-cve-2019-5644-c4g-blis-authentication-and-authorization-vulnerabilities-fixed/</loc>
        
        
            <lastmod>2019-09-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/09/rapid7-industry-research-and-how-it-strengthens-insightvm/</loc>
        
        
            <lastmod>2019-09-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/06/metasploit-wrap-up-32/</loc>
        
        
            <lastmod>2019-09-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/05/this-one-time-on-a-pen-test-your-mouse-is-my-keyboard/</loc>
        
        
            <lastmod>2019-09-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/04/rasp-101-what-is-runtime-application-self-protection/</loc>
        
        
            <lastmod>2019-09-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/09/03/rapid7-introduces-industry-cyber-exposure-report-nikkei-225/</loc>
        
        
            <lastmod>2019-10-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/30/metasploit-wrap-up-31/</loc>
        
        
            <lastmod>2019-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/30/this-one-time-on-a-pen-test-nerds-in-the-nerc/</loc>
        
        
            <lastmod>2019-09-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/29/how-to-set-up-insightvm-in-your-google-cloud-environment/</loc>
        
        
            <lastmod>2020-03-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/28/application-security-101-the-importance-of-devsecops-in-appsec/</loc>
        
        
            <lastmod>2019-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/27/defining-cybersecurity-risk-for-higher-education/</loc>
        
        
            <lastmod>2019-08-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/26/summer-security-fundamentals-recap-what-you-need-to-know-about-vulnerability-management/</loc>
        
        
            <lastmod>2019-08-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/23/security-nation-how-wendy-nather-is-fighting-back-against-the-security-poverty-line/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/23/metasploit-wrap-up-30/</loc>
        
        
            <lastmod>2019-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/23/why-the-security-poverty-line-is-our-industrys-responsibility-to-fix/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/23/this-one-time-on-a-pen-test-missed-a-spot/</loc>
        
        
            <lastmod>2019-09-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/22/how-to-prevent-cross-site-scripting-xss-attacks/</loc>
        
        
            <lastmod>2019-08-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/21/ask-a-pen-tester-stories-from-our-penetration-testing-services-engagements/</loc>
        
        
            <lastmod>2019-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/20/how-attackers-can-harvest-users-microsoft-365-credentials-with-new-phishing-campaign/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/19/automating-the-cloud-aws-security-done-efficiently/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/16/metasploit-wrap-up-29/</loc>
        
        
            <lastmod>2019-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/16/this-one-time-on-a-pen-test-how-i-compromised-a-healthcare-portal-before-my-hot-cocoa-went-cold/</loc>
        
        
            <lastmod>2019-09-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/15/responding-to-cloud-based-security-incidents-with-insightconnect-aws-security-hub/</loc>
        
        
            <lastmod>2019-08-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/14/black-hat-def-con-and-bsides-2019-highlights-and-emerging-industry-trends/</loc>
        
        
            <lastmod>2019-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/13/patch-tuesday-august-2019/</loc>
        
        
            <lastmod>2019-08-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/13/august-2019-microsoft-remote-desktop-services-rdp-patches-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-08-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/13/cloud-security-primer-the-basics-you-need-to-know/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/12/how-to-protect-the-file-system-from-your-app-with-wafs-and-rasp/</loc>
        
        
            <lastmod>2019-08-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/09/metasploit-wrapup-73/</loc>
        
        
            <lastmod>2019-08-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/09/this-one-time-on-a-pen-test-paging-doctor-hackerman/</loc>
        
        
            <lastmod>2019-09-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/08/the-importance-of-preventing-and-detecting-malicious-powershell-attacks/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/07/how-to-monitor-your-aws-s3-activity-with-insightidr/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/06/app-a-bet-soup-should-you-use-a-sast-dast-or-rasp-application-security-tool/</loc>
        
        
            <lastmod>2019-08-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/05/summer-security-fundamentals-recap-orchestration-and-automation-101/</loc>
        
        
            <lastmod>2019-08-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/02/security-nation-how-beau-woods-and-meg-king-promote-collaboration-between-policymakers-and-the-cybersecurity-community/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/02/metasploit-wrap-up-28/</loc>
        
        
            <lastmod>2019-08-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/02/how-to-join-in-on-the-security-policy-conversation-at-def-con/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/01/introducing-pingback-payloads/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/08/01/r7-2019-18-multiple-hickory-smart-lock-vulnerabilities/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/31/bluekeep-cve-2019-0708-for-windows-rdp-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-09-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/31/do-you-have-containers-in-your-environment-using-container-discovery-to-be-sure/</loc>
        
        
            <lastmod>2019-08-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/31/rapid7-announces-an-early-access-program-for-tcell-by-rapid7/</loc>
        
        
            <lastmod>2019-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/30/new-research-investigating-and-reversing-avionics-can-bus-systems/</loc>
        
        
            <lastmod>2019-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/29/how-to-automate-threat-hunting-with-soar-for-faster-response-times/</loc>
        
        
            <lastmod>2019-07-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/26/metasploit-wrap-up-27/</loc>
        
        
            <lastmod>2019-07-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/24/why-the-modern-siem-is-in-the-cloud/</loc>
        
        
            <lastmod>2020-08-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/24/ensuring-timely-remediation-of-security-risks-with-service-level-agreements-sla-in-insightvm/</loc>
        
        
            <lastmod>2019-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/23/whats-happening-with-markups-for-the-iot-cybersecurity-improvement-act-of-2019/</loc>
        
        
            <lastmod>2019-07-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/23/research-under-the-hoodie-2019-edition-lessons-learned-from-180-penetration-tests/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/22/beyond-static-rules-waf-vs-rasp-for-better-web-application-security/</loc>
        
        
            <lastmod>2020-05-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/19/security-nation-how-david-rogers-iot-security-standards-earned-him-royal-recognition/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/19/metasploit-wrap-up-26/</loc>
        
        
            <lastmod>2019-07-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/19/why-having-the-right-team-is-vital-to-advancing-security/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/18/end-of-sale-announced-for-metasploit-community/</loc>
        
        
            <lastmod>2019-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/17/your-guide-to-securing-multi-cloud-environments-in-an-iaas-world/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/15/metasploit-open-source-office-hours-in-vegas/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/12/metasploit-wrap-up-25/</loc>
        
        
            <lastmod>2019-07-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/11/so-you-think-you-can-query/</loc>
        
        
            <lastmod>2019-07-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/10/zoom-video-snooping-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-07-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/09/patch-tuesday-july-2019/</loc>
        
        
            <lastmod>2019-07-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/09/securing-your-cloud-environments-with-insightidr-part-2-amazon-web-services-aws/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/08/new-container-security-assessment-features-added-to-insightvm/</loc>
        
        
            <lastmod>2019-07-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/05/security-nation-how-to-start-a-security-program-from-scratch-without-your-initiatives-getting-cut/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/05/metasploit-wrap-up-24/</loc>
        
        
            <lastmod>2019-07-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/07/05/how-to-get-buy-in-when-your-c-suite-doesnt-speak-security/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/28/metasploit-wrap-up-23/</loc>
        
        
            <lastmod>2019-06-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/28/securing-your-cloud-environment-with-insightidr-part-1-microsoft-azure/</loc>
        
        
            <lastmod>2019-07-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/25/metasploit-dev-diaries-2019-q2/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/25/how-rapid7s-aws-security-hub-integrations-increase-cloud-visibility-and-automate-security-operations/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/24/rapid7-releases-cloud-configuration-assessment-capabilities-in-insightvm/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/21/security-nation-great-barrier-grief-how-to-break-through-bottlenecks-with-automated-appsec-2/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/21/great-barrier-grief-how/</loc>
        
        
            <lastmod>2019-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/21/re-introducing-rapid7s-podcast-security-nation/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/21/metasploit-wrap-up-22/</loc>
        
        
            <lastmod>2019-06-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/20/thirteen-years-an-infothusiast-how-infosec-europe-has-changed-over-time/</loc>
        
        
            <lastmod>2019-06-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/19/blocking-user-access-to-vulnerable-assets-with-cyberark-and-insightvm/</loc>
        
        
            <lastmod>2019-06-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/19/announcing-cyberark-and-insightidr-integration-connect-cyberark-with-insightidr-to-visualize-and-investigate-your-privileged-access/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/18/attack-surface-monitoring-with-project-sonar/</loc>
        
        
            <lastmod>2020-04-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/17/metasploit-hackathon-austin-texas-2019-a2k19/</loc>
        
        
            <lastmod>2019-06-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/14/metasploit-wrap-up-21/</loc>
        
        
            <lastmod>2019-11-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/13/how-to-automate-phishing-investigations-and-remediation/</loc>
        
        
            <lastmod>2019-06-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/12/heap-overflow-exploitation-on-windows-10-explained/</loc>
        
        
            <lastmod>2019-06-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/11/patch-tuesday-june-2019/</loc>
        
        
            <lastmod>2019-06-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/11/rapid7-releases-industry-cyber-exposure-report-ftse-250/</loc>
        
        
            <lastmod>2020-05-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/10/introducing-the-security-orchestration-and-automation-playbook-your-practical-guide-to-implementing-soar/</loc>
        
        
            <lastmod>2019-06-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/07/metasploit-wrap-up-20/</loc>
        
        
            <lastmod>2019-06-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/07/integrating-access-to-rapid7-insight-platform-applications-with-your-existing-sso-identity-provider/</loc>
        
        
            <lastmod>2019-06-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/06/rapid7-threat-report-meets-mitre-att-ck-what-we-saw-in-2019-q1/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/05/microsoft-windows-rdp-network-level-authentication-bypass-cve-2019-9510-what-you-need-to-know/</loc>
        
        
            <lastmod>2020-04-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/06/03/why-deploying-a-siem-tool-doesnt-need-to-be-complicated-a-pirate-story/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/31/metasploit-wrap-up-19/</loc>
        
        
            <lastmod>2019-05-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/30/hidden-helpers-security-focused-http-headers/</loc>
        
        
            <lastmod>2019-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/29/why-patch-management-is-crucial-for-securing-your-organization/</loc>
        
        
            <lastmod>2019-05-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/28/rapid7-quarterly-threat-report-2019-q1/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/24/metasploit-wrap-up-17/</loc>
        
        
            <lastmod>2019-06-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/24/what-is-cloud-security-posture-management-cspm/</loc>
        
        
            <lastmod>2021-04-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/23/siem-delivery-models-where-do-todays-risks-and-future-technology-lead-us/</loc>
        
        
            <lastmod>2019-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/21/investigating-the-plumbing-of-the-iot-ecosystem-r7-2018-65-r7-2019-07-fixed/</loc>
        
        
            <lastmod>2019-05-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/17/metasploit-wrap-up-18/</loc>
        
        
            <lastmod>2019-05-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/16/the-last-chip/</loc>
        
        
            <lastmod>2019-05-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/15/how-soar-is-disrupting-traditional-vulnerability-management/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/14/patch-tuesday-may-2019/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/13/wannacry-two-years-on-current-threat-landscape-forgotten-lessons-and-hope-for-the-future/</loc>
        
        
            <lastmod>2019-06-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/13/medical-device-security-part-3-putting-safe-scanning-into-practice/</loc>
        
        
            <lastmod>2019-05-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/10/metasploit-wrap-up-16/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/10/take-advantage-of-hands-on-learning-opportunities-at-boost-2019-customer-conference/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/09/your-pocket-guide-for-cloud-siem-evaluation/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/08/key-concepts-and-findings-from-the-2019-verizon-data-breach-investigations-report/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/08/a-match-made-in-chatops-insightconnect-now-integrates-with-slack/</loc>
        
        
            <lastmod>2019-09-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/07/extracting-firmware-from-microcontrollers-onboard-flash-memory-part-4-texas-instrument-rf-microcontrollers/</loc>
        
        
            <lastmod>2019-05-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/06/medical-device-security-part-2-how-to-give-medical-devices-a-security-checkup/</loc>
        
        
            <lastmod>2019-05-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/06/rapid7-named-a-strong-performer-in-2019-forrester-wave-for-global-cybersecurity-consulting-providers/</loc>
        
        
            <lastmod>2019-05-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/03/weblogic-deserialization-remote-code-execution-vulnerability-cve-2019-2725-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-05-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/03/metasploit-wrap-up-15/</loc>
        
        
            <lastmod>2019-05-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/02/how-insightappsec-can-help-you-improve-your-approach-to-application-security/</loc>
        
        
            <lastmod>2019-05-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/05/01/4-key-lessons-from-the-citycomp-data-breach/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/30/extracting-firmware-from-microcontrollers-onboard-flash-memory-part-3-microchip-pic-microcontrollers/</loc>
        
        
            <lastmod>2019-05-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/29/medical-device-security-how-to-scan-devices-without-letting-safety-flatline/</loc>
        
        
            <lastmod>2019-04-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/26/metasploit-wrap-up-14/</loc>
        
        
            <lastmod>2019-04-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/23/extracting-firmware-from-microcontrollers-onboard-flash-memory-part-2-nordic-rf-microcontrollers/</loc>
        
        
            <lastmod>2019-05-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/22/capture-the-flag-red-team-vs-cloud-siem/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/19/metasploit-wrap-up-13/</loc>
        
        
            <lastmod>2019-04-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/18/explore-cloud-security-at-rapid7-boost-customer-conference/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/17/how-to-choose-the-right-application-security-tool-for-your-organization/</loc>
        
        
            <lastmod>2019-04-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/16/extracting-firmware-from-microcontrollers-onboard-flash-memory-part-1-atmel-microcontrollers/</loc>
        
        
            <lastmod>2019-05-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/12/confluence-unauthorized-rce-vulnerability-cve-2019-3396-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-04-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/12/metasploit-wrap-up-12/</loc>
        
        
            <lastmod>2019-04-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/09/patch-tuesday-april-2019/</loc>
        
        
            <lastmod>2019-04-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/09/how-to-start-a-career-in-cybersecurity-from-stay-at-home-mom-to-security-pro-in-training/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/08/q4-threat-report-analyzing-the-top-three-advanced-threats-and-detection-techniques/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/05/metasploit-wrap-up-11/</loc>
        
        
            <lastmod>2019-04-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/05/time-and-relative-dimension-in-space-gps-week-number-rollover/</loc>
        
        
            <lastmod>2019-04-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/04/all-in-on-appsec-5-considerations-when-creating-an-application-security-program/</loc>
        
        
            <lastmod>2019-04-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/03/apache-http-server-privilege-escalation-cve-2019-0211-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-04-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/03/my-story-from-business-development-to-security-consultant-in-training-at-rapid7/</loc>
        
        
            <lastmod>2019-04-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/02/new-insightappsec-features-and-updates-a-look-inside/</loc>
        
        
            <lastmod>2019-04-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/04/01/security-operations-at-its-finest-meet-the-insightvm-and-servicenow-integration/</loc>
        
        
            <lastmod>2019-04-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/29/metasploit-wrap-up-10/</loc>
        
        
            <lastmod>2019-04-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/28/r7-2018-43-username-enumeration-in-okta-sso-del-auth-through-response-timing/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/27/how-to-gain-security-visibility-into-a-modern-environment/</loc>
        
        
            <lastmod>2019-03-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/27/the-iot-cybersecurity-improvement-act-of-2019/</loc>
        
        
            <lastmod>2019-07-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/26/rapid7s-partner-summit-2019-thank-you-to-our-partners-in-emea/</loc>
        
        
            <lastmod>2019-03-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/26/introducing-the-metasploit-development-diaries/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/25/tips-for-a-successful-phishing-engagement/</loc>
        
        
            <lastmod>2019-03-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/22/metasploit-wrap-up-9/</loc>
        
        
            <lastmod>2019-03-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/21/how-rapid7-takes-an-artful-approach-to-data-science/</loc>
        
        
            <lastmod>2019-03-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/20/rapid7-named-a-march-2019-gartner-peer-insights-customers-choice-for-vulnerability-assessment/</loc>
        
        
            <lastmod>2019-03-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/19/a-serial-problem-exploitation-and-exposure-of-java-serialized-objects/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/19/buy-one-device-get-data-free-private-information-remains-on-donated-devices/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/18/customer-perspective-how-to-build-an-agile-security-program-in-rapidly-changing-times/</loc>
        
        
            <lastmod>2019-03-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/15/metasploit-wrap-up-8/</loc>
        
        
            <lastmod>2019-03-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/14/helping-kids-hack-the-future-rapid7-supports-bostem-program-in-pi-day-fundraiser/</loc>
        
        
            <lastmod>2019-03-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/14/forrester-tech-tide-for-detection-and-response-is-2019-the-year-of-convergence/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/13/utilize-file-integrity-monitoring-to-address-critical-compliance-needs/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/12/patch-tuesday-march-2019/</loc>
        
        
            <lastmod>2019-03-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/12/r7-2019-01-circuitwerkes-sicon-8-client-side-authentication-read-only-bypass-cve-2019-5616/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/11/rapid7-introduces-industry-cyber-exposure-report-asx-200/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/08/metasploit-wrap-up-7/</loc>
        
        
            <lastmod>2019-03-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/07/this-one-time-on-a-pen-test-the-power-of-a-well-researched-and-well-timed-phishing-email/</loc>
        
        
            <lastmod>2019-03-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/05/seasoned-pros-share-career-advice-for-cybersecurity-success/</loc>
        
        
            <lastmod>2019-03-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/04/customer-perspective-how-insightvm-helps-organizations-solve-common-vulnerability-management-challenges/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/01/metasploit-wrap-up-6/</loc>
        
        
            <lastmod>2019-03-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/03/01/implementing-credential-hygiene-with-cyberark-and-insightvm/</loc>
        
        
            <lastmod>2019-03-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/28/cisco-r-rv110-rv130-rv215-unauthenticated-configuration-export-vulnerability-cve-2019-1663-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-02-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/28/how-security-automation-enables-business-agility/</loc>
        
        
            <lastmod>2019-02-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/27/why-most-vulnerability-management-programs-fail-and-what-you-can-do-about-it/</loc>
        
        
            <lastmod>2019-02-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/26/rapid7-quarterly-threat-report-2018-q4/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/25/checkmate-how-to-win-at-vulnerability-management-using-the-game-of-chess/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/22/metasploit-wrap-up-5/</loc>
        
        
            <lastmod>2019-03-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/21/cve-2019-6340-drupal-core-remote-code-execution-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-02-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/21/apis-sdks-plugin-dream-team/</loc>
        
        
            <lastmod>2019-02-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/20/iot-security-introduction-to-embedded-hardware-hacking/</loc>
        
        
            <lastmod>2019-02-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/19/stack-based-buffer-overflow-attacks-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-12-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/15/metasploit-wrap-up-4/</loc>
        
        
            <lastmod>2019-02-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/15/full-lifecycle-cloud-security/</loc>
        
        
            <lastmod>2021-04-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/15/automation-you-can-trust-remediating-cloud-misconfigurations-and-policy-violations-in-real-time/</loc>
        
        
            <lastmod>2021-04-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/14/from-insightconnect-with-love-wishing-a-happy-valentines-day-to-our-most-popular-plugins/</loc>
        
        
            <lastmod>2019-02-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/13/level-up-your-internet-intelligence-using-the-rapid7-open-data-api-and-r/</loc>
        
        
            <lastmod>2019-02-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/12/patch-tuesday-february-2019/</loc>
        
        
            <lastmod>2019-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/11/automation-in-action-how-carnegie-mellon-university-combats-vulnerabilities-using-nexpose/</loc>
        
        
            <lastmod>2019-02-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/08/metasploit-wrap-up-3/</loc>
        
        
            <lastmod>2019-02-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/07/alert-on-rogue-dhcp-servers/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/06/secure-that-query-researching-the-landscape-of-dns-over-transport-layer-security-tls/</loc>
        
        
            <lastmod>2019-02-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/05/smart-sensors-a-look-at-beacon-security/</loc>
        
        
            <lastmod>2019-02-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/04/no-da-no-problem-how-attackers-can-access-sensitive-data-without-escalated-privileges/</loc>
        
        
            <lastmod>2019-02-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/02/01/ubiquiti-discovery-service-exposures/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/31/did-you-remediate-that-how-to-integrate-vulnerability-remediation-projects-with-your-it-infrastructure/</loc>
        
        
            <lastmod>2019-01-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/30/soaring-toward-an-efficient-soc-how-security-orchestration-and-automation-can-add-immediate-value-in-2019/</loc>
        
        
            <lastmod>2019-01-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/29/cisco-r-rv320-rv325-router-unauthenticated-configuration-export-vulnerability-cve-2019-1653-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-02-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/28/why-a-17-year-veteran-pen-tester-took-the-oscp/</loc>
        
        
            <lastmod>2019-01-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/25/metasploit-wrapup-72/</loc>
        
        
            <lastmod>2019-01-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/23/soc-siem-or-mdr-how-to-choose-the-right-options-for-your-infosec-program/</loc>
        
        
            <lastmod>2020-06-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/22/php-extension-and-application-repository-pear-compromise-what-you-need-to-know/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/21/how-rapid7s-orchestration-and-automation-solution-boosted-a-higher-education-security-teams-effectiveness/</loc>
        
        
            <lastmod>2019-01-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/18/metasploit-wrapup-71/</loc>
        
        
            <lastmod>2019-01-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/16/rapid7-included-in-2019-bloomberg-gender-equality-index-for-commitment-to-diversity/</loc>
        
        
            <lastmod>2019-01-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/15/what-wannacry-taught-me-about-the-benefits-of-agents-in-vm-programs/</loc>
        
        
            <lastmod>2019-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/14/how-aws-and-insightvm-can-help-you-securely-move-to-the-cloud/</loc>
        
        
            <lastmod>2019-01-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/14/rapid7-industry-cyber-exposure-report-highlights-the-need-for-vulnerability-management/</loc>
        
        
            <lastmod>2019-01-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/12/metasploit-wrap-up-2/</loc>
        
        
            <lastmod>2019-01-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/10/metasploit-framework-5-0-released/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/09/did-you-remediate-that-take-control-of-risk-by-knowing-your-top-25-vulnerabilities/</loc>
        
        
            <lastmod>2019-01-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/08/patch-tuesday-january-2019/</loc>
        
        
            <lastmod>2019-01-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/08/head-in-the-clouds-data-warehousing-in-the-google-cloud/</loc>
        
        
            <lastmod>2019-01-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/07/what-you-can-learn-from-our-successful-simulated-phishing-attack-of-45-ceos/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/04/metasploit-wrap-up/</loc>
        
        
            <lastmod>2019-01-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/04/happy-haxmas-year-end-internet-scanning-observations/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/03/santas-elfs-running-linux-executables-without-execve/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/02/facing-the-future-rapid7s-2019-security-predictions/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/02/the-ghost-of-exploits-past-a-deep-dive-into-the-morris-worm/</loc>
        
        
            <lastmod>2019-05-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2019/01/01/haxmas-review-twelve-patch-tuesdays-a-patching/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/31/the-layer-8-th-day-of-christmas-rapid7-pen-testers-reveal-social-engineering-insights-at-recent-conference/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/30/advice-for-the-lazy-family-sysadmin/</loc>
        
        
            <lastmod>2018-12-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/29/once-a-haxer-always-a-haxor/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/28/the-new-shiny-memorable-metasploit-moments-of-2018/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/27/r7-2018-52-guardzilla-iot-video-camera-hard-coded-credential-cve-2018-5560/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/26/the-nightmare-_after_-christmas/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/25/the-return-of-snapid-kevin-to-the-north-pole/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/24/the-12-days-of-haxmas-a-festive-blog-series-recapping-security-in-2018/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/21/metasploit-wrapup-70/</loc>
        
        
            <lastmod>2018-12-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/21/rsunk-your-battleship-an-ocean-of-data-exposed-through-rsync/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/20/did-you-remediate-that-how-to-use-the-insightvm-policy-compliance-status-report-to-measure-benchmark-configurations/</loc>
        
        
            <lastmod>2018-12-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/19/rapid7-partners-with-aws-security-hub-for-deeper-vulnerability-reporting/</loc>
        
        
            <lastmod>2018-12-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/18/windows-event-forwarding-the-best-thing-youve-never-heard-of/</loc>
        
        
            <lastmod>2019-12-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/17/charting-the-forthcoming-phpocalypse-in-2019/</loc>
        
        
            <lastmod>2019-02-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/14/metasploit-wrapup-69/</loc>
        
        
            <lastmod>2018-12-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/14/securing-buckets-with-amazon-s3-block-public-access/</loc>
        
        
            <lastmod>2019-02-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/13/q3-threat-report-analyzing-three-key-detection-trends/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/12/how-rapid7-researchers-used-data-science-to-wrangle-messy-whois-data/</loc>
        
        
            <lastmod>2018-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/11/patch-tuesday-december-2018/</loc>
        
        
            <lastmod>2018-12-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/11/rapid7-introduces-industry-cyber-exposure-report-fortune-500/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/07/metasploit-wrapup-68/</loc>
        
        
            <lastmod>2018-12-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/06/single-page-applications-the-journey-so-far/</loc>
        
        
            <lastmod>2018-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/04/seeing-security-scale-rapid7s-recap-of-aws-re-invent-2018/</loc>
        
        
            <lastmod>2018-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/04/did-you-remediate-that-how-the-new-insightvm-executive-report-provides-key-details-on-team-progress/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/12/03/congrats-to-the-2018-metasploit-community-ctf-winners/</loc>
        
        
            <lastmod>2018-12-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/30/how-your-organization-can-respond-after-news-of-a-major-security-breach/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/30/metasploit-wrapup-67/</loc>
        
        
            <lastmod>2018-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/28/automation-the-ultimate-enabler-for-threat-detection-and-response/</loc>
        
        
            <lastmod>2018-11-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/27/how-to-turn-remediation-into-reality-with-automation/</loc>
        
        
            <lastmod>2018-11-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/27/aws-re-invent-challenges-to-operationalizing-security-when-there-are-too-many-cooks-in-your-hybrid-it-kitchen/</loc>
        
        
            <lastmod>2018-11-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/27/deploying-kubernetes-across-multiple-clouds/</loc>
        
        
            <lastmod>2021-03-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/26/feel-like-family-tech-support-tips-for-securing-your-loved-ones-this-holiday-season/</loc>
        
        
            <lastmod>2018-11-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/21/how-retailers-can-protect-against-magecart-this-black-friday-and-holiday-season/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/20/rolling-with-your-logs-part-3-using-regex-to-expand-your-search-options/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/19/lessons-learned-firsthand-securing-corporate-voicemail-pins/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/19/top-tactics-for-researching-iot-technology-security-this-holiday-season/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/16/metasploit-wrapup-66/</loc>
        
        
            <lastmod>2018-11-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/15/5-tips-for-monitoring-network-traffic-on-your-network/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/14/q-a-why-every-threat-detection-strategy-needs-user-behavior-analytics/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/14/patch-tuesday-november-2018/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/13/rolling-with-your-logs-part-2-advanced-mode-searches/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/13/rapid7-quarterly-threat-report-2018-q3/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/12/how-to-automate-insight-agent-deployment-in-aws/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/09/metasploit-wrapup-65/</loc>
        
        
            <lastmod>2019-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/08/top-5-threats-healthcare-organizations-face-and-how-to-combat-them/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/07/rapid7-wins-frost-sullivan-2018-global-vulnerability-management-market-leadership-award/</loc>
        
        
            <lastmod>2019-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/06/rolling-with-your-logs-part-1-your-guide-to-log-search-in-insightidr/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/05/announcing-the-2018-metasploit-community-ctf/</loc>
        
        
            <lastmod>2020-12-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/02/metasploit-wrapup-64/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/02/why-its-critical-to-test-the-failure-state-of-iot-products/</loc>
        
        
            <lastmod>2019-02-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/01/expanded-protections-for-security-researchers-under-dmca-sec-1201/</loc>
        
        
            <lastmod>2018-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/11/01/the-three-most-expensive-security-operations-costs-and-how-to-minimize-them/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/31/prioritizing-the-fundamentals-of-coordinated-vulnerability-disclosure/</loc>
        
        
            <lastmod>2019-01-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/31/a-day-in-the-life-of-a-rapid7-soc-analyst/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/31/whiteboard-wednesday-common-vulnerabilities-as-personified-by-halloween-costumes/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/30/how-to-use-insightvms-goals-slas-feature-to-define-important-metrics-and-optimize-your-security-operations/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/29/shoring-up-the-defenses-together-2018q2-and-q3-wrap-up/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/26/metasploit-wrapup-63/</loc>
        
        
            <lastmod>2018-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/25/national-cybersecurity-awareness-month-incident-response-in-the-industrial-industry/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/24/rapid7-strong-performer-2018-forrester-emerging-mssp-wave/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/23/quantifying-vulnerability-risk-how-to-quickly-calculate-and-prioritize-risk/</loc>
        
        
            <lastmod>2018-10-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/22/rapid7-named-a-leader-in-idc-marketscape-for-incident-response-services/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/22/7-funny-and-punny-halloween-costume-ideas-for-tech-and-cybersecurity-pros/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/19/metasploit-wrapup-62/</loc>
        
        
            <lastmod>2018-10-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/18/national-cybersecurity-awareness-month-tips-for-improving-your-personal-pa55w0rd-management/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/17/take-a-bite-out-of-the-vulnerability-remediation-backlog-with-insightvm/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/16/universal-event-formats-in-insightidr-a-step-by-step-nxlog-guide/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/16/how-to-conduct-dns-reconnaissance-for-02-using-rapid7-open-data-and-aws/</loc>
        
        
            <lastmod>2018-10-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/15/rapid7-acquires-web-application-security-provider-tcell/</loc>
        
        
            <lastmod>2018-10-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/12/metasploit-wrapup-61/</loc>
        
        
            <lastmod>2018-11-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/11/defending-against-magecart-with-csp/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/11/national-cybersecurity-awareness-month-getting-started-with-cybersecurity-education-and-training-assistance-programs/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/10/universal-event-formats-apply-user-behavior-analytics-to-more-of-your-data/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/09/patch-tuesday-october-2018/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/09/introducing-metasploits-first-evasion-module/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/08/new-features-rapid7-launches-public-api-for-insightappsec/</loc>
        
        
            <lastmod>2018-10-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/05/metasploit-wrapup-60/</loc>
        
        
            <lastmod>2018-10-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/04/cybersecurity-awareness-month-simple-tweaks-to-help-reduce-risk-from-voice-controlled-devices/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/03/tcell-named-a-gold-winner-for-innovations-in-web-application-security-by-golden-bridge-awards/</loc>
        
        
            <lastmod>2019-07-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/03/security-orchestration-and-automation-not-just-for-mature-organizations/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/02/this-one-time-on-a-pen-test-part-5-from-physical-security-weakness-to-strength/</loc>
        
        
            <lastmod>2019-08-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/10/01/customer-panel-recap-building-a-modern-security-program/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/28/metasploit-wrapup-59/</loc>
        
        
            <lastmod>2019-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/27/the-powershell-boogeyman-how-to-defend-against-malicious-powershell-attacks/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/26/password-tips-from-a-pen-tester-are-12-character-passwords-really-stronger-or-just-a-dime-a-dozen/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/25/the-newegg-breach-pci-means-nothing-to-magecart/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/25/putting-pen-tests-to-paper-lessons-and-learnings-from-rapid7s-annual-mega-hackathon/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/25/this-one-time-on-a-pen-test-part-4-from-zero-to-web-application-admin-through-open-source-intelligence-gathering/</loc>
        
        
            <lastmod>2019-08-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/21/metasploit-wrapup-58/</loc>
        
        
            <lastmod>2018-09-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/20/the-british-airways-breach-pci-is-not-enough/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/20/automate-to-accelerate-introducing-security-orchestration-and-automation-on-the-rapid7-insight-platform/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/19/detecting-inbound-rdp-activity-from-external-clients/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/19/rapid7-threat-intelligence-book-club-countdown-to-zero-day-recap/</loc>
        
        
            <lastmod>2018-09-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/18/this-one-time-on-a-pen-test-part-3-how-i-stole-an-energy-company/</loc>
        
        
            <lastmod>2019-08-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/14/metasploit-wrapup-57/</loc>
        
        
            <lastmod>2018-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/13/do-you-know-your-appsec-roi/</loc>
        
        
            <lastmod>2019-05-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/13/how-to-identify-and-prioritize-gaps-with-the-cybersecurity-maturity-assessment-post-2018-under-the-hoodie/</loc>
        
        
            <lastmod>2019-08-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/12/faster-prod-at-the-expense-of-security-2018-under-the-hoodie-reveals-gaps-in-applications/</loc>
        
        
            <lastmod>2019-08-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/11/patch-tuesday-september-2018/</loc>
        
        
            <lastmod>2018-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/11/this-one-time-on-a-pen-test-part-2-how-just-one-flaw-helped-us-beat-the-unbeatable-network/</loc>
        
        
            <lastmod>2019-08-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/10/serverless-and-the-owasp-top-10/</loc>
        
        
            <lastmod>2019-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/10/summertime-and-the-coding-is-sometimes-easy-what-i-learned-during-gsoc-for-metasploit/</loc>
        
        
            <lastmod>2018-09-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/07/metasploit-wrapup-56/</loc>
        
        
            <lastmod>2018-09-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/06/accelerate-incident-response-with-security-orchestration-and-automation/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/05/external-metasploit-modules-the-gift-that-keeps-on-slithering/</loc>
        
        
            <lastmod>2018-09-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/09/04/this-one-time-on-a-pen-test-part-1-curiosity-didnt-kill-the-cat-honesty-did/</loc>
        
        
            <lastmod>2019-08-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/31/metasploit-wrapup-55/</loc>
        
        
            <lastmod>2018-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/31/under-the-hoodie-which-vulns-are-being-exploited-by-attackers-and-our-pen-testers-in-2018/</loc>
        
        
            <lastmod>2019-08-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/30/5-ways-rasp-will-make-your-pentest-painless/</loc>
        
        
            <lastmod>2019-05-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/30/how-to-set-up-your-security-operations-center-soc-for-success/</loc>
        
        
            <lastmod>2018-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/29/endpoint-agents-are-necessary-for-todays-modern-environment-heres-why-part-2/</loc>
        
        
            <lastmod>2020-04-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/28/lessons-and-takeaways-on-ctias-recently-released-iot-security-certification-program/</loc>
        
        
            <lastmod>2018-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/27/how-to-get-instant-insight-into-your-log-data-with-analytic-packs/</loc>
        
        
            <lastmod>2018-08-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/24/metasploit-wrapup-54/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/24/enhancing-iot-security-through-research-partnerships/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/23/cross-site-scripting-xss-can-steal-payment-info-from-payment-processors/</loc>
        
        
            <lastmod>2019-05-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/23/how-our-threat-intel-team-crafts-attacker-behavior-analytics/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/23/assess-containers-during-software-builds-with-insightvm/</loc>
        
        
            <lastmod>2019-03-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/22/whats-going-on-in-production-application-security-2018/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/22/endpoint-agents-are-necessary-for-todays-modern-environment-heres-why-part-1/</loc>
        
        
            <lastmod>2020-04-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/22/password-tips-from-a-pen-tester-taking-the-predictability-out-of-common-password-patterns/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/21/rapid7-quarterly-threat-report-2018-q2/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/20/cis-critical-security-control-20-measure-your-security-standing-with-penetration-tests-and-red-team-exercises/</loc>
        
        
            <lastmod>2018-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/17/metasploit-wrapup-53/</loc>
        
        
            <lastmod>2018-09-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/16/analysis-of-the-ticketmaster-breach/</loc>
        
        
            <lastmod>2019-05-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/16/address-the-naic-insurance-data-security-model-law-with-rapid7-detection-and-response/</loc>
        
        
            <lastmod>2019-08-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/16/scan-management-with-insightappsec-theres-more-to-application-security-than-long-lists-of-vulnerabilities/</loc>
        
        
            <lastmod>2018-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/15/2018-black-hat-recap/</loc>
        
        
            <lastmod>2018-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/14/patch-tuesday-august-2018/</loc>
        
        
            <lastmod>2018-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/13/cis-critical-security-control-19-steps-for-crafting-an-efficient-incident-response-and-management-strategy/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/10/metasploit-wrapup-52/</loc>
        
        
            <lastmod>2018-08-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/09/4-steps-to-securing-active-directory-with-confidence/</loc>
        
        
            <lastmod>2018-08-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/06/cis-critical-security-control-18-breaking-down-the-control-chaos-of-application-software-security/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/03/metasploit-wrapup-51/</loc>
        
        
            <lastmod>2018-08-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/03/lessons-from-the-philippines-specific-approach-to-data-privacy/</loc>
        
        
            <lastmod>2018-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/08/02/detection-reflection-analyzing-9-months-of-rapid7-penetration-testing-engagements/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/31/how-to-use-projects-heisenberg-and-sonar-to-investigate-attacker-behavior/</loc>
        
        
            <lastmod>2018-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/30/cis-critical-security-control-17-some-assembly-required-for-your-security-awareness-and-training-program/</loc>
        
        
            <lastmod>2019-01-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/27/metasploit-wrapup-50/</loc>
        
        
            <lastmod>2018-07-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/26/rebekah-brown-threat-intel-lead-on-attacker-behavior-analytics/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/24/beyond-rasp-security/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/24/your-guide-to-insightvms-restful-api/</loc>
        
        
            <lastmod>2018-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/24/under-the-hoodie-2018-lessons-from-a-season-of-penetration-testing/</loc>
        
        
            <lastmod>2019-08-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/20/metasploit-wrapup-49/</loc>
        
        
            <lastmod>2018-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/20/mac-address-tracker-using-network-traffic-analysis/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/19/open-source-security-meetup-ossm-vegas-2018/</loc>
        
        
            <lastmod>2018-07-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/19/password-tips-from-a-pen-tester-what-is-your-companys-default-password/</loc>
        
        
            <lastmod>2018-07-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/18/metasploit-teradata-modules/</loc>
        
        
            <lastmod>2018-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/18/threat-intel-book-club-july-recap-august-sign-up/</loc>
        
        
            <lastmod>2018-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/17/azure-security-center-and-active-directory-now-integrate-with-the-rapid7-platform/</loc>
        
        
            <lastmod>2018-07-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/13/metasploit-wrapup-48/</loc>
        
        
            <lastmod>2018-07-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/12/your-black-hat-2018-survival-guide/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/12/how-to-build-your-own-caller-id-spoofer-part-2/</loc>
        
        
            <lastmod>2018-07-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/12/building-a-tech-stack-to-enable-security-orchestration-and-automation/</loc>
        
        
            <lastmod>2018-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/11/tcell-a-tool-for-pci-compliance/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/10/patch-tuesday/</loc>
        
        
            <lastmod>2018-07-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/10/the-rapid7-belfast-security-operations-centre-take-a-video-tour/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/09/communicating-iot-security-update-capability/</loc>
        
        
            <lastmod>2018-07-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/09/blockchain-blunders-exposing-digital-pickpockets-in-the-ethereum-ecosystem/</loc>
        
        
            <lastmod>2018-07-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/06/metasploit-wrapup-47/</loc>
        
        
            <lastmod>2018-07-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/05/how-security-automation-helps-you-work-smarter-and-improve-accuracy/</loc>
        
        
            <lastmod>2018-07-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/07/03/behind-the-scenes-attacker-behavior-analytics-with-mdr-team/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/29/metasploit-wrapup-46/</loc>
        
        
            <lastmod>2018-06-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/29/podcast-the-future-of-application-security-and-devops/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/28/do-you-need-coding-resources-on-your-security-team/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/27/analyzing-the-kubernetes-hack-backdooring-through-the-kubelet-api/</loc>
        
        
            <lastmod>2018-06-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/26/in-our-customers-words-why-mastering-application-security-basics-matters/</loc>
        
        
            <lastmod>2018-06-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/26/deception-technology-in-insightidr-setting-up-honeypots/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/22/metasploit-wrapup-45/</loc>
        
        
            <lastmod>2018-06-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/21/orchestration-and-automation-questions-you-need-to-ask-vendors/</loc>
        
        
            <lastmod>2018-06-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/21/deception-technology-in-insightidr-setting-up-honey-users/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/20/rapid7-threat-intel-book-club-summer-session/</loc>
        
        
            <lastmod>2018-06-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/20/why-bow-valley-college-gives-rapid7-insightvm-an-a-for-vulnerability-management/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/19/security-impact-of-easily-accessible-uart-on-iot-technology/</loc>
        
        
            <lastmod>2018-06-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/15/metasploit-wrapup-44/</loc>
        
        
            <lastmod>2018-06-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/15/how-to-create-a-secure-and-portable-kali-installation/</loc>
        
        
            <lastmod>2019-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/15/rapid7-wins-best-security-company-award-at-sc-awards-europe/</loc>
        
        
            <lastmod>2018-06-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/14/a-proven-anti-phishing-strategy-to-combat-attacks/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/14/new-insightappsec-releases-compliance-reports-and-the-appsec-toolkit/</loc>
        
        
            <lastmod>2018-06-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/14/detect-smbv1-scanning-and-established-connections/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/13/how-security-orchestration-and-automation-will-unite-infosec/</loc>
        
        
            <lastmod>2018-06-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/13/whiteboard-wednesday-phishing-awareness-training/</loc>
        
        
            <lastmod>2018-09-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/12/patch-tuesday-june-2018/</loc>
        
        
            <lastmod>2018-06-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/12/password-tips-from-a-pen-tester-common-patterns-exposed/</loc>
        
        
            <lastmod>2018-06-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/12/r7-2018-15-cve-2018-5553-crestron-dge-100-console-command-injection-fixed/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/08/metasploit-wrapup-43/</loc>
        
        
            <lastmod>2018-06-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/07/vpnfilter-potential-reach/</loc>
        
        
            <lastmod>2018-06-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/07/title-2018-national-exposure-index-research-report-internet-security-posture-by-country/</loc>
        
        
            <lastmod>2018-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/06/identify-analyze-and-report-phishing-emails-with-insightphish-getting-started/</loc>
        
        
            <lastmod>2019-01-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/04/customer-story-how-dscout-protects-against-web-application-attacks/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/04/announcement-end-of-life-for-metasploit-express-edition/</loc>
        
        
            <lastmod>2019-01-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/06/01/metasploit-wrapup-42/</loc>
        
        
            <lastmod>2018-12-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/31/managed-threat-detection-and-response-the-questions-you-need-to-ask-vendors/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/30/how-devops-can-use-quality-gates-for-security-checks-2/</loc>
        
        
            <lastmod>2018-05-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/29/streamlining-your-vulnerability-remediation-workflows-with-insightvm-projects/</loc>
        
        
            <lastmod>2018-06-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/25/metasploit-wrapup-41/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/24/what-the-heck-is-drive-by-cryptomining/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/24/how-to-build-your-own-caller-id-spoofer-part-1/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/23/days-since-last-accident-kpis-for-application-security/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/23/whiteboard-wednesday-your-6-minute-recap-of-q1-2018s-threat-landscape/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/18/metasploit-wrapup-40/</loc>
        
        
            <lastmod>2018-05-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/17/diving-deep-and-finding-vulnerabilities-in-modern-web-applications/</loc>
        
        
            <lastmod>2018-05-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/16/whiteboard-wednesday-the-two-components-of-phishing-protection-your-security-strategy-needs/</loc>
        
        
            <lastmod>2019-10-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/15/rapid7-quarterly-threat-report-2018-q1/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/14/no-more-tears-wannacry/</loc>
        
        
            <lastmod>2018-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/11/metasploit-wrapup-39/</loc>
        
        
            <lastmod>2018-05-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/10/unifying-security-data-how-to-streamline-endpoint-detection-and-response/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/10/password-tips-from-a-pen-tester-3-passwords-to-eliminate/</loc>
        
        
            <lastmod>2018-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/08/patch-tuesday-may-2018/</loc>
        
        
            <lastmod>2018-05-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/07/critical-control-16-account-monitoring-and-control-aint-nobody-got-time-for-that/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/07/off-the-chain-a-research-paper-observing-bitcoin-nodes-on-the-public-internet/</loc>
        
        
            <lastmod>2018-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/04/metasploit-wrapup-38/</loc>
        
        
            <lastmod>2018-05-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/04/how-tcell-helps-align-with-gdpr-compliance/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/04/updating-data-security-laws-a-starting-point/</loc>
        
        
            <lastmod>2019-01-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/02/3-steps-to-clear-the-fog-vulnerability-remediation-visibility/</loc>
        
        
            <lastmod>2019-12-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/05/01/what-makes-a-security-alert-actionable-automatic-context/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/30/cve-100k-a-big-round-number/</loc>
        
        
            <lastmod>2018-04-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/30/cve-100k-by-the-numbers/</loc>
        
        
            <lastmod>2019-02-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/30/cis-critical-security-control-15-explained-wireless-access-control-are-you-really-managing-your-wifi/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/27/metasploit-wrapup-37/</loc>
        
        
            <lastmod>2018-04-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/27/why-runtime-application-self-protection-is-here-to-stay/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/27/drupalgeddon-vulnerability-what-is-it-are-you-impacted/</loc>
        
        
            <lastmod>2018-04-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/26/rapid7-insightvm-named-best-vulnerability-management-solution-by-sc-magazine/</loc>
        
        
            <lastmod>2019-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/24/detect-network-devices-using-telnet/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/24/how-to-identify-attacker-reconnaissance-on-your-internal-network/</loc>
        
        
            <lastmod>2018-04-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/23/cis-critical-control-14-explained-controlled-access-based-on-the-need-to-know/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/23/getting-started-in-ethical-hacking/</loc>
        
        
            <lastmod>2018-05-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/20/metasploit-wrapup-36/</loc>
        
        
            <lastmod>2018-04-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/19/should-security-teams-use-csp-nonces-to-better-comply-with-pci/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/19/how-to-remediate-vulnerabilities-across-multiple-offices/</loc>
        
        
            <lastmod>2018-04-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/18/rsa-2018-kickoff-wrap-up/</loc>
        
        
            <lastmod>2018-04-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/17/georgia-should-not-authorize-hack-back/</loc>
        
        
            <lastmod>2020-07-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/17/attacker-behavior-analytics-detects-unknown-threats/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/13/the-jet-age-of-waf-application-awareness/</loc>
        
        
            <lastmod>2020-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/13/metasploit-wrapup-35/</loc>
        
        
            <lastmod>2018-04-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/13/threat-intel-book-club-the-cuckoos-egg-wrap-up/</loc>
        
        
            <lastmod>2018-04-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/12/how-devops-can-use-quality-gates-for-security-checks/</loc>
        
        
            <lastmod>2018-05-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/11/just-a-little-more-may-be-all-you-need-for-great-security/</loc>
        
        
            <lastmod>2018-04-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/10/patch-tuesday-april-2018/</loc>
        
        
            <lastmod>2018-04-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/10/shoring-up-the-defenses-together-2018q1-wrap-up/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/09/market-research-akamai-vs-cloudflare-vs-incapsula-vs-tcell/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/09/where-to-find-rapid7-in-san-francisco-2018-edition/</loc>
        
        
            <lastmod>2018-04-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/09/cis-critical-security-control-13-data-protection-explained/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/07/metasploit-wrapup-34/</loc>
        
        
            <lastmod>2018-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/05/under-armour-data-breach-heres-what-we-know/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/05/securing-personal-information-in-web-applications-for-gdpr/</loc>
        
        
            <lastmod>2018-04-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/04/where-the-sidewalk-ends-extend/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/03/getting-your-spidey-on-with-mobile-apps/</loc>
        
        
            <lastmod>2018-04-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/02/metasploit-wrapup-33/</loc>
        
        
            <lastmod>2019-10-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/04/02/cis-critical-control-12-boundary-defense-explained/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/30/actually-grindr-is-fine-fud-and-security-reporting/</loc>
        
        
            <lastmod>2018-04-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/29/the-iron-age-of-waf-automation/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/29/cisco-smart-install-smi-remote-code-execution-what-you-need-to-know/</loc>
        
        
            <lastmod>2018-03-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/29/how-to-detect-weak-ssl-tls-encryption/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/27/3-ways-to-accelerate-web-app-security-testing/</loc>
        
        
            <lastmod>2018-03-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/26/cis-critical-control-11-secure-configurations-for-network-devices/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/23/metasploit-wrapup-32/</loc>
        
        
            <lastmod>2018-03-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/23/tcell-is-a-strong-performer-in-a-leading-independent-analysts-2018-research-report/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/23/the-taste-of-our-dog-food-aka-red-team-opsec/</loc>
        
        
            <lastmod>2018-03-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/22/the-dangers-of-underestimating-the-importance-of-application-security/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/21/cavete-symantec-testimonium-exspirare-martiis-beware-the-symantec-certificates-expiring-in-march/</loc>
        
        
            <lastmod>2018-03-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/21/detect-new-server-ports-use-network/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/21/gdpr-preparation-march-and-april-course-correct/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/20/rapid7-threat-report-q4-2017-q4-threat-report-and-2017-wrap-up/</loc>
        
        
            <lastmod>2018-05-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/18/next-threat-intel-book-club-4-5-recapping-the-cuckoos-egg/</loc>
        
        
            <lastmod>2018-04-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/16/metasploit-wrapup-31/</loc>
        
        
            <lastmod>2018-03-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/15/stateful-waf-aka-the-bronze-age/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/14/rapid7-named-a-leader-in-forrester-wave-for-vulnerability-risk-management/</loc>
        
        
            <lastmod>2018-04-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/14/r7-2018-01-cve-2018-5551-cve-2018-5552-docutrac-office-therapy-installer-hard-coded-credentials-and-cryptographic-salt/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/13/patch-tuesday-march-18/</loc>
        
        
            <lastmod>2018-03-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/12/cis-critical-control-10-data-recovery-capability/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/09/metasploit-wrapup-30/</loc>
        
        
            <lastmod>2018-03-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/09/5-challenges-of-moving-apps-to-the-cloud/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/08/checking-back-in-with-googles-dfp-xss-vulnerability/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/07/how-to-build-an-incident-response-plan-your-battle-plan/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/07/an-impressively-unprecedented-drop-in-open-memcached-services/</loc>
        
        
            <lastmod>2018-03-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/05/cis-critical-control-9-limitation-and-control-of-ports-protocols-and-services/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/02/lurking-in-lib/</loc>
        
        
            <lastmod>2018-03-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/01/stateless-web-application-firewall-aka-the-stone-age/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/01/threat-landscape-demands-user-behavior-analytics/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/03/01/r7-2017-27-cve-2017-8987-hpe-ilo3-unauthenticated-remote-dos-fixed/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/28/how-to-scan-your-own-application-with-the-insightappsec-free-trial/</loc>
        
        
            <lastmod>2018-02-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/27/the-flip-side-of-memcrashed/</loc>
        
        
            <lastmod>2018-03-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/27/recap-2-21-threat-intelligence-book-club/</loc>
        
        
            <lastmod>2018-04-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/23/metasploit-wrapup-29/</loc>
        
        
            <lastmod>2018-02-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/22/cryptojacking-or-why-monero-is-on-everybodys-lips-right-now/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/22/making-the-dream-work-teaming-with-dev-for-safer-production-apps/</loc>
        
        
            <lastmod>2018-03-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/16/metasploit-wrapup-28/</loc>
        
        
            <lastmod>2018-02-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/15/tonight-im-gonna-ir-like-its-99-days-until-gdpr/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/13/patch-tuesday-february-2018/</loc>
        
        
            <lastmod>2018-02-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/13/coinhive-making-other-peoples-web-browsers-mine-cryptocurrency/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/13/finding-evil-why-managed-detection-and-response-zeroes-in-on-the-endpoint/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/12/hipaa-security-compliance-fallacies-and-how-to-avoid-them/</loc>
        
        
            <lastmod>2018-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/09/metasploit-wrapup-27/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/09/signatures-are-they-still-relevant-in-application-security/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/08/uk-ncscs-active-cyber-defence-brings-new-hope-to-our-combined-fight-against-cybercrime/</loc>
        
        
            <lastmod>2018-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/08/r7-2017-28-epson-airprint-xss-cve-2018-5550/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/07/smart-sensors-our-bold-new-world/</loc>
        
        
            <lastmod>2018-02-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/06/rapid7-insightphishing-beta-unified-phishing-simulation-investigation-and-analysis/</loc>
        
        
            <lastmod>2019-10-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/05/rapid7-subscription-pricing-update/</loc>
        
        
            <lastmod>2018-03-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/02/metasploit-wrapup-26/</loc>
        
        
            <lastmod>2018-02-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/02/welcome-to-the-2018-threat-intel-book-club/</loc>
        
        
            <lastmod>2018-04-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/02/on-random-shell-generators/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/02/01/an-open-letter-to-the-office-of-the-australian-information-commissioner/</loc>
        
        
            <lastmod>2018-02-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/31/february-test-take-note/</loc>
        
        
            <lastmod>2018-02-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/29/rapid7s-2017-year-in-review/</loc>
        
        
            <lastmod>2018-01-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/26/metasploit-wrapup-25/</loc>
        
        
            <lastmod>2018-01-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/25/xss-bug-reports-made-easy/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/25/security-issues-in-cloud-computing-the-case-for-continual-improvement/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/25/vulnerability-management-year-in-review-part-3-remediate/</loc>
        
        
            <lastmod>2018-01-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/24/how-to-detect-unauthorised-dns-servers/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/23/incorporating-automated-actions-into-your-vulnerability-management-process/</loc>
        
        
            <lastmod>2018-01-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/19/metasploit-wrapup-24/</loc>
        
        
            <lastmod>2018-01-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/19/think-like-a-hacker-going-beyond-network-security/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/18/a-restful-api-for-insightvm/</loc>
        
        
            <lastmod>2018-04-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/17/3-questions-to-ask-when-prioritizing-web-application-vulnerabilities-2/</loc>
        
        
            <lastmod>2018-02-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/16/taking-a-message-based-approach-to-logging/</loc>
        
        
            <lastmod>2018-01-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/12/metasploit-wrapup-23/</loc>
        
        
            <lastmod>2018-01-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/11/how-to-choose-a-security-orchestration-and-automation-platform/</loc>
        
        
            <lastmod>2018-06-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/11/the-4-big-differences-between-network-security-and-web-application-security/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/10/gdpr-preparation-checklist-january-teach-and-tidy/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/10/patch-tuesday-january-2018/</loc>
        
        
            <lastmod>2018-01-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/09/vulnerability-management-a-year-in-review-prioritize/</loc>
        
        
            <lastmod>2018-01-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/05/metasploit-wrapup-22/</loc>
        
        
            <lastmod>2018-01-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/05/a-visit-from-a-printer-poc/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/04/certificate-transparency-the-gift-that-keeps-giving/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/04/meltdown-and-spectre-what-you-need-to-know-cve-2017-5715-cve-2017-5753-cve-2017-5754/</loc>
        
        
            <lastmod>2018-02-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/04/the-ghost-of-a-botnet-possibly-past/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/04/vulnerability-management-year-in-review-part-1-collect/</loc>
        
        
            <lastmod>2018-01-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/03/hohoho-wned-first-steps-toward-a-pen-test-oriented-rootkit/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/03/fast-and-secure-sdlc-4-barriers-to-tackle-for-better-web-application-security/</loc>
        
        
            <lastmod>2018-01-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/02/visions-past-and-future-2018-security-predictions/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/02/yankee-swapped-mqtt-primer-exposure-exploitation-and-exploration/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2018/01/01/auld-lang-syne-threat-intelligence-resolutions-for-2018/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/31/haxmas-review-a-year-of-patch-tuesdays/</loc>
        
        
            <lastmod>2019-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/30/12-memorable-metasploit-moments-of-2017/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/29/an-evaluation-of-the-north-poles-password-security-posture/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/28/regifting-python-in-metasploit/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/27/forget-the-presents-haxmas-is-all-about-the-gift-certificates/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/26/uses-for-tech-of-haxmas-past/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/25/haxmas-the-true-meaning-s-of-metasploit/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/24/on-the-zero-eth-day-of-haxmas/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/22/metasploit-wrapup-21/</loc>
        
        
            <lastmod>2017-12-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/21/protecting-your-web-site-from-the-doubleclick-xss-vulnerability/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/21/lets-build-an-incident-response-plan-part-4/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/19/nist-cyber-framework-revised-to-include-coordinated-vuln-disclosure-processes/</loc>
        
        
            <lastmod>2020-07-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/19/r7-2017-25-cambium-epmp-and-cnpilot-multiple-vulnerabilities/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/18/mdr-and-gdpr-more-than-a-lot-of-letters/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/15/metasploit-wrapup-20/</loc>
        
        
            <lastmod>2017-12-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/14/lets-build-an-incident-response-plan-part-3-2/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/14/fcc-repeals-net-neutrality-what-now/</loc>
        
        
            <lastmod>2018-05-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/13/attention-humans-the-robot-attack/</loc>
        
        
            <lastmod>2017-12-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/13/creating-a-risk-based-vulnerability-management-program-for-gdpr-with-insightvm/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/13/6-best-practices-for-effective-it-troubleshooting/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/12/patch-tuesday-december-2017/</loc>
        
        
            <lastmod>2017-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/12/the-magic-behind-rapid7-managed-application-security-services/</loc>
        
        
            <lastmod>2017-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/12/rapid7-excels-at-advanced-analytics-and-user-monitoring-in-gartners-2017-siem-critical-capabilities-report/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/11/congrats-to-the-winners-of-our-2017-community-ctf/</loc>
        
        
            <lastmod>2017-12-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/09/metasploit-wrapup-19/</loc>
        
        
            <lastmod>2017-12-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/07/lets-build-an-incident-response-plan-part-2/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/07/standing-with-massachusetts-technology-leaders-in-support-of-net-neutrality/</loc>
        
        
            <lastmod>2017-12-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/06/siem-magic-quadrant-insightidr-visionary/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/04/cve-2017-10151-what-you-need-to-know-about-the-oracle-identity-manager-vulnerability/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/04/gdpr-compliance-checklist-december-assess-review/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/12/01/metasploit-wrapup-18/</loc>
        
        
            <lastmod>2017-12-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/30/lets-build-an-incident-response-plan-part-1/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/30/cover-your-app-4-ways-to-know-the-risk-of-your-applications/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/30/announcing-the-metasploitable3-community-ctf/</loc>
        
        
            <lastmod>2017-12-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/28/insightappsec-feature-highlights-on-premise-engines-jira-integration-and-more/</loc>
        
        
            <lastmod>2017-11-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/28/cve-2017-16943-exim-bdat-uaf/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/27/an-agent-to-rule-them-all-insightidr-monitors-win-linux-mac-endpoints/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/27/firewall-reporting-excessive-syn-packets/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/24/5-tips-for-a-cyber-holiday-season/</loc>
        
        
            <lastmod>2017-11-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/23/giving-thanks-for-security-improvements/</loc>
        
        
            <lastmod>2017-11-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/21/2017-security-careers-highlights-roles-and-responsibilities-in-demand/</loc>
        
        
            <lastmod>2017-12-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/21/3-steps-to-building-an-effective-log-management-policy/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/21/intel-sa-00086-security-bulletin-for-intel-management-engine-me-and-advanced-management-technology-amt-vulnerabilities-what-you-need-to-know/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/20/the-oracle-peoplesoft-tuxedo-joltandbleed-vulnerabilities-what-you-need-to-know/</loc>
        
        
            <lastmod>2017-11-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/20/united-session-on-gdpr-compliance-now-available-in-our-gdpr-toolkit/</loc>
        
        
            <lastmod>2017-11-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/17/metasploit-wrapup-17/</loc>
        
        
            <lastmod>2017-11-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/16/welcome-transparency-on-governments-process-for-disclosing-vulnerabilities/</loc>
        
        
            <lastmod>2017-11-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/15/deploying-csp-properly/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/15/simplicity-harmony-and-opportunity/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/14/patch-tuesday-november-2017/</loc>
        
        
            <lastmod>2017-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/14/takeaways-from-2017-sans-state-of-application-security-survey/</loc>
        
        
            <lastmod>2017-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/14/gdpr-preparation-november-form-storm/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/13/metasploit-minrid-option/</loc>
        
        
            <lastmod>2017-11-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/11/metasploit-wrapup-16/</loc>
        
        
            <lastmod>2017-11-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/09/stopping-command-injection-attacks-by-instrumenting-application-runtimes/</loc>
        
        
            <lastmod>2019-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/09/how-to-securely-handle-a-lost-or-stolen-device-a-practical-workflow/</loc>
        
        
            <lastmod>2017-12-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/07/ncsam-security-crash-diet-wrap-up/</loc>
        
        
            <lastmod>2017-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/07/the-term-internet-of-things-iot-should-change/</loc>
        
        
            <lastmod>2017-11-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/06/testing-developer-security-with-metasploit-pro-task-chains/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/06/insightidr-investigation-enhancements/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/03/metasploit-wrapup-15/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/02/changing-the-corporate-network-attackers-risk-reward-paradigm/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/02/testing-smb-security-with-metasploit-pro-part-2/</loc>
        
        
            <lastmod>2017-11-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/02/security-career-paths-common-and-unique-roles/</loc>
        
        
            <lastmod>2017-12-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/01/ncsam-security-crash-diet-week-4-iot/</loc>
        
        
            <lastmod>2017-11-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/11/01/stop-aiming-for-security-perfection/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/31/testing-smb-server-security-with-metasploit-pro-task-chains-part-1/</loc>
        
        
            <lastmod>2018-05-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/27/metasploit-wrapup-14/</loc>
        
        
            <lastmod>2017-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/26/why-security-teams-should-embrace-automation/</loc>
        
        
            <lastmod>2018-06-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/25/roca-vulnerable-rsa-key-generation/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/24/the-badrabbit-ransomware-attack-what-you-need-to-know/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/24/ncsam-security-crash-diet-week-3-privacy/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/23/iot-mobile-application-credential-encryption/</loc>
        
        
            <lastmod>2017-10-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/20/metasploit-wrapup-13/</loc>
        
        
            <lastmod>2017-10-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/19/5-wrong-lessons-from-equifax-and-the-missed-opportunity-of-owasp/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/18/defining-your-career-in-infosec/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/17/ncsam-security-crash-diet-week-2/</loc>
        
        
            <lastmod>2017-10-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/17/nist-standards-and-why-they-matter/</loc>
        
        
            <lastmod>2017-10-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/16/siem-market-evolution-and-the-future-of-siem-tools/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/16/insight-platform-enhancements-for-insightidr/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/16/the-wi-fi-krack-vulnerability-what-you-need-to-know/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/16/ncsam_how_hackable_are_you/</loc>
        
        
            <lastmod>2017-11-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/13/metasploit-wrapup-metasploit-5-or-bust/</loc>
        
        
            <lastmod>2017-10-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/13/filling-big-gaps-in-security-programs/</loc>
        
        
            <lastmod>2017-10-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/12/insightvm-in-the-azure-marketplace/</loc>
        
        
            <lastmod>2020-01-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/11/help-whats-going-on/</loc>
        
        
            <lastmod>2017-10-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/11/r7-2017-08-bpc-smartvista-sql-injection-vulnerability/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/11/detect-bittorrent-traffic-network/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/10/patch-tuesday-october-2017/</loc>
        
        
            <lastmod>2017-10-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/10/ncsam-security-crash-diet-week-1-maintenance/</loc>
        
        
            <lastmod>2017-10-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/10/no-priority-post-auth-vulnerabilities/</loc>
        
        
            <lastmod>2017-10-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/06/vulnerabilities-affecting-four-rapid7-products-fixed/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/05/how-to-choose-skills-for-your-security-operations-center/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/04/how-to-password-protect-apache-directories-with-mod_authn_dbd-and-mysql-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/04/how-to-secure-apache-with-lets-encrypt-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/04/how-to-secure-ssh-server-using-port-knocking-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/04/how-to-secure-mysql-server-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/10/03/ncsam-a-personal-security-crash-diet/</loc>
        
        
            <lastmod>2017-10-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/29/building-a-backpack-hypervisor/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/28/rapid7-and-nisc-work-together-to-help-customers-with-detection-and-response/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/28/how-to-send-bro-event-data-to-komand/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/28/insightidr-free-trial/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/27/macos-keychain-security-what-you-need-to-know/</loc>
        
        
            <lastmod>2017-10-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/26/3-core-responsibilities-for-the-modern-it-operations-manager/</loc>
        
        
            <lastmod>2017-10-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/22/multiple-vulnerabilities-in-wink-and-insteon-smart-home-systems/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/22/metasploit-wrapup-12/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/21/how-security-teams-can-adovcate-for-resources/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/21/australian-privacy-amendment-notifiable-data-breaches-bill-2016/</loc>
        
        
            <lastmod>2017-09-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/20/introducing-web-server-agents/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/20/cisco-smart-install-exposure/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/19/whats-new-in-appspider-pro-7-0/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/18/pci-dss-dashboards-in-insightidr-new-pre-built-cards/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/15/metasploit-wrapup-11/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/14/united-summit-day-2/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/14/the-legal-perspective-of-a-data-breach/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/14/intelligence-driven-incident-response/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/14/data-mining-the-undiscovered-country/</loc>
        
        
            <lastmod>2018-01-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/14/aws-power-up-tag-import-asset-cleanup-assume-role-ad-hoc-scan/</loc>
        
        
            <lastmod>2017-09-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/13/united-summit-day-1/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/13/container-security-assessment-in-insightvm/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/12/patch-tuesday-september-2017/</loc>
        
        
            <lastmod>2017-09-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/12/keeping-it-simple-at-united/</loc>
        
        
            <lastmod>2017-09-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/08/to-compromise-instagram-accounts-just-ask/</loc>
        
        
            <lastmod>2020-01-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/07/measuring-sharknat-to-exposures/</loc>
        
        
            <lastmod>2017-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/06/apache-struts-s2-052-cve-2017-9805-what-you-need-to-know/</loc>
        
        
            <lastmod>2017-09-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/06/gdpr-or-gdp-argh-find-out-at-united/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/09/05/united-spotlight-industry-roundtables/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/31/cybersecurity-for-nafta/</loc>
        
        
            <lastmod>2017-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/28/rsa-rivest-shamir-and-adleman/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/28/des-data-encryption-standard/</loc>
        
        
            <lastmod>2019-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/25/gone-phishing-a-case-study-on-conducting-internal-phishing-campaigns/</loc>
        
        
            <lastmod>2017-09-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/24/the-next-generation-of-the-rapid7-community/</loc>
        
        
            <lastmod>2017-09-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/24/how-to-use-your-threat-model-as-a-guidepost-for-security/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/23/vulnerability-management-market-disruptors/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/22/r7-2017-07-multiple-fuze-tpn-handset-portal-vulnerabilities-fixed/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/21/survival-of-the-fastest-evolving-defenders-with-broad-security-automation/</loc>
        
        
            <lastmod>2017-09-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/18/metasploit-the-new-shiny/</loc>
        
        
            <lastmod>2017-09-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/18/an-open-letter-concerning-my-resignation-from-the-digital-economy-board-of-advisors/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/17/more-answers-less-query-language-bringing-visual-search-to-insightidr/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/17/youve-got-0-day/</loc>
        
        
            <lastmod>2017-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/15/top-reasons-for-graduate-students-to-attend-united/</loc>
        
        
            <lastmod>2019-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/11/metasploit-wrapup-9/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/10/hack-with-metasploit-announcing-the-united-2017-ctf/</loc>
        
        
            <lastmod>2017-09-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/09/why-is-cross-site-scripting-so-hard/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/09/how-to-prevent-xss-attacks/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/09/defender-spotlight-rebekah-brown-rapid7/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/09/remote-desktop-protocol-exposure/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/08/patch-tuesday-august-2017/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/08/unity-rapid7-com-community-logentries-blog-2017-08-08-announcing-the-new-log-search-ui-for-logentries/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/04/metasploit-wrapup-10/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/04/r7-2017-18-cve-2017-5245-logentries-windows-agent-uses-vulnerable-openssl-fixed/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/03/smbloris-what-you-need-to-know/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/08/02/rapid7-threat-report-q2-2017/</loc>
        
        
            <lastmod>2017-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/28/exploring-sha-1-secure-hash-algorithm/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/28/triple-des-3-des-network-encryptor/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/26/how-do-you-identify-zero-days-and-fileless-malware-download-the-ram/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/21/vm-automation-repository-released/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/20/building-a-car-hacking-development-workbench-part-3/</loc>
        
        
            <lastmod>2018-11-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/20/rapid7s-readout-on-server-ransomware-in-the-2017-cisco-midyear-cybersecurity-report/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/19/announcing-insightappsec-cloud-powered-application-security-testing/</loc>
        
        
            <lastmod>2017-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/18/the-future-of-komand-is-bright/</loc>
        
        
            <lastmod>2017-11-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/18/rapid7-acquires-komand-for-security-orchestration-and-automation/</loc>
        
        
            <lastmod>2018-06-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/18/insightvm-now-available-in-japan/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/17/building-a-car-hacking-development-workbench-part-2/</loc>
        
        
            <lastmod>2018-11-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/12/balancing-human-and-machine-input-in-information-security/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/12/patch-tuesday-july-2017/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/11/cleaning-house-maintaining-an-accurate-and-relevant-vulnerability-management-program/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/11/building-a-car-hacking-development-workbench-part-1/</loc>
        
        
            <lastmod>2018-11-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/09/knowing-dynamic-multipoint-virtual-private-network-dmvpn/</loc>
        
        
            <lastmod>2019-12-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/09/information-security-risk-management-cycle-overview/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/09/getting-started-with-group-encrypted-transport-virtual-private-network-getvpn/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/06/remediation-workflow-now-integrates-with-servicenow/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/06/soc-automation-best-practices/</loc>
        
        
            <lastmod>2018-09-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/07/05/running-an-effective-tabletop-exercise/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/30/metasploit-wrapup-8/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/30/how-to-install-and-configure-aide-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/30/how-to-install-and-configure-ossec-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/28/copyright-office-calls-for-new-cybersecurity-researcher-protections/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/28/petya-like-ransomworm-leveraging-insightvm-and-nexpose-for-visibility-into-ms17-010/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/27/10-steps-to-better-security-for-your-business/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/27/petya-ransomware-explained/</loc>
        
        
            <lastmod>2019-10-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/27/r7-2017-06-biscom-sftp-xss-cve-2017-5241/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/26/legislation-to-strengthen-iot-marketplace-transparency/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/24/setting-up-and-managing-a-bug-bounty-program/</loc>
        
        
            <lastmod>2017-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/24/how-to-install-and-use-psad-ids-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/24/how-to-install-and-configure-bro-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/24/how-to-install-and-configure-naxsi-firewall-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/24/information-security-risk-management-introduction/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/24/information-security-risk-management-tiered-approach-of-nist-sp-800-39/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/24/information-security-risk-management-cycle-context-establishment-phase/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/23/protecting-against-doublepulsar-infection-with-insightvm-and-nexpose/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/21/the-effective-components-of-security-orchestration/</loc>
        
        
            <lastmod>2018-09-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/21/in-fear-of-iot/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/19/what-is-bdd-testing-practical-examples-of-behavior-driven-development-testing/</loc>
        
        
            <lastmod>2017-11-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/19/5-ways-to-use-log-data-to-analyze-system-performance/</loc>
        
        
            <lastmod>2017-08-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/16/weekly-wrapup/</loc>
        
        
            <lastmod>2017-08-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/15/announcing-microsoft-azure-asset-discovery-in-insightvm/</loc>
        
        
            <lastmod>2019-10-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/15/rapid7-issues-comments-on-nafta-renegotiation/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/15/about-user-enumeration/</loc>
        
        
            <lastmod>2019-12-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/14/r7-2017-16-cve-2017-5244-lack-of-csrf-protection-for-stopping-tasks-in-metasploit-pro-express-and-community-editions-fixed/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/14/national-exposure-index-2017/</loc>
        
        
            <lastmod>2017-08-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/14/patch-tuesday-june-2017/</loc>
        
        
            <lastmod>2017-08-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/13/will-investing-in-security-orchestration-make-your-siem-obsolete/</loc>
        
        
            <lastmod>2018-09-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/13/live-threat-driven-prioritization/</loc>
        
        
            <lastmod>2017-08-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/13/why-you-have-to-move-beyond-we-have-a-policy-for-that/</loc>
        
        
            <lastmod>2017-08-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/12/wanna-see-wannacry-vulns-in-splunk/</loc>
        
        
            <lastmod>2017-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/09/collaborative-storytelling-at-rapid7/</loc>
        
        
            <lastmod>2017-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/08/3-reasons-not-to-be-dismissive-of-owasp-top-10s-insufficient-attack-prevention/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/07/wannacry-code-have-you-disabled-smbv1/</loc>
        
        
            <lastmod>2017-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/07/use-cases-for-security-chatops-automation/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/07/cfp-for-united-2017-yes-please/</loc>
        
        
            <lastmod>2017-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/06/better-credential-management-for-better-vulnerability-results/</loc>
        
        
            <lastmod>2017-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/06/the-cis-critical-controls-explained-control-8-malware-defenses/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/02/metasploit-wrapup/</loc>
        
        
            <lastmod>2017-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/01/security-nation-tas-giakouminakis-founder-of-rapid7/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/01/introducing-insightops-a-new-approach-to-it-monitoring-and-troubleshooting/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/01/trusting-agents-with-rust/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/06/01/live-dashboards-for-demonstrating-remediation-progress/</loc>
        
        
            <lastmod>2017-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/31/devops-vagrant-with-aws-ec2-digital-ocean/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/31/how-to-combine-d3-with-angularjs/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/31/security-orchestration-myths/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/31/r7-2017-13-nexpose-hardware-appliance-ssh-enabled-obsolete-algorithms-cve-2017-5243/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/31/r7-2017-05-centire-yopify-information-disclosure-cve-2017-3211/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/31/isoiec-27035-2-review-cont-incident-classification-and-legalregulatory-aspects/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/31/nist-sp-800-61-and-isoiec-27035-attempt-of-short-comparison/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/30/insightvm-nexpose-patch-tuesday-reporting/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/26/metasploit-wrapup-3/</loc>
        
        
            <lastmod>2017-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/25/patching-cve-2017-7494-in-samba-it-s-the-circle-of-life/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/25/scanning-and-remediating-samba-cve-2017-7494-in-insightvm-and-nexpose/</loc>
        
        
            <lastmod>2017-08-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/25/announcing-chatbot-response-prompts/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/24/emea-cybersecurity-event-calendars/</loc>
        
        
            <lastmod>2017-11-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/24/what-is-syslog/</loc>
        
        
            <lastmod>2019-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/24/what-are-javascript-source-maps/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/24/heroku-dynos-explained/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/24/modern-network-coverage-and-container-security-in-insightvm/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/24/active-vs-passive-server-monitoring/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/24/how-to-install-and-configure-tripwire-ids-on-centos-7/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/24/how-to-install-and-configure-csf-firewall-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/21/isoiec-27035-2-review-cont-improving-incident-response-plan-awarenesstraining-role/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/21/isoiec-27035-2-review-cont-sops-trust-and-the-incident-response-team/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/20/wannacry-scanning-reporting/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/20/metasploit-the-power-of-the-community-and-eternalblue/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/19/7-production-security-practices-that-spy-thrillers-got-right/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/18/recent-python-meterpreter-improvements/</loc>
        
        
            <lastmod>2021-01-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/18/security-automation/</loc>
        
        
            <lastmod>2018-09-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/18/the-cis-critical-controls-explained-control-7-email-and-web-browser-protection/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/17/rapid7-nexpose-virtual-appliance-duplicate-ssh-host-key-cve-2017-5242/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/17/r7-2016-23-r7-2016-26-r7-2016-27-multiple-home-security-vulnerabilities/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/17/scanning-and-remediating-wannacry-in-insightvm-and-nexpose/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/16/update-on-wannacry-vulnerable-smb-shares-are-widely-deployed-and-people-are-scanning-for-them/</loc>
        
        
            <lastmod>2019-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/16/top-threat-actors/</loc>
        
        
            <lastmod>2019-10-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/15/security-nation-wannacry-special-edition/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/15/using-threat-intelligence-to-mitigate-wanna-decryptor-wncry/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/15/exploitable-vulnerabilities-a-metasploit-nexpose-love-story/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/12/wanna-decryptor-wncry-ransomware-explained/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/12/white-house-cybersecurity-executive-order-summary/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/11/on-the-lookout-for-intel-amt-cve-2017-5689/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/11/discovery-of-assets-in-active-directory/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/10/simplifying-account-takeover-protection/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/10/the-real-cost-of-manual-security-operations/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/10/iot-testing-methodology/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/10/want-to-bolster-your-security-program-keep-users-from-making-decisions/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/10/patch-tuesday-may-2017/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/09/sonar-mo-data-mo-research/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/09/practical-vm-tips-for-the-shadow-brokers-leaked-exploits/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/08/simple-remediation-collaboration/</loc>
        
        
            <lastmod>2017-07-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/07/chatops-for-security-operations/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/05/metasploit-weekly-wrapup/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/05/verizon-data-breach-report-dbir-key-takeaways/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/04/how-to-with-tcell-clickjacking-protection/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/04/how-security-teams-can-effectively-combat-alert-fatigue/</loc>
        
        
            <lastmod>2018-09-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/03/honey-encryption-algorithms-security-combating-brute-force-attack/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/03/a-day-in-the-life-of-a-security-team/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/02/network-administrators-guide-to-surviving-an-audit-during-the-audit/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/05/02/r7-2017-03-improper-access-control-of-fuze-meeting-recordings-fixed/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/27/3-simple-ways-to-approach-content-security-policy/</loc>
        
        
            <lastmod>2019-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/27/detecting-unicode-domains-with-komand-security-orchestration-platform/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/26/asia-cybersecurity-event-calendar/</loc>
        
        
            <lastmod>2017-11-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/25/privacy-stack-to-protect-your-data/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/25/r7-2017-02-hyundai-blue-link-potential-info-disclosure-fixed/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/24/actionable-remediation-projects/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/21/the-cis-critical-security-controls-explained-control-6-maintenance-monitoring-and-analysis-of-audit-logs/</loc>
        
        
            <lastmod>2019-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/20/introduction-to-isoiec-27035-the-iso-standard-on-incident-handling/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/20/introduction-to-isoiec-27035-planning-for-and-detection-of-incidents/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/20/introduction-to-isoiec-27035-assessment-and-responding-to-incidents/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/20/introduction-to-isoiec-27035-more-details-on-part-2-of-the-standard/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/20/content-security-policy-newer-csp-directives-common-problems/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/20/metasploit-wrapup-2/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/20/live-monitoring-with-agents-for-linux-and-more/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/19/difference-between-a-soc-and-a-csirt/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/19/the-cis-critical-security-controls-series/</loc>
        
        
            <lastmod>2018-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/19/rapid7-urges-nist-and-ntia-to-promote-coordinated-disclosure-processes/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/18/the-shadow-brokers-leaked-exploits-faq/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/17/4-must-haves-to-bring-security-into-devops/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/14/logging-in-a-software-defined-network/</loc>
        
        
            <lastmod>2017-11-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/13/application-security-programs-hit-mainstream/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/13/3-steps-to-transform-your-security-operations-with-security-orchestration/</loc>
        
        
            <lastmod>2018-09-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/13/get-your-hacker-photo-taken-at-bsides-boston/</loc>
        
        
            <lastmod>2017-11-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/12/patch-tuesday-april-2017/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/11/nsightvm-analytics-driven-vulnerability-management-all-the-way-to-the-endpoint/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/11/close-the-vendor-vulnerability-gap-with-automation-powered-by-komand/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/09/advanced-encryption-standard-aes/</loc>
        
        
            <lastmod>2017-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/09/how-to-configure-modsecurity-with-apache-on-ubuntu-linux/</loc>
        
        
            <lastmod>2018-04-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/09/how-to-configure-modevasive-with-apache-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/09/exploring-encapsulating-security-payload-for-ipsec-technologies/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/09/authentication-header-ah-for-ipsec-technologies/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/06/habits-that-pay-off-for-programmers/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/06/intimate-thoughts-on-clickjacking-with-igor/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/06/get-to-fix-faster-targeted-vulnerability-remediation-solutions/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/04/rapid7-giving-back-to-the-community/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/04/how-security-orchestration-automation-fits-into-your-incident-response-plan/</loc>
        
        
            <lastmod>2018-09-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/03/introducing-rubysmb-the-protocol-library-nobody-else-wanted-to-write/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/03/legacy-apps-in-the-data-center-todays-apps-in-the-cloud/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/04/01/metasploit-redacted-edition/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/31/network-administrators-guide-to-surviving-an-audit-preparation/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/31/cisco-enable-privileged-exec-support/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/30/top-3-reasons-to-get-started-with-content-security-policy/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/30/our-favorite-komand-features/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/29/addressing-the-issue-of-misguided-security-spending/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/29/introducing-interactive-guides/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/28/investigating-our-technology-internet-of-things-or-internet-of-threats/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/27/r7-2015-28-multiple-eview-ev-07s-gps-tracker-vulnerabilities/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/24/metasploit-wrapup-4/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/24/the-cis-critical-security-controls-explained-control-5-controlled-use-of-administrative-privilege/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/23/whats-stopping-account-takeover/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/23/exploiting-macros-with-metasploit-pro-social-engineering/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/23/the-roi-of-security-orchestration-and-automation-white-paper/</loc>
        
        
            <lastmod>2018-06-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/21/combining-responder-and-psexec-for-internal-penetration-tests/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/21/responding-to-malware-events-on-windows-determining-if-the-threat-is-truly-gone/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/21/metasploits-rf-transceiver-capabilities/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/16/cybersecurity-exercises-benefits-and-practical-aspects-part-2-of-2/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/16/cybersecurity-exercises-benefits-and-practical-aspects-part-1-of-2/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/16/cybersecurity-information-sharing-european-perspective-part-2-of-2/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/16/cybersecurity-information-sharing-european-perspective-part-1-of-2/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/16/why-tcell/</loc>
        
        
            <lastmod>2019-07-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/16/the-cis-critical-security-controls-explained-control-4-continuous-vulnerability-assessment-remediation/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/15/metasploit-google-summer-of-code-and-you/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/15/using-web-spider-to-detect-vulnerable-apache-struts-apps-cve-2017-5638/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/15/update-tuesday-march-2017/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/14/how-to-onboard-and-train-your-security-team/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/14/making-particleio-photon-board-metasploit-compatible/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/13/r7-2017-01-multiple-vulnerabilities-in-double-robotics-telepresence-robot/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/11/how-a-simple-tweet-turned-into-a-custom-integration-in-less-than-24-hours/</loc>
        
        
            <lastmod>2017-11-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/10/log-analysis-for-system-troubleshooting/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/10/metasploit-weekly-wrapup-2/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/10/the-cis-critical-security-controls-explained-control-3-secure-configurations-for-hardware-software/</loc>
        
        
            <lastmod>2020-01-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/10/sybil-attacks-detection-and-prevention/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/09/security-nation-building-managing-or-hiring-a-soc-communicate/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/09/apache-jakarta-vulnerability-attacks-in-the-wild/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/08/attacking-microsoft-office-openoffice-with-metasploit-macro-exploits/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/08/whats-an-attack/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/08/welcome-to-the-cloud-what-happened-to-the-perimeter/</loc>
        
        
            <lastmod>2019-05-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/08/first-impressions-on-vault7/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/07/appspider-defend-protecting-your-apps-until-they-can-patched/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/07/security-orchestration-vs-security-automation/</loc>
        
        
            <lastmod>2018-06-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/03/security-nation-all-things-iot-from-creepy-to-cool/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/03/rsa-conference-2017-exhibits-is-your-artificial-intelligence-only-10/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/02/vulnerable-service-emulator/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/02/defender-spotlight-brian-castagna-information-security-leader/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/02/logging-for-fun-things-youd-never-thought-to-log/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/02/the-cis-critical-controls-explained-control-1-inventory-of-authorized-and-unauthorized-devices/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/28/building-a-cyber-security-plan-should-not-be-hard/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/24/cloudflare-data-leakage-or-dare-i-saycloudbleed/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/24/roots-and-culture-logging-and-the-telephone-bill/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/24/security-nation-the-rsa-recap-youve-always-wanted/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/23/detecting-sha-1-collisions-with-security-orchestration-and-automation/</loc>
        
        
            <lastmod>2017-11-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/23/weekly-metasploit-wrapup/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/23/object-comparison-in-react-js-components/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/23/the-cis-critical-controls-explained-control-2-inventory-of-authorized-and-unauthorized-software/</loc>
        
        
            <lastmod>2018-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/23/user-and-entity-behavior-analytics-a-strategic-primer/</loc>
        
        
            <lastmod>2019-09-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/23/preparing-for-gdpr/</loc>
        
        
            <lastmod>2017-11-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/23/vulnerability-management-best-practices/</loc>
        
        
            <lastmod>2020-04-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/22/incident-investigation-its-all-about-context/</loc>
        
        
            <lastmod>2017-11-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/22/iot-friend-or-foe/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/21/automated-cybersecurity-information-sharing-cisa-ais/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/21/nist-sp-800-61-information-sharing/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/21/suricata-overview/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/16/preparation-phase-of-incident-response-life-cycle-of-nist-sp-800-61/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/16/enabling-security-chatops-with-security-orchestration-and-automation/</loc>
        
        
            <lastmod>2018-06-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/16/the-team-cymru-malware-hash-registry/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/15/how-to-get-buy-in-from-the-organization-for-a-new-security-product/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/14/february-2017-patch-tuesday-delayed/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/14/how-to-configure-a-basic-ipsec-tunnel/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/14/how-to-install-suricata-nids-on-ubuntu-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/13/how-to-protect-ssh-and-apache-using-fail2ban-on-ubuntu-linux/</loc>
        
        
            <lastmod>2019-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/13/detection-and-analysis-phase-of-incident-response-life-cycle-of-nist-sp-800-61/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/13/understanding-gre-22/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/13/basics-of-ipsec/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/13/infosec-valentines/</loc>
        
        
            <lastmod>2017-11-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/10/cve-2017-3823-remote-code-execution-vulnerability-in-cisco-webex-browser-plugin/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/09/metasploit-framework-valentines-update/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/09/losing-my-hair-at-rsa-conference-on-purpose-and-for-a-great-cause/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/09/never-type-a-search-query-again/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/09/defender-spotlight-scott-j-roberts-security-operations-manager/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/08/prove-yourself-at-the-bsideslv-proving-grounds/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/08/under-the-hoodie-actionable-research-from-penetration-testing-engagements/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/08/car-hacking-on-the-cheap/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/07/security-nation-why-pen-testing-and-being-flexible-are-two-sides-of-the-same-coin/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/07/managing-third-party-vulnerabilities-with-security-orchestration-and-automation/</loc>
        
        
            <lastmod>2017-11-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/06/a-reminder-about-upcoming-microsoft-vulnerability-content-changes/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/06/on-air-broadcasting-insecurity/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/06/how-mathematics-improve-incident-detection-and-investigation-and-why-math-alone-is-not-enough/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/06/finalists-in-five-categories-at-the-network-computing-awards/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/03/getting-the-most-value-out-of-your-security-products/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/02/rapid7s-position-on-the-us-executive-order-on-immigration/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/02/02/exiting-the-matrix/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/31/fine-tuning-your-intrusion-detection-system-to-minimize-false-positive-alerts/</loc>
        
        
            <lastmod>2017-11-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/30/the-ransomware-chronicles-a-devops-survival-guide/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/30/understanding-gre/</loc>
        
        
            <lastmod>2019-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/27/5-rules-of-pair-programming-etiquette/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/27/weekly-metasploit-wrapup-2/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/26/how-to-automate-response-to-endpoint-threats-with-sysdig-falco-splunk-duo-and-komand/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/26/security-nation-the-passion-of-security-pros-is-undeniable/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/25/scan-configuration-improvements-in-nexpose/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/25/two-factor-authentication-methods-and-technologies/</loc>
        
        
            <lastmod>2017-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/25/the-most-repetitive-tasks-security-analysts-perform/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/20/security-nation-uba-ueba-and-suba-oh-my/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/19/introducing-komands-security-orchestration-and-automation-platform/</loc>
        
        
            <lastmod>2018-06-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/19/3-predictions-for-development-in-the-age-of-serverless-computing/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/19/london-infosec-assemble-join-us-for-a-securitytalk-breakfast-briefing/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/18/nexpose-under-the-hood/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/17/are-you-ready-for-security-orchestration-and-automation/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/13/java-8-lazy-argument-evaluation/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/11/the-pros-cons-of-intrusion-detection-systems/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/11/how-to-install-snort-nids-on-ubuntu-linux/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/11/introduction-to-incident-response-life-cycle-of-nist-sp-800-61/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/11/recommendations-for-incident-response-team-included-in-nist-special-publication-800-61/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/11/understanding-access-control-lists/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/10/patch-tuesday-january-2017/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/10/10-ways-to-make-your-security-posture-more-proactive/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/10/creating-trustworthy-user-experience/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/09/breaking-metasploitable3-the-king-of-clubs/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/08/how-to-install-openvpn-on-linux/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/06/3-things-we-learned-from-the-joint-analysis-report/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/05/4-ways-security-analysts-can-boost-productivity/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/05/12-days-of-haxmas-meterpreters-new-shiny-for-2016/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/05/12-days-of-haxmas-the-gift-of-endpoint-visibility-and-log-analytics/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/05/all-your-base64-are-belong-to-us/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/04/an-in-depth-look-at-when-and-how-to-set-up-a-soc-slideshare/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/04/new-years-resolutions-for-the-threat-intelligence-analyst/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/03/introduction-to-blockchain/</loc>
        
        
            <lastmod>2017-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/03/metasploitable3-ctf-results-and-wrap-up/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/03/12-days-of-haxmas-giving-the-gift-of-bad-news/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/02/12-days-of-haxmas-giving-rapid7-customers-a-way-to-share-their-voice/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2017/01/01/metasploit-framework-2016-overview/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/31/12-days-of-haxmas-year-end-policy-comment-roundup/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/30/a-year-in-review-our-top-5-komand-tech-blog-posts-in-2016/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/30/12-days-of-haxmas-a-haxmas-carol/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/29/macos-agent-in-nexpose-now/</loc>
        
        
            <lastmod>2017-08-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/29/a-year-in-review-our-top-7-security-operations-blog-posts-in-2016/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/29/logs-to-understand-user-activity-and-behavior/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/29/a-friendly-fireside-foray-into-a-firefox-fracas/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/28/vote-for-rapid7-products-services-and-people-at-the-2017-cybersecurity-excellence-awards/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/28/12-days-of-haxmas-designing-information-security-applications-your-way/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/27/12-days-of-haxmas-rudolph-the-machine-learning-reindeer/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/26/2016-iot-research-recap/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/25/the-one-present-your-jewish-data-scientist-wants-this-holiday-season/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/25/the-twelve-pains-of-infosec/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/23/the-value-of-correlation-ids/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/21/a-recap-of-the-inaugural-komand-demo-webinar-video-included/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/21/siem-isn-t-dead-it-s-just-shedding-some-extra-pounds/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/21/happy-holidays-from-rapid7/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/20/cybersecurity-careers-and-the-certifications-needed/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/20/2017-cybersecurity-horoscopes/</loc>
        
        
            <lastmod>2017-08-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/19/giving-the-gift-of-time-nexpose-adaptive-security-improvements/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/16/security-nation-what-pen-testing-teaches-you-for-40-years-strong/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/16/weekly-metasploit-wrapup-3/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/15/vulnerability-categories-and-severity-levels-informational-vulnerabilities-vs-true-vulnerabilities/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/15/research-report-vulnerability-disclosure-survey-results/</loc>
        
        
            <lastmod>2017-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/15/inspecting-network-traffic-with-tcpdump/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/15/how-to-install-openvpn-on-windows/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/14/webshells-101/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/14/metasploitable3-ctf-competition-update/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/13/the-generosity-of-thought-caring-and-sharing-in-the-open-source-community/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/13/patch-tuesday-december-2016/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/13/the-three-steps-for-effective-information-security-event-triage/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/09/burp-series-intercepting-and-modifying-made-easy/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/09/metasploit-wrapup-5/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/09/how-to-render-components-outside-the-main-react-app/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/09/understanding-and-configuring-snort-rules/</loc>
        
        
            <lastmod>2020-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/08/dimensional-data-warehouse-and-reporting-data-model-whats-the-difference/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/08/why-security-assessments-are-often-not-a-true-reflection-of-reality/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/07/solving-the-expression-problem/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/07/iot-usability-vs-security/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/07/metasploitable3-capture-the-flags-competition/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/06/introduction-to-honeypots/</loc>
        
        
            <lastmod>2017-12-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/06/how-to-make-your-security-operations-center-more-efficient/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/02/vulnerability-management-live-assessment-and-the-passive-scanning-trap/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/02/metasploit-wrapup-6/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/12/02/nexpose-reports-the-right-tool-for-the-right-job/</loc>
        
        
            <lastmod>2017-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/30/early-warning-detectors-using-aws-access-keys-honeytokens/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/30/announcing-insightops-pioneering-endpoint-visibility-and-log-analytics/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/29/on-the-recent-dsl-modem-vulnerabilities/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/29/how-to-make-your-security-response-process-more-proactive/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/29/deception-technology-can-it-detect-intruders-earlier-in-their-attack-chain/</loc>
        
        
            <lastmod>2019-04-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/28/never-fear-vulnerability-disclosure-is-here/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/24/dimensional-data-warehouse-export-part-of-nexpose-646/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/23/thanks-and-giving-rapid7givesback/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/23/unitedsummit-2016-an-attendees-perspective/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/22/3-signals-your-security-workflows-are-inefficient/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/22/how-to-use-openvas-to-audit-the-security-of-your-network-22/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/22/opportunity-now-means-success-later-qa-with-rapid7-sales/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/21/node-js-as-a-proxy-to-logentries-com/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/21/announcing-the-inaugural-komand-demo-webinar/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/21/building-personalized-and-exceptional-customer-experiences/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/21/intel-security-focus-16-recap-of-a-great-conference/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/19/security-nation-partnerships-in-security/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/18/metasploit-wrapup-7/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/18/joining-a-startup-with-an-industry-leader/</loc>
        
        
            <lastmod>2017-07-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/18/signal-to-noise-in-internet-scanning-research/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/17/troubleshoot-slow-network-issues/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/17/security-nation-automotive-hacking-in-a-connected-world/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/17/introspective-intelligence-what-makes-your-network-tick-what-makes-it-sick/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/17/the-internet-of-gas-station-tank-gauges-take-3/</loc>
        
        
            <lastmod>2017-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/16/how-do-you-incorporate-threat-intelligence-in-your-infosec-strategy/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/16/introspective-intelligence-understanding-detections/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/15/a-guide-on-security-automation-best-practices-ebook-included/</loc>
        
        
            <lastmod>2020-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/15/the-data-science-process-at-rapid7/</loc>
        
        
            <lastmod>2017-09-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/15/test-your-might-with-the-shiny-new-metasploitable3/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/15/r7-2016-24-opennms-stored-xss-via-snmp-cve-2016-6555-cve-2016-6556/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/14/goodbye-to-the-vcr-rewinding-down-memory-lane/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/11/synergistically-yours-iot-security-usability/</loc>
        
        
            <lastmod>2017-07-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/10/conflicting-perspectives-on-the-tls-13-draft/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/10/monitor-network-traffic/</loc>
        
        
            <lastmod>2021-03-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/09/unitedsummit-2016-empowerment/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/09/using-cis-controls-to-stop-your-network-from-falling-in-with-the-wrong-crowd/</loc>
        
        
            <lastmod>2017-07-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/08/project-sonar-study-of-ldap-on-the-internet/</loc>
        
        
            <lastmod>2017-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/08/patch-tuesday-november-2016/</loc>
        
        
            <lastmod>2017-07-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/08/election-day-tracking-the-mirai-botnet/</loc>
        
        
            <lastmod>2017-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/08/the-5-security-processes-that-should-be-automated/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/08/how-to-use-openvas-to-audit-the-security-of-your-network-12/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/07/a-very-predictable-vulnerability-on-most-networks-are-you-looking-for-it/</loc>
        
        
            <lastmod>2017-07-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/07/bug-not-alert-how-application-security-must-use-different-words/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/04/unitedsummit-2016-day-2-recap/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/03/widely-used-android-app-leaks-ms-exchange-credentials/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/03/unitedsummit-2016-day-1-recap/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/02/cross-cloud-adversary-analytics/</loc>
        
        
            <lastmod>2017-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/02/rapid7-rapid-fire-at-united-summit-a-spirited-debate/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/01/all-the-moving-things/</loc>
        
        
            <lastmod>2017-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/01/security-workflows-automation/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/01/research-lead-iot/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/11/01/so-there-s-this-thing/</loc>
        
        
            <lastmod>2017-07-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/31/whats-the-root-cause-of-your-security-challenges/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/31/understanding-udp-amplification-vulnerabilities-through-rapid7-research/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/28/security-nation-deception-inception-llc/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/28/ure-advice-for-researchers/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/28/weekly-metasploit-wrapup-4/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/28/now-were-talking-nexpose-and-dxl-integration/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/28/top-5-questions-from-the-october-walkthrough-webinar/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/27/a-recap-of-bsides-dc-2016-security-for-everyone/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/27/empowering-leexportpy-with-new-services/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/27/publishing-nexpose-identified-risk-scores-on-assets-to-epo/</loc>
        
        
            <lastmod>2017-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/26/avoiding-default-fail/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/26/discovery-of-epo-assets-in-nexpose/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/26/the-danger-of-criminalizing-curiosity/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/26/stop-collaborate-and-listen-and-think-and-connect/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/25/nexpose-integrates-with-mcafee-epo-and-dxl-the-first-unified-vulnerability-management-solution-for-intel-security-customers/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/25/mirai-faq-when-iot-attacks/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/24/respecting-employee-privacy-when-deploying-user-behavior-analytics/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/21/security-nation-detections-deceptions-and-analytics-by-any-other-name/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/21/checks-and-balances-asset-vulnerability-management/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/20/defender-spotlight-mike-downey-security-analyst/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/20/overcome-nephophobia-dont-be-a-shadow-it-ostrich/</loc>
        
        
            <lastmod>2019-10-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/19/displace-siem-rules-built-for-machines-with-custom-alerts-built-for-humans/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/19/analytics-by-any-other-name-new-insightidr-detections-released/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/19/you-should-use-a-password-manager/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/19/what-is-penetration-testing/</loc>
        
        
            <lastmod>2018-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/19/how-to-fail-successfully/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/19/overview-of-online-algorithm-using-standard-deviation-example/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/19/insider-threats-for-seo/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/18/resolving-headaches-by-nexpose-insightidr/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/17/nexpose-starter-tips-creating-your-first-scan/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/14/ncsam-independent-research-and-iot/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/13/podcast-security-industry-best-practices-from-sans-to-fud/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/13/a-guide-on-how-to-create-security-processes-to-solve-practical-problems-ebook-included/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/12/logging-owntracks-to-logentries/</loc>
        
        
            <lastmod>2019-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/12/webcast-summary-demanding-more-from-your-siem/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/11/patch-tuesday-october-2016/</loc>
        
        
            <lastmod>2017-07-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/11/pokemon-go-security-and-obsolescence/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/11/r7-2016-21-nine-folders-certificate-validation-vulnerability-cve-2016-2533/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/07/weekly-metasploit-wrapup-7/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/07/logging-mosquitto-server-logs-from-raspberry-pi-to-logentries/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/06/sales-and-security-buyers-a-love-story/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/06/rapid7-on-top-in-sans-critical-security-controls/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/06/how-security-automation-saves-up-to-83-precent-of-time-spent-investigating-alerts/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/05/new-and-improved-policy-manager/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/04/were-sponsoring-bsides-dc-2016/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/03/cybersecurity-awareness-month-2016-this-ones-for-the-researchers/</loc>
        
        
            <lastmod>2020-07-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/10/03/cross-site-scripting-xss-attacks/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/30/weekly-metasploit-wrapup-9/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/29/using-event-and-log-data-to-assure-security-and-compliance/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/29/simplifying-big-data-within-information-security-applications/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/29/security-nation-how-to-build-and-lead-a-security-team/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/29/looking-for-a-managed-detection-response-provider-you-ll-need-these-38-evaluation-questions/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/29/defender-spotlight-mike-arpaia-kolide/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/28/live-monitoring-for-endpoints/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/28/vulnerability-remediation-with-nexpose/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/28/united-2016-want-to-share-your-experience/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/27/an-analytic-response-to-advanced-threats-malware/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/27/how-security-orchestration-optimizes-time-to-response-in-enterprise-security-operations/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/27/sql-injection-attacks/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/26/hacking-cars-is-sexy/</loc>
        
        
            <lastmod>2017-07-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/22/insightidr-nexpose-integrate-for-total-user-asset-security-visibility/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/21/rapid7-supports-researcher-protections-in-michigan-law/</loc>
        
        
            <lastmod>2020-07-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/21/the-komand-tech-stack-why-we-chose-our-technology/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/19/important-security-fixes-in-metasploit-4120-2016091401/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/19/hacking-the-election-what-to-expect/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/16/weekly-metasploit-wrapup-12/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/15/moving-away-from-mvc/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/15/remediating-the-cisco-extrabacon-vulnerability-cve-2016-6366-with-nexpose/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/15/security-nation-security-products-vs-services/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/15/microservices-please-dont/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/14/malware-attack-vectors/</loc>
        
        
            <lastmod>2017-12-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/13/patch-tuesday-september-2016/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/13/stronger-together-why-sharing-security-processes-matters/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/12/3-ways-for-generating-reports-on-wan-bandwidth-utilization/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/09/managing-asset-exclusion-avoiding-blind-spots/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/08/avoid-these-things-when-logging-from-your-application/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/08/react-for-back-end-devs-parallels-between-react-and-object-oriented-programming/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/08/security-nation-raise-a-glass-to-liberty-wines/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/07/how-to-hire-a-strong-and-effective-security-team-free-ebook/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/07/multiple-disclosures-for-multiple-network-management-systems-part-2/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/07/phishing-can-training-prevent-it/</loc>
        
        
            <lastmod>2018-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/06/sonar-netbios-name-service-study/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/06/bringing-home-the-extrabacon/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/02/weekly-metasploit-wrapup-13/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/02/security-nation-the-week-in-breaches/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/02/r7-2016-19-persistent-xss-via-unescaped-parameters-in-swagger-ui/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/01/siems-dont-detect-attacks-advanced-analysis-does/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/01/think-like-an-attacker-in-vulnerability-management-d-c3-a9j-c3-a0-vu-all-over-again/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/01/designing-data-access-object-dao-layer/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/01/from-crisis-to-confidence-in-only-hours-how-rapid7-became-our-security-sommelier/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/01/how-cybersecurity-can-benefit-from-an-open-source-mentality/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/09/01/800m-credentials-were-exposed-last-week-did-you-hear-it/</loc>
        
        
            <lastmod>2018-05-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/31/ossec-series-configuration-pitfalls/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/31/the-one-aspect-of-selling-security-that-you-don-t-want-to-miss/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/31/credential-status-in-reporting-data-model/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/31/log-search-simplified-for-non-techs/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/31/ux-research-steps-methodologies-to-inform-product-redesign/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/31/get-your-work-done-even-faster-with-the-logentries-rest-api/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/31/secure-password-storage-in-web-apps/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/30/user-cons-the-celebrities-amongst-us/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/30/5-reasons-companies-are-losing-security-talent-and-what-to-do/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/29/the-calm-heroes-fighting-cyber-crime/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/25/implementing-filtering-automated-decisions-with-pegjs-react-mentions/</loc>
        
        
            <lastmod>2017-11-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/25/security-nation-talking-security-across-the-organization/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/24/hashing-infrastructures/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/23/how-to-convince-security-leadership-to-adopt-a-modern-approach-to-security/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/23/real-time-discussion-on-real-time-security/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/22/disaster-preparedness-its-not-thought-of-until-it-is-needed-most/</loc>
        
        
            <lastmod>2017-07-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/22/logging-the-lights-in-your-home/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/19/are-your-employees-really-out-to-ruin-your-business/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/19/10-years-later-what-have-we-learned-about-incident-response/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/18/security-nation-bob-rudis-on-data-science-whats-buzz-and-whats-real/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/18/state-of-cyber-threat-intelligence/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/18/defining-the-roles-responsibilities-of-your-security-team/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/16/nexpose-now-notes-august-2016/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/16/does-security-automation-mean-soc-employees-will-be-obsolete/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/15/qa-user-behavior-analytics-as-easy-as-abc-webcast/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/15/smb-security-is-so-simple-take-advantage-of-it-now/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/12/metasploit-weekly-wrapup-3/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/12/security-nation-recapping-black-hat-2016/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/12/using-log-data-as-forensic-evidence/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/11/4-potential-security-issues-raised-by-pokemon-go/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/11/nist-800-53-control-mappings-in-sql-query-export/</loc>
        
        
            <lastmod>2018-03-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/10/disrupt-the-attack-chain-with-rapid7/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/10/a-framework-for-selecting-and-implementing-security-tools-today/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/10/patch-tuesday-august-2016/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/05/some-of-our-favorite-baddefconadvice-tweets/</loc>
        
        
            <lastmod>2017-12-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/05/nexpose-logging-analytics-using-logentries/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/04/build-a-simple-cli-tool-with-golang/</loc>
        
        
            <lastmod>2020-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/04/3-ways-to-improve-your-code-testing/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/02/bro-series-the-programming-language/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/02/automate-user-provisioning-and-deprovisioning-with-security-orchestration/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/08/02/black-hat-2016-introducing-the-rapid7-moose-and-a-twitter-contest/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/29/why-i-joined-rapid7/</loc>
        
        
            <lastmod>2019-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/29/pentesting-in-the-real-world-local-file-inclusion-with-windows-server-files/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/29/integrating-logentries-with-opsgenie-3-easy-steps/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/28/defender-spotlight-april-c-wright-of-verizon/</loc>
        
        
            <lastmod>2017-12-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/28/web-application-security-testing-single-page-applications-built-with-javascript-frameworks/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/28/pentesting-in-the-real-world-going-bananas-with-mongodb/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/28/exporting-logentries-data-with-leexportpy/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/28/security-nation-security-is-a-global-concern/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/27/appspider-application-security-scanning-solution-deepens-support-for-single-page-applications-reactjs/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/27/pentesting-in-the-real-world-group-policy-pwnage/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/27/what-exactly-is-an-event-loop/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/27/united-security-summit-the-research-track/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/26/how-security-orchestration-can-stop-insider-and-outsider-attacks/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/26/capturing-credentials-on-an-internal-network/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/26/introduction-to-the-logentries-command-line-interface/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/26/r7-2016-10-multiple-osram-sylvania-osram-lightify-vulnerabilities-cve-2016-5051-through-5059/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/25/pentesting-in-the-real-world-gathering-the-right-intel/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/22/using-logentries-with-angular-v1-5/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/22/weekly-metasploit-wrapup-6/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/21/from-the-trenches-breaches-stories-simple-security-solutions-from-macadmins-at-psu/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/20/how-to-build-a-free-open-source-cybersecurity-arsenal/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/19/top-5-questions-from-the-july-walkthrough-webinar/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/19/taking-the-work-out-of-bug-reports/</loc>
        
        
            <lastmod>2017-12-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/18/i-have-ransomware-and-i-didn-t-back-up-what-do-i-do-now/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/18/better-faster-stronger-nexpose-scan-times-improved-by-over-10x/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/15/passwords-and-the-devolution-of-computer-users/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/14/rest-api-a-little-curl-and-some-python/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/14/security-nation-the-state-of-threat-intel/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/13/quick-security-wins-in-golang/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/13/backup-log-checks-and-what-they-can-tell-you/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/13/r7-2016-08-seeking-alpha-mobile-app-unencrypted-sensitive-information-disclosure/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/12/update-tuesday-july-2016/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/12/guide-to-defending-pokemon-go-gyms/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/12/keep-your-code-clean-while-logging/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/11/local-cybersecurity-meetups-near-you/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/08/weekly-metasploit-wrapup-11/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/08/honing-your-application-security-chops-on-devsecops/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/07/rsyslog-tcpip-log-forwarding-to-logentries-with-netscaler/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/07/the-importance-of-investing-in-people-before-tools-in-cybersecurity/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/06/introducing-leql-limit/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/06/announcement-end-of-life-metasploit-32-bit-versions/</loc>
        
        
            <lastmod>2019-01-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/05/introduction-to-leexportpy/</loc>
        
        
            <lastmod>2017-11-14</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/05/getting-more-out-of-nexpose-policy-reports/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/07/01/prepare-yourself-for-ransomware-no-more-snake-oil-please/</loc>
        
        
            <lastmod>2017-07-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/30/self-describing-logging-using-log4j/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/30/understanding-ransomware/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/29/4-experts-explain-the-best-strategies-for-a-successful-security-operations-center/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/29/how-audit-logs-help-confirm-and-correct-security-policy/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/28/signal-and-noise-the-best-of-all-worlds-for-logging/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/28/digging-for-clamavs-with-project-sonar/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/27/what-is-the-internet-of-things-the-current-struggle-with-the-definition-of-iot/</loc>
        
        
            <lastmod>2017-07-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/27/aws-series-creating-a-privoxy-tor-instance/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/25/aws-series-openswan-l2tp-over-ipsec-vpn-configuration/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/24/bro-series-creating-a-bro-cluster/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/23/playing-hide-and-seek-3-unseen-costs-in-your-siem-products/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/23/penetration-testing-vs-red-teaming-the-age-old-debate-of-pirates-vs-ninja-continues/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/23/defender-spotlight-will-lefevers-of-cybereason/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/23/ssh-from-the-ground-up/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/23/r7-2016-06-remote-code-execution-via-swagger-parameter-injection-cve-2016-5641/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/22/us-cybersecurity-events-you-need-to-know-about-free-shared-google-calendar/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/22/vulnerability-regression-monitoring-with-nexpose/</loc>
        
        
            <lastmod>2017-07-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/22/migrating-a-web-app-to-angular/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/22/seven-ways-insightidr-helps-maintain-pci-compliance/</loc>
        
        
            <lastmod>2019-07-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/21/a-layered-approach-to-handling-phishing-attacks/</loc>
        
        
            <lastmod>2017-12-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/21/webinar-recap-tableau-server-log-analytics/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/17/defender-spotlight-ryan-huber-of-slack/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/16/monitoring-sns-activity-using-a-lambda-function-and-logentries/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/16/weekly-metasploit-wrapup-14/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/16/security-nation-moving-beyond-siem-or-not/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/15/checking-ad-security-and-integrity-via-log-monitoring/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/15/what-is-network-intrusion-detection-prevention/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/15/gdb-for-fun-and-profit/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/15/adobe-flash-cve-2016-4171-patch-tomorrow/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/14/update-tuesday-june-2016/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/14/who-are-your-heroes-and-why/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/14/exploiting-zookeeper-for-managing-processes-in-a-production-environment-with-lockex/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/14/united-keynote-announcement/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/14/asa-hack/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/14/how-to-create-a-culture-of-security-ownership-across-your-organization/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/13/security-nation-building-accelerating-and-measuring-an-incident-response-program/</loc>
        
        
            <lastmod>2021-04-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/10/top-5-questions-from-the-june-walkthrough-webinar/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/09/trip-report-techno-security-forensics-investigations-conference/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/09/defender-spotlight-mandy-cunningham-of-ge/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/08/introducing-leql-bytes/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/08/millennials-are-insecure/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/07/a-different-way-to-log-your-website-usage/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/07/how-to-structure-a-security-operations-center/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/07/vulnerability-management-needs-to-stop-slowing-security-improvement/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/07/nexpose-now-because-security-doesnt-wait/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/07/rapid7-releases-new-research/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/06/introduction-to-sysdig-falco/</loc>
        
        
            <lastmod>2017-12-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/03/weekly-metasploit-wrapup-16/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/03/defender-spotlight-ben-hughes-of-etsy/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/02/working-with-bro-logs-queries-by-example/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/02/nagios-series-configuration-tips-and-tricks-shell-edition/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/01/if-employee-passwords-get-compromised-by-third-party-breach-does-your-system-make-a-sound/</loc>
        
        
            <lastmod>2017-07-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/01/tableau-server-log-analytics-easily-monitor-your-data-analytics-stack/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/06/01/to-soc-or-not-to-soc-when-to-set-up-a-security-operations-center/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/31/logging-for-continuous-integration/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/31/nagios-series-deployment-automation-tips-and-tricks/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/31/targeted-analysis-default-accounts/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/30/webinar-recap-how-to-easily-send-and-use-your-iot-data-in-the-cloud/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/27/integrating-logentries-with-net-the-how-and-why/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/27/revoking-and-pinning-certificate-authorities-in-windows/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/27/industry-roundtables-are-coming-back-to-united/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/26/impact-driven-risk-analysis/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/26/defender-spotlight-paul-halliday-of-critical-stack/</loc>
        
        
            <lastmod>2017-12-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/25/compromised-credentials-have-a-high-roi-for-attackers/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/25/attackers-take-advantage-of-the-options-you-give-them-malware-vs-credentials/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/25/building-svg-maps-with-react/</loc>
        
        
            <lastmod>2017-12-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/24/intrinsically-fast-more-jvm-performance-tinkering/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/24/6-signals-your-security-processes-arent-working/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/23/now-available-rest-query-api/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/23/detecting-stolen-credentials-requires-endpoint-monitoring/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/23/applying-poker-theory-to-incident-detection-response/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/20/weekly-metasploit-wrapup-19/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/20/scaling-under-pressure-5-focus-areas-for-ta-leaders/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/19/implementing-self-describing-log-data-using-nodejs/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/19/defender-spotlight-david-bianco-security-technologist-sqrrl/</loc>
        
        
            <lastmod>2017-12-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/19/pimp-my-application-security-scanner-appspider-reports-go-chrome/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/18/automating-my-restful-web-services-scanning-finally/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/18/how-to-send-logentries-alerts-to-bigpanda/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/18/rapid7-sponsors-tech-for-troops-hacking-convention/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/18/451-research-reviews-rapid7-insightidr-blazing-new-trails-for-corporate-security/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/18/general-mcchrystal-to-speak-at-united/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/18/nagios-series-dns-resiliency/</loc>
        
        
            <lastmod>2017-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/17/raspberry-pi-logs-and-iot-sending-pi-log-and-sensor-data-to-logentries/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/16/rapid7s-data-science-team-live-from-source-boston/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/16/methods-for-detecting-ransomware-activity/</loc>
        
        
            <lastmod>2020-05-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/13/attackers-prey-on-incident-response-bottlenecks/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/12/stop-underestimating-attackers-to-lower-their-success-rates/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/12/why-flexible-analytics-solutions-can-help-your-incident-response-team/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/12/getting-a-handle-on-the-internet-of-things-in-the-enterprise/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/12/application-security-lessons-learned-from-the-2016-dbir/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/12/webinar-how-to-easily-send-and-use-your-iot-data-in-the-cloud/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/12/defender-spotlight-jon-schipp-of-opennsm-and-now-komand/</loc>
        
        
            <lastmod>2017-12-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/11/weekly-metasploit-wrapup-22/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/11/update-tuesday-may-2016/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/11/a-query-language-for-your-logs/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/10/attackers-have-luck-on-their-side-prevention-is-not-enough/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/10/you-need-to-understand-lateral-movement-to-detect-more-attacks/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/10/2016-verizon-data-breach-report-vulnerability-management-takeaways/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/10/the-soc-of-the-future-predictions-from-the-front-line/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/10/why-are-siems-so-hard/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/10/integrating-the-logentries-javascript-library-with-react/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/10/metasploit-t-shirt-design-contest-2016/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/09/incident-detection-needs-to-account-for-disruptive-technologies/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/09/introduction-to-osquery-for-threat-detection-dfir/</loc>
        
        
            <lastmod>2017-12-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/06/leverage-attackers-need-to-explore-for-detection/</loc>
        
        
            <lastmod>2020-04-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/06/attackers-thrive-on-chaos-dont-be-blind-to-it/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/06/people-and-process-are-keys-to-compliance-tech-simply-must-make-them-both-more-efficient/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/05/insider-threat-or-intruder-effective-detection-doesnt-care/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/05/enterprise-account-takeover-the-moment-intruders-become-insiders/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/05/are-social-attacks-that-much-easier-to-use-or-is-it-the-technology-gap-of-exploitation-engines-that-make-social-attacks-more-appealing/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/05/snmp-data-harvesting-during-penetration-testing/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/05/on-imagetragick-cve-2016-3714/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/05/logs-for-seo/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/04/let-s-get-back-to-the-basics-folks/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/04/queuing-tasks-with-redis/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/03/positive-secondary-effects-incident-response-teams-benefit-from-cloud-applications/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/03/catching-stealthy-attackers-detecting-log-deletion-and-brand-new-phishing-domains/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/03/when-your-siem-tools-are-not-enough/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/03/3-web-app-sec-ian-takeaways-from-the-2016-dbir/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/03/6-lessons-i-learned-from-working-in-a-soc/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/03/the-power-of-iot-with-a-query-language/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/02/alert-fatigue-incident-response-teams-stop-listening-to-monitoring-solutions/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/02/detecting-intruders-using-credentials-lateral-movement-is-not-just-for-t3h-1337-h4x02/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/05/02/web-application-security-insights-from-the-2016-verizon-dbir/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/29/detect-corporate-identity-theft-with-a-new-intruder-trap-honey-credentials/</loc>
        
        
            <lastmod>2017-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/29/the-2016-verizon-data-breach-investigations-report-the-defenders-perspective/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/28/insightidr-detects-unknown-spear-phishing-attacks/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/28/chr-hansen-chooses-insightuba-to-better-detect-investigate-malicious-behavior/</loc>
        
        
            <lastmod>2017-07-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/28/why-do-we-keep-forcing-short-term-password-changes/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/27/weekly-metasploit-wrapup-5/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/27/how-to-ensure-self-describing-log-data-using-log4net/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/26/the-insight-platform-goes-to-europe-now-compliant-with-european-data-hosting-requirement/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/26/redner-s-markets-selects-nexpose-insightuba-for-compliance-and-incident-detection/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/26/designing-authentication/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/25/sc-magazine-reviews-insightuba-should-have-known-rapid7-would-get-into-active-detection-game/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/25/15-events-to-log-for-better-devops/</loc>
        
        
            <lastmod>2018-01-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/21/nexpose-content-release-cadence/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/21/weekly-metasploit-wrapup-8/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/20/using-the-national-vunerability-database-to-reveal-vulnerability-trends-over-time/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/20/using-javascript-to-interact-with-the-rest-query-api/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/19/attackers-love-when-you-stop-watching-your-endpoints-even-for-a-minute/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/19/how-to-send-sms-messages-to-logentries-in-under-5-minutes/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/18/adaptive-security-new-rapid7-critical-vulnerability-category/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/18/job-seekers-advice-on-long-term-career-planning/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/18/the-case-for-applying-ifttt-thinking-to-security-operations/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/15/weekly-metasploit-wrapup-10/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/15/7-reasons-rapid7-is-a-great-place-to-start-your-career/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/15/coming-to-united-sign-up-for-an-intensive/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/13/sometimes-the-simplest-cheapest-and-easiest-security-works-the-best/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/12/update-tuesday-april-2016/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/12/united-2016-power-up-your-incident-detection-and-response/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/12/on-badlock-cve-2016-2118-for-samba-and-windows/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/12/how-to-log-from-azure-virtual-machines/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/12/the-dangers-of-linear-thinking-and-why-security-pros-should-defend-in-graphs/</loc>
        
        
            <lastmod>2018-01-11</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/12/how-to-compare-google-compute-engine-aws-ec2-white-paper/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/11/vulnerability-disclosure-and-handling-surveys-really-what-s-the-point/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/08/the-first-ever-rapid7-user-group-is-coming-to-boston/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/08/securing-your-metasploit-logs/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/08/into-the-iot-world/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/07/never-underestimate-the-power-of-relationships-in-it-infosec/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/07/optimizing-adaptive-security-new-and-known-assets/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/07/defense-in-depth-embracing-the-attacker-mindset-followup/</loc>
        
        
            <lastmod>2018-03-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/06/new-policy-reports/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/06/the-benefit-of-having-an-enterprise-logging-policy/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/05/what-is-security-orchestration/</loc>
        
        
            <lastmod>2018-09-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/05/client-side-logging-in-javascript/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/04/mvm-migration-toolkit/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/01/the-foam-goes-straight-to-your-brain/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/01/get-empowered-at-united/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/04/01/security-vs-security-rapid7-supports-strong-encryption/</loc>
        
        
            <lastmod>2020-07-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/31/idc-says-70-of-successful-breaches-originate-on-the-endpoint/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/31/new-sans-review-of-userinsight-rapid7-s-user-behavior-analytics-solution/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/31/4-tips-to-help-model-your-security-program-to-the-attack-chain/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/31/calling-your-bluff-behavior-analytics-in-poker-and-incident-detection/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/31/weekly-metasploit-wrapup-17/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/30/modern-applications-require-modern-dynamic-application-security-testing-dast-solutions/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/30/brute-force-attacks-using-us-census-bureau-data/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/30/getting-ahead-of-badlock/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/29/what-is-incident-detection-and-response/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/29/further-control-of-dynamic-connections-with-adaptive-security/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/29/what-scares-it-professionals-most-about-it-infrastructure/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/28/using-color-within-data-visualization/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/23/the-topology-of-malicious-activity-on-ipv4/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/22/ransomware-faq-avoiding-the-latest-trend-in-malware/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/21/do-you-still-email-yourself-from-your-code-how-to-stop-the-madness/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/21/how-can-we-build-great-security-teams/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/21/its-not-too-early-to-start-thinking-about-united/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/18/wassenaar-arrangement-recommendations-for-cybersecurity-export-controls/</loc>
        
        
            <lastmod>2020-07-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/18/webinar-recap-logentries-feature-walkthrough-2/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/17/moving-beyond-userinsight-whats-new-in-insightuba/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/17/whats-the-difference-between-insightidr-insightuba/</loc>
        
        
            <lastmod>2017-07-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/17/the-4-steps-for-creating-a-log-enabled-marketing-campaign/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/17/r7-2016-02-multiple-vulnerabilities-in-mangeengine-oputils/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/17/r7-2016-01-null-credential-on-moxa-nport-cve-2016-1529/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/16/how-to-use-nexpose-to-find-all-assets-affected-by-drown/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/16/security-in-your-pocket-siyp/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/15/rapid7-bugcrowd-and-hackerone-file-pro-researcher-comments-on-dmca-sec-1201/</loc>
        
        
            <lastmod>2020-07-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/15/brics-vs-re2j/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/14/weekly-metasploit-wrapup-15/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/14/a-point-of-contention-cache-coherence-on-the-jvm/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/12/atomic-design-rapid7/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/11/threat-intelligence-foundations-crawl-walk-analyze-part-3/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/11/rsa-2016-filtering-through-the-noise/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/10/were-back-rapid7-at-sxsw-2016/</loc>
        
        
            <lastmod>2017-07-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/10/threat-intelligence-foundations-crawl-walk-analyze-part-2/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/10/deciphering-mysql-logs-the-what-why-and-how/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/09/threat-intelligence-foundations-crawl-walk-analyze-part-1/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/09/its-all-in-the-name/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/09/nexpose-os-fingerprinting-feedback/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/08/update-tuesday-march-2016/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/08/hacking-apps-so-easy-an-infant-can-do-it/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/08/how-to-analyze-herokus-new-runtime-metrics/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/07/7-rules-for-using-log-data-effectively-in-a-retrospective/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/04/changing-threat-landscape-evolves-idr/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/04/nexpose-receives-aws-certification/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/04/nexpose-scan-engine-on-the-aws-marketplace/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/03/incident-response-the-times-they-are-a-changin/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/03/new-automated-log-parsing/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/02/logging-for-unikernels/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/01/logging-from-sonos-speakers-with-a-webhook/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/03/01/the-attackers-dictionary/</loc>
        
        
            <lastmod>2017-09-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/29/old-dog-s-value/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/29/the-yellow-brick-road-to-machine-learning-with-honeypot-data-our-lessons-learned/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/26/webinar-recap-logentries-feature-walkthrough/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/25/the-role-of-log-files-in-experiments/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/24/there-s-more-to-a-name-introducing-insightuba/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/24/launching-insightidr-taking-you-from-compromise-to-containment-fast/</loc>
        
        
            <lastmod>2017-07-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/23/farewell-and-thank-you/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/23/infographic-log-management-analytics-at-a-glance/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/19/typescript-language-primer/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/19/weekly-metasploit-wrapup-18/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/18/smile-you-re-on-candid-apt/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/18/iot-made-real-using-ti-sensortag-data-with-logentries/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/17/cve-2015-7547-revenge-of-glibc-resolvers/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/16/troubleshooting-with-nexpose-logs/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/12/february-webinar-recap-monitoring-business-critical-events/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/12/how-to-build-threat-intelligence-into-your-idr-strategy-webinar-faq/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/11/using-logs-for-security-compliance-part-3/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/10/ive-joined-rapid7/</loc>
        
        
            <lastmod>2020-07-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/10/considering-the-explosive-growth-of-log-analytics/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/10/enhanced-vulnerability-checks-for-cve-2015-4852-and-cve-2015-7501/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/09/update-tuesday-february-2016/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/05/video-logs-for-pci-compliance/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/04/using-logs-for-security-compliance-part-2/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/03/combining-angularjs-and-reactjs-for-better-applications/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/02/it-takes-more-than-resolve-to-manage-an-effective-security-program/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/02/security-vulnerabilities-within-fisher-price-smart-toy-hereo-gps-platform/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/01/userinsight-s-impact-2-customer-stories/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/02/01/january-webinar-recap-2016-best-logging-practices/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/29/are-you-enabling-corporate-espionage/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/27/simple-network-management-protocol-snmp-best-practices/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/22/weekly-metasploit-wrapup-20/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/22/using-logs-for-security-compliance-part-1/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/20/nexpose-remote-registry-activation-for-windows/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/20/six-wonderful-years/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/15/r7-2015-26-advantech-eki-ssh-authentication-bypass/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/14/analyzing-elb-log-data/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/13/get-the-2015-incident-detection-response-survey-results/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/12/update-tuesday-january-2016/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/12/introducing-a-buildbot-status-plugin-for-pushing-status-updates-to-logentries/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/11/weekly-metasploit-wrapup-21/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/08/how-to-make-your-security-assessments-actionable/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/06/nexpose-two-factor-authentication/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/05/12-days-of-haxmas-beginner-threat-intelligence-with-honeypots/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/05/r7-2015-23-comcast-xfinity-home-security-system-insecure-fail-open/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/04/applying-machine-learning-to-security-problems/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/03/12-days-of-haxmas-authenticated-code-execution-by-design/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/02/12-days-of-haxmas-political-pwnage-in-2015/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2016/01/01/making-a-new-years-resolution-you-can-keep/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/31/metasploit-end-of-year-wrapup/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/30/metasploits-new-webapp-login-support/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/29/santa-makes-a-list-and-checks-it-twice-do-you/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/28/what-home-alone-can-teach-about-active-defense/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/27/charlie-brown-threat-intelligence/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/26/advanced-persistant-mfp/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/25/on-the-first-day-of-haxmas-rapid7-gives-to-you-free-professional-media-training/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/21/scannow-dll-search-order-hijacking-vulnerability-and-deprecation/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/21/how-to-log-messages-from-slack/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/19/have-jboss-jenkins-weblogic-websphere-based-applications-brace-yourself-theyve-got-an-unwanted-christmas-present-for-you/</loc>
        
        
            <lastmod>2017-09-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/18/holiday-greetings-from-all-of-us-at-rapid7/</loc>
        
        
            <lastmod>2017-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/18/rapid7-hacker-games-pilot-program/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/17/appspider-s-got-swagger-the-first-end-to-end-security-testing-for-rest-apis/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/17/how-to-avoid-common-mistakes-in-your-metasploit-communitypro-license-key-request/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/17/weekly-metasploit-wrapup-23/</loc>
        
        
            <lastmod>2017-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/16/more-tls-improvements-in-nexpose/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/16/multiple-disclosures-for-multiple-network-management-systems/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/15/logentries-recognized-by-docker-as-ecosystem-technology-partner-for-logging/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/14/r7-2015-22-manageengine-desktop-central-9-fileuploadservlet-connectionid-vulnerability-cve-2015-8249/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/11/weekly-metasploit-wrapup-25/</loc>
        
        
            <lastmod>2017-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/10/if-you-work-in-operations-your-security-team-needs-the-logs-too/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/10/recruiters-and-mission-driven-hiring/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/10/5-ways-attackers-can-evade-a-siem/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/09/new-vulnerability-filtering-in-adaptive-security/</loc>
        
        
            <lastmod>2017-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/09/analysing-hystrix-metrics-with-logentries/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/09/configuring-the-snmp-request-timeout/</loc>
        
        
            <lastmod>2017-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/08/update-tuesday-december-2015/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/08/what-is-your-biggest-prediction-for-2016/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/07/ciso-guidance-on-building-the-team-part-ii/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/07/what-is-responsive-design-really/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/07/3-things-executives-boards-should-know-about-cybersecurity-for-2016/</loc>
        
        
            <lastmod>2017-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/02/rapid7-belfast-office-first-hackathon/</loc>
        
        
            <lastmod>2017-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/02/even-with-80-automation-for-detection-you-need-to-ease-the-20-human-diligence/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/12/01/r7-2015-25-advantech-eki-multiple-known-vulnerabilities/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/30/tis-the-season-for-user-outreach/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/29/introducing-the-logentries-callback-plugin-for-ansible/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/26/reduced-annoyances-and-increased-security-on-ios-9-a-win-win/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/24/what-was-your-key-learning-from-2015/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/24/leql-percentile/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/24/userinsight-special-customer-presented-feature-friday-threats/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/23/why-i-joined-rapid7-2/</loc>
        
        
            <lastmod>2017-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/20/how-adaptive-security-fits-into-your-vulnerability-management-program/</loc>
        
        
            <lastmod>2017-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/20/weekly-metasploit-wrapup-28/</loc>
        
        
            <lastmod>2017-10-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/19/ciso-guidance-on-building-the-team/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/19/when-hunting-is-the-right-choice-for-your-security-team-and-when-it-s-not/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/19/it-turnover-and-its-contribution-to-security-challenges/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/18/the-internet-of-gas-station-tank-gauges-take-2/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/18/understanding-user-behavior-analytics/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/16/use-dhcp-discovery-to-implement-critical-security-control-1/</loc>
        
        
            <lastmod>2019-03-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/16/random-thoughts-by-trey-16-nov-2015/</loc>
        
        
            <lastmod>2017-10-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/16/ux-development-as-design-validation/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/13/take-the-rapid7-2015-incident-detection-response-survey/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/12/security-budget-tips-part-2-from-cisos-for-cisos/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/11/what-is-sql-injection/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/11/changes-to-oval-in-nexpose/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/11/spotlight-voidin/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/11/making-sure-search-is-not-your-incident-response-bottleneck/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/10/update-tuesday-november-2015/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/09/getting-started-with-veris/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/09/random-thoughts-by-trey-09-nov-2015/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/09/applying-visual-design-principles-to-improve-signal-to-noise-in-security-ui/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/06/weekly-metasploit-wrapup-24/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/05/investigating-an-incident-doesnt-end-at-the-perimeter/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/04/replacing-pedantry-with-positive-interaction/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/04/october-feature-recap/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/02/the-haves-and-have-nots-in-device-security/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/02/if-employee-passwords-get-exposed-by-third-party-breach-does-your-system-make-a-sound/</loc>
        
        
            <lastmod>2019-05-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/02/security-budget-tips-from-cisos-for-cisos/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/02/unleash-the-power-of-node-js-for-shell-scripting-part-2/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/02/random-thoughts-by-trey-02-nov-2015/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/11/02/user-experience-research-at-rapid7/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/29/increasing-risk-visibility/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/29/weekly-metasploit-wrapup-26/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/29/watch-your-saas-partial-parameter-checking-or-the-case-of-unfinished-homework/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/29/whether-or-not-siem-died-the-problems-remain/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/28/where-veris-smoke-veris-fire/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/28/four-reasons-security-teams-can-t-stop-sql-injection-vulnerabilities/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/28/java-8-introduction-to-parallelism-and-spliterator/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/28/new-dmca-exemption-is-a-positive-step-for-security-researchers/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/27/eight-reasons-why-sql-injection-vulnerabilities-still-exist-a-developer-s-perspective/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/27/introducing-the-ciso-blog-series/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/27/random-thoughts-by-trey-26-oct-2015/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/26/mobile-application-security-lock-the-back-door/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/26/building-an-effective-security-team/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/23/5-tips-for-dealing-with-unusual-traffic-detected-notifications/</loc>
        
        
            <lastmod>2020-03-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/21/userinsight-integrates-with-nexpose-for-total-user-asset-security-visibility/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/21/search-will-always-be-a-part-of-incident-investigations/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/20/why-i-don-t-dislike-the-whitehousegraham-amendment-2713/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/20/unleash-the-power-of-node-js-for-shell-scripting-part-1/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/20/kali-2-new-operating-systems-support/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/19/logging-from-tableau-for-successful-dataops/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/16/metasploit-weekly-wrapup-for-2015-10-15/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/16/cyberaware/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/16/exploring-lambdas-and-streams-in-java-8/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/16/5-min-demo-expose-risky-user-behavior-from-endpoint-to-cloud/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/15/10-best-practices-for-log-management-and-analytics/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/15/your-evolving-digital-life-security-basics-for-business-leaders/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/15/project-sonar-integration-in-nexpose/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/14/top-3-takeaways-from-the-how-to-make-your-workplace-cyber-safe-webcast/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/14/tls-coverage-improvements-in-nexpose-602/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/13/logentries-joins-the-rapid7-family/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/13/why-we-re-welcoming-logentries-to-the-rapid7-family-a-story-of-data-and-analytics/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/13/update-tuesday-october-2015/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/12/work-anywhere-securing-your-mobile-workforce/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/12/the-end-of-the-internet/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/09/r7-2015-17-hp-sitescope-dns-tool-command-injection/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/08/metasploit-framework-tools-reorg/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/08/new-metasploit-tools-to-collect-microsoft-patches/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/08/nexpose-60-new-feature-adaptive-security/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/07/weekly-metasploit-wrapup-27/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/07/preparing-to-crush-every-interview/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/06/metasploit-framework-open-source-installers/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/06/rapid7-joins-cisco-ise-ecosystem-for-endpoint-vulnerability-threat-defense/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/05/revealing-hidden-insights-with-docker-timeslice/</loc>
        
        
            <lastmod>2017-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/05/how-to-make-your-workplace-cyber-safe/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/05/thoughts-on-my-very-first-derbycon-which-wont-be-my-last/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/02/adaptive-security-overview/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/01/nexpose-60-new-and-improved-user-experience/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/10/01/flipping-bits/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/30/introducing-leql-sort/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/24/all-red-team-all-the-time/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/22/from-windows-to-office-365-detecting-intruder-behavior-in-microsoft-infrastructures/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/18/bugzilla-privileged-bug-disclosure-cve-2015-4499/</loc>
        
        
            <lastmod>2017-08-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/17/the-secret-to-a-successful-rapid7-intervie/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/17/push-vs-pull-security/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/16/security-in-energy-utilities/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/16/do-you-need-an-architect-in-a-software-company/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/15/log-analysis-for-containers/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/15/common-angular-routing-challenges/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/15/userinsight-ranks-users-by-risky-behavior/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/14/microsoft-attack-surface-analyzer-asa-its-for-defenders-too/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/14/container-monitoring-as-a-microservice/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/14/redner-s-markets-leverages-userinsight-for-incident-detection/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/11/phishing-countermeasures-to-protect-your-organization/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/11/the-path-to-a-false-sense-of-security-leave-your-security-controls-enabled-during-testing/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/10/update-tuesday-september-2015/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/10/a-debugging-session-in-the-kernel/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/10/cisos-do-you-have-enough-locks-on-your-doors/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/09/top-5-alternatives-for-span-or-mirror-ports/</loc>
        
        
            <lastmod>2020-05-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/08/ftc-can-charge-public-companies-with-unfair-trade-practices-for-failure-to-protect-customers-data/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/08/tips-for-optimizing-your-angularjs-app/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/08/iotsec-and-the-business-impact-of-hacked-baby-monitors/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/08/top-3-takeaways-from-the-skills-training-how-to-modernize-your-application-security-software-webcast/</loc>
        
        
            <lastmod>2017-08-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/04/iotsec-ama-on-reddit-sept-9-330pm-est-with-mark-stanislav-tod-beardsley/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/04/best-practices-for-container-log-analysis-part-2/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/03/5-min-demo-investigate-security-incidents-faster-with-user-context/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/03/insiders-and-outsiders/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/03/getting-started-with-docker-google-container-engine-logentries/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/02/iotsec-disclosure-10-new-vulns-for-several-video-baby-monitors/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/09/01/infographic-mastering-the-shift-to-microservices/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/28/best-practices-for-container-log-analysis-part-1/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/28/multiple-insecure-installation-and-update-procedures-for-rstudio-r7-2015-10-fixed/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/28/using-reflective-dll-injection-to-exploit-ie-elevation-policies/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/28/the-real-challenge-behind-asset-inventory/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/27/weekly-metasploit-wrapup-33/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/27/what-is-elastic-logging/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/27/culture-of-security/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/25/apm-community-pack/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/24/employee-referral-event-networking-with-a-side-of-beer-hold-the-bullshit/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/24/5-min-demo-detect-stealthy-attacks-with-behavior-analytics/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/22/using-log-data-streams-for-real-time-analytics-part-2/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/21/aiming-at-critical-moving-targets-advanced-nexpose-scanning/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/20/free-docker-logging-removing-barriers-for-mass-innovation/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/20/the-absence-of-evidence-in-breaches/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/20/top-3-takeaways-from-the-campfire-horror-stories-5-most-common-findings-in-pen-tests-webcast/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/19/the-other-shoe-drops-for-ashley-madison-not-just-another-breach-dump/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/19/webinar-recording-ensuring-docker-success-with-real-time-monitoring/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/19/workspace-in-your-prompt/</loc>
        
        
            <lastmod>2017-08-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/19/it-can-be-dangerous-assuming-a-vulnerability-is-not-a-vulnerability/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/18/the-easy-button-for-updating-your-nexpose-database/</loc>
        
        
            <lastmod>2017-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/15/state-of-log-management-for-aws/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/14/using-log-aggregation-across-dev-ops-the-pricing-advantage/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/14/revisiting-an-info-leak/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/13/weekly-metasploit-wrapup-29/</loc>
        
        
            <lastmod>2017-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/13/the-iot-trust-framework-somebody-is-finally-setting-the-bar/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/13/update-tuesday-august-2015/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/12/metasploit-on-kali-linux-20/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/12/enterprise-logging-for-heroku/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/10/nexpose-coverage-toolkit-update/</loc>
        
        
            <lastmod>2017-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/07/using-log-data-streams-for-real-time-analytics/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/07/optimizing-your-container-environment-pets-vs-cattle/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/07/get-on-the-path-to-superpowers-in-only-1-hour/</loc>
        
        
            <lastmod>2017-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/08/04/exploiting-a-64-bit-browser-with-flash-cve-2015-5119-part-2/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/31/userinsight-helps-healthcare-providers-detect-intruders-fulfill-hipaa-security-rule/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/31/supporting-a-64-bits-renderer-on-flash-cve-2015-5119/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/30/rapid7-takes-las-vegas-black-hat-bsideslv-def-con-talks-parties-giveaways-phew/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/30/top-3-takeaways-from-the-detecting-the-bear-in-camp-how-to-find-your-true-vulnerabilities-webcast/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/30/the-black-hat-attendee-guide-part-5a-the-magic-of-people/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/30/hammertoss-demonstrates-need-for-applying-knowledge-of-the-attacker-to-behavior-analytics/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/30/weekly-metasploit-wrapup-30/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/30/the-black-hat-attendee-guide-part-8-trip-reporting/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/30/the-black-hat-attendee-guide-part-7a-electronic-survival/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/29/the-black-hat-attendee-guide-part-7-your-survival-kit/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/29/all-alerts-are-not-created-equal/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/29/the-black-hat-attendee-guide-part-6a-on-job-hunting-recruiting/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/28/q-a-from-the-incident-response-investigation-webcast-storming-the-breach-part-1-initial-infection-vector/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/28/top-3-takeaways-from-the-storming-the-breach-part-1-initial-infection-vector-webcast/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/28/the-black-hat-attendee-guide-part-6-the-sponsor-hall-arsenal-and-more/</loc>
        
        
            <lastmod>2017-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/27/adding-a-gps-time-source-to-ntpd/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/24/interning-at-rapid7-a-git-push-in-the-right-direction/</loc>
        
        
            <lastmod>2017-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/24/rapid7s-comments-on-the-wassenaar-arrangement-proposed-rule-for-controlling-exports-of-intrusion-software/</loc>
        
        
            <lastmod>2018-11-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/23/weekly-metasploit-wrapup-32/</loc>
        
        
            <lastmod>2017-08-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/23/an-all-inclusive-log-monitoring-container-for-docker/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/23/the-black-hat-attendee-guide-part-5-meaningful-introductions/</loc>
        
        
            <lastmod>2017-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/22/the-black-hat-attendee-guide-guest-post-talking-to-the-media-press/</loc>
        
        
            <lastmod>2017-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/21/playing-with-java-8s-completable-futures/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/20/the-black-hat-attendee-guide-part-3-networking-at-black-hat/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/20/join-us-at-camp-rapid7-free-security-learnings-all-summer-long/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/17/top-3-takeaways-from-the-ciso-skill-training-lack-of-security-its-all-in-your-head-webcast/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/16/r7-2015-09-oracle-java-jre-aes-intrinsics-remote-denial-of-service-cve-2015-2659/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/16/the-new-metasploit-browser-autopwn-strikes-faster-and-smarter-part-2/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/16/patch-tuesday-july-2015/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/16/the-black-hat-attendee-guide-part-2-the-briefings/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/16/ciso-in-residence-series-security-teachable-moments/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/16/introducing-logentries-new-querybuilder/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/15/the-new-metasploit-browser-autopwn-strikes-faster-and-smarter-part-1/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/14/web-application-security-scanning-the-art-of-automation/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/14/gems-of-userinsight-expanded-edition/</loc>
        
        
            <lastmod>2017-08-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/13/the-black-hat-attendee-guide-part-1/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/10/r7-2015-08-accellion-file-transfer-appliance-vulnerabilities-cve-2015-2856-cve-2015-2857/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/10/msfcli-is-no-longer-available-in-metasploit/</loc>
        
        
            <lastmod>2017-08-15</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/10/mobile-application-security-think-twice-before-placing-football-bets/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/10/ditch-the-debugger-and-use-log-analysis-instead/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/09/3-tips-for-finding-the-best-website-security-scanner/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/09/not-stuck-in-the-middle-how-to-dynamically-find-assets-with-vulnerable-versions-of-openssl/</loc>
        
        
            <lastmod>2017-08-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/09/3-big-trends-in-application-security/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/09/10-best-practices-for-log-management-analytics-part-1/</loc>
        
        
            <lastmod>2018-01-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/09/cve-2015-1793-openssl-certificate-authority-impersonation/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/09/ciso-in-residence-series-shocked-but-not-surprised/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/07/fix-security-defects-earlier-with-appspider-and-selenium-integration/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/07/low-and-slow-attackers-easily-hide-from-time-blind-alerts/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/06/mobile-app-api-security-application-security-s-where-s-waldo/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/06/using-log-data-streams-for-real-time-analytics-part-1/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/02/weekly-metasploit-wrapup-31/</loc>
        
        
            <lastmod>2017-08-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/02/top-3-takeaways-from-the-security-metrics-how-are-you-measuring-up-webcast/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/07/01/safely-dumping-domain-hashes-with-meterpreter/</loc>
        
        
            <lastmod>2017-08-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/30/introducing-the-nexpose-coverage-toolkit/</loc>
        
        
            <lastmod>2017-08-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/30/more-on-flash-exploits-into-the-framework/</loc>
        
        
            <lastmod>2017-08-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/29/cyberul-standards-of-due-care/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/29/how-to-implement-antlr4-autocomplete/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/26/weekly-metasploit-wrapup-34/</loc>
        
        
            <lastmod>2017-08-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/25/idiomatic-es6/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/24/discover-assets-dynamically-with-infoblox-dhcp/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/23/the-state-of-logging-on-docker-whats-new-with-1-7/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/22/announcing-logentries-as-google-cloud-platforms-first-log-analytics-partner/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/22/introducing-leql/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/19/unitedsummit-2015-day-2-recap/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/18/weekly-metasploit-wrapup-recog/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/18/how-to-log-with-the-docker-logentries-container/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/18/unitedsummit-2015-day-1-recap/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/17/rapid7-rapid-fire-at-unitedsummit-2015-rapid7social/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/13/wassenaar-arrangement-frequently-asked-questions/</loc>
        
        
            <lastmod>2017-08-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/13/response-to-the-us-proposal-for-implementing-the-wassenaar-arrangement-export-controls-for-intrusion-software/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/12/weekly-metasploit-wrapup-35/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/12/what-exactly-is-duqu-20/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/10/how-to-be-a-combination-king/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/09/patch-tuesday-june-2015/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/09/what-constitutes-a-critical-security-flaw/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/09/seven-ways-userinsight-helps-with-pci-compliance/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/08/msfpayload-and-msfencode-are-being-removed-from-metasploit/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/06/important-update-regarding-rapid7-community-securitystreet/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/new-and-improved-asset-tracking-in-nexpose/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/why-and-how-to-make-sure-your-scan-credentials-are-configured-correctly/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/how-to-mitigate-the-threat-of-an-extortion-attempt-against-your-organization/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/top-3-takeaways-from-the-guide-to-the-incident-response-bare-minimum-webcast/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/top-3-takeaways-7-questions-to-ask-your-penetration-testing-vendor-webcast/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/network-visibility-what-you-dont-know-can-hurt-you/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/key-takeaways-from-verizon-2015-data-breach-investigations-report/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/reducing-windows-attack-surface-with-user-rights-assignment/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/nexpose-gem-10-released/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/metasploit-framework-rails-40-upgrade/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/using-asset-group-scanning-to-devise-a-granular-scanning-strategy/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/patch-tuesday-may-2015/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/patch-tuesday-april-2015/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/userinsight-integrates-with-microsofts-new-office-365-api-to-detect-intruders/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/userinsight-detects-attacks-using-intruder-tools-to-steal-credentials/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/userinsight-detects-malicious-processes-on-endpoints-without-deploying-an-agent/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/remote-coverage-for-ms15-034-httpsys-vulnerability-cve-2015-1635/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/introducing-the-ciso-in-residence/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/05/migrating-to-micro-services-with-coreos/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/04/5-must-haves-for-modern-application-security-scanners/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/04/top-10-business-logic-attack-vectors/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/04/7-deadly-sins-unlock-the-gates-of-mobile-hacking-heaven/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/04/security-testing-complex-workflows-not-so-complex-anymore/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/04/7-ways-to-improve-the-accuracy-of-your-application-security-tests/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/04/modernize-your-application-security-scanning-in-four-easy-steps/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/04/7-things-about-dan-kuykendall/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/04/nt-objectives-acquired-by-rapid7/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/03/devops-tool-arena-and-webinar/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/06/02/migrating-to-bootstrap-3-with-legacy-code/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/29/enabling-dataops-with-easy-log-analytics/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/28/weekly-metasploit-wrapup-soho-routers-again/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/27/integrating-etckeeper-with-logentries-chef/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/26/velocityconf-2015-dont-miss-speakers-and-sessions/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/22/weekly-metasploit-wrapup-so-many-repos/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/22/breaking-down-the-logjam-vulnerability/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/21/announcing-azure/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/19/making-siem-easier-to-achieve/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/18/disclosure-android-chrome-address-bar-spoofing-r7-2015-07/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/18/getting-ready-for-velocityconf-2015-lets-recap-2014/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/15/2015-metasploit-t-shirt-design-contest-its-on/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/13/fun-with-javascript-on-the-jvm/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/13/how-poisonous-is-venom-cve-2015-3456-to-your-virtual-environments/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/12/metric-driven-smart-deploys/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/08/building-tabular-data-format-with-d3/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/07/weekly-metasploit-wrapup-and-were-back/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/07/what-you-can-learn-from-log-level-usage-reports/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/05/listening-to-what-your-heroku-postgres-logs-are-telling-you/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/04/dataops-creating-a-culture-of-data-analysts/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/04/welcome-appspider-nt-objectives-joins-the-rapid7-family/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/05/01/ecomm-living-dying-by-transactions/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/24/rapid7-wins-sc-magazine-2015-best-vulnerability-management-solution/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/23/salt-ssh-for-remote-execution-of-states-and-modules/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/22/announcing-logentries-user-access-controls/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/21/what-is-dataops-why-you-need-it/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/19/availability-of-metasploit-community-metasploit-pro-trials-outside-us-canada/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/16/log-analysis-for-orchestration-change-management/</loc>
        
        
            <lastmod>2017-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/13/10-ways-to-lead-with-analytics/</loc>
        
        
            <lastmod>2017-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/09/java-util-logging-now-available/</loc>
        
        
            <lastmod>2017-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/08/r7-2015-01-csrf-backdoor-and-persistent-xss-on-arris-motorola-cable-modems/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/08/introduction-to-apache-spark/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/03/dataops-how-pluralsight-uses-tableau-logentries-for-better-analytics/</loc>
        
        
            <lastmod>2017-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/03/logging-on-docker-what-you-need-to-know/</loc>
        
        
            <lastmod>2017-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/04/01/the-hidden-costs-of-open-source/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/30/rapid7-userinsight-brings-user-context-to-palo-alto-wildfire-alerts/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/27/top-3-takeaways-from-the-pci-dss-30-update-how-to-restrict-authenticate-and-monitor-access-to-cardholder-data-webcast/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/27/weekly-metasploit-wrapup-38/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/27/unicode-support-in-meterpreter/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/26/how-to-track-meteors-recomputations-with-logentries/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/26/meterpreter-2015-you-spoke-we-listened/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/26/lets-talk-about-metrics/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/25/stageless-meterpreter-payloads/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/25/using-host-tagging-in-metasploit-for-penetration-testing/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/25/the-flexbox-paradigm-css3-layout-for-todays-applications/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/24/the-return-of-rapid7-rapid-fire-a-spirited-infosec-debate-round-3/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/24/mongodb-log-analytics/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/20/weekly-metasploit-wrapup-42/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/19/will-the-data-security-and-breach-notification-act-protect-consumers/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/19/march-2015-openssl-security-advisory/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/19/instant-log-gratification/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/18/feelin-good-about-the-future-bsides-austin-sxsw-2015-roundup/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/16/paast-times/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/13/top-3-takeaways-from-the-getting-one-step-ahead-of-the-attacker-how-to-turn-the-tables-webcast/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/13/detecting-intruders-early-can-ruin-their-business-model/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/13/getting-started-with-devops/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/12/securing-credit-lines-and-dogfood/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/12/new-logentries-cookbook-for-chef/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/12/are-you-really-protected-against-group-policy-bypass-and-remote-code-execution/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/12/weekly-metasploit-wrapup-43/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/10/patch-tuesday-march-2015/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/10/terminology-nerd-war-apm-log-analysis-more/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/10/iot-security-research-whats-it-take/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/09/tracking-web-activity-by-mac-address/</loc>
        
        
            <lastmod>2020-05-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/07/top-3-takeaways-from-the-security-pro-s-guide-to-breach-preparedness-and-response-webcast/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/06/civilian-considerations-on-getting-a-clearance/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/06/dfirchat-join-us-our-tweetchat-monday-march-9-330pm-et/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/05/weekly-metasploit-wrapup-44/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/05/internet-of-things-privacy-whats-next-in-infosec-at-sxsw-2015/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/05/top-3-takeaways-from-the-planning-for-failure-how-to-succeed-at-detecting-intruders-on-your-network-webcast/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/05/how-to-centralize-logs-from-coreos-clusters/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/04/how-to-make-united-your-own/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/04/preparing-for-incident-response/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/03/has-splunk-turned-its-back-on-the-devops-community/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/02/template-caching-in-angular-how-to-avoid-the-storm/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/03/02/mac-endpoint-security-why-is-it-important/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/26/weekly-metasploit-wrapup-47/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/26/the-gif-guide-to-ios-security/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/26/why-interoperability-is-a-key-requirement-for-your-devops-toolkit/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/26/getting-started-with-the-logentries-logstash-integration/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/26/why-i-joined-rapid7-4/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/25/how-a-breached-vendor-impacts-your-organizations-security-this-weeks-whiteboard-wednesday/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/24/logging-your-entire-software-delivery-pipeline/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/23/webcast-followup-escalate-your-efficiency/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/23/osint-through-sender-policy-framework-spf-records/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/22/acceptance-tests-in-practice-behavior-driven-development/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/20/top-3-takeaways-from-the-escalate-your-efficiency-how-to-save-time-on-penetration-testing-webcast/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/20/sharing-your-secrets-with-superfish-and-other-strangers/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/20/nexpose-and-metasploit-training-and-certification-courses-filling-up-fast/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/20/the-role-of-log-analysis-in-our-technical-transformation/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/19/weekly-metasploit-wrapup-36/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/13/top-3-takeaways-from-the-security-in-retail-an-industry-at-a-crossroads-webcast/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/13/a-closer-look-at-february-2015-s-patch-tuesday/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/13/updating-medical-devices-ftw/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/13/why-i-joined-rapid7-3/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/13/nexpose-scan-setup-wizard-redesign/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/12/weekly-metasploit-wrapup-uxss-towelroot-and-sayonara-to-ruby-19/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/12/installing-logentries-using-ansible/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/11/what-is-the-docker-stats-api/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/11/patch-tuesday-february-2015/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/10/r7-2015-02-google-play-store-x-frame-options-xfo-gaps-enable-android-remote-code-execution-rce/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/09/machine-data-for-end-to-end-iot-system-monitoring/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/06/credentials-compromises-rinse-and-repeat/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/06/time-for-an-upgrade-this-year-s-rapid7-rsa-party-is-at-new-venue-1015-folsom/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/06/4-steps-for-structuring-your-log-data/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/06/remove-your-alert-triage-bottleneck-to-speed-response/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/05/being-product-manager-of-metasploit/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/05/weekly-metasploit-wrapup-37/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/05/logging-from-your-java-application-using-log4j2/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/05/prepare-for-battle-at-united-2015/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/04/tlsssl-scanning-enhancements-in-nexpose-512/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/04/ubuntu-logs-at-the-core-of-iot/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/03/moarchecks-a-quick-survey/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/02/02/log-analysis-for-software-defined-data-centers/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/30/rapid7-launches-new-higher-education-program-to-support-universities-with-free-licenses-trainings-and-certifications/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/30/weekly-metasploit-wrapup-39/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/28/ghostbuster-how-to-scan-just-for-cve-2015-0235-and-keep-your-historical-site-data/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/28/the-role-of-logging-in-chatops/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/27/ghost-in-the-machine-is-cve-2015-0235-another-heartbleed/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/27/the-value-of-easy-you-be-the-judge/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/26/how-do-we-de-criminalize-security-research-aka-what-s-next-for-the-cfaa/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/26/infographic-top-4-log-management-challenges/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/23/will-the-president-s-cybersecurity-proposal-make-us-more-secure/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/23/the-pudding-is-in-the-proof-the-importance-of-proofs-in-vulnerability-management/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/23/weekly-metasploit-wrapup-40/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/23/remove-your-incident-analysis-bottleneck-to-improve-your-time-to-contain/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/22/the-internet-of-gas-station-tank-gauges/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/21/friends-dont-let-friends-dig-through-data/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/20/unit-testing-with-karma-and-jasmine-for-angularjs/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/16/weekly-metasploit-wrapup-41/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/16/top-4-takeaways-from-the-2015-security-new-years-resolutions-expert-panel-webcast/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/16/skeleton-key-exhibits-increased-blending-of-credentials-and-malware/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/15/gathering-process-metrics-on-the-windows-agent/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/14/give-the-people-what-they-want/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/14/patch-tuesday-january-2015-dawn-of-a-new-era/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/14/effective-information-sharing-exposing-skeleton-key/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/13/obama-data-custodians-are-accountable/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/13/dynamite-plots-logs-the-joy-in-knowing/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/12/fastly-community-pack/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/12/google-no-longer-provides-patches-for-webview-jelly-bean-and-prior/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/09/using-regex-with-nginx-apache-iis/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/07/hotfix-metasploit-startup-issues-after-upgrading-to-4110-update-2014122301/</loc>
        
        
            <lastmod>2017-08-17</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/07/extracting-key-values-from-any-log-format-using-regex/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/07/12-days-of-haxmas-wrapped/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/07/the-sony-breach-demonstrates-the-importance-of-moving-beyond-perimeter-defense/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/06/united-security-summit-2015-theme-announcement/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/06/catching-inactivity-before-it-catches-you/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/05/maxing-meterpreters-mettle/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/04/12-days-of-haxmas-meterpreter-migration-now-also-for-linux/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/03/12-days-of-haxmas-metasploit-nexpose-sonar-and-recog/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/02/2014-a-year-of-android-exploits-in-metasploit/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/01/12-days-of-haxmas-exploiting-cve-2014-9390-in-git-and-mercurial/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/01/2015-project-sonar-wiki-udp-scan-data/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/01/designing-for-security-applications-a-multipart-series/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2015/01/01/user-experience-research-rapid7/</loc>
        
        
            <lastmod>2017-08-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/31/12-days-of-haxmas-metasploit-yearly-wrapup/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/30/12-days-of-haxmas-rce-in-your-ftp/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/30/carefree-scalable-infrastructure/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/29/re-sandbox-welcome-to-the-rapid7-security-street-email-delete-it-then-please-read-this/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/29/12-days-of-haxmas-failing-portably/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/28/buffer-overflows-come-and-go-bad-passwords-are-forever/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/27/improvements-to-jsobfu/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/26/12-days-of-haxmas-opening-up-my-top-secret-metasploit-time-capsule/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/25/12-days-of-haxmas-ms14-068-now-in-metasploit/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/23/wishing-you-happy-holidays-a-happy-new-year-from-all-of-us-at-rapid7/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/19/rapid7-perspectiverapid7-2014-infosec-retrospective-predictions-for-2015/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/19/killer-data-center-apps/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/18/metasploit-weekly-wrapup-5/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/18/connected-qa-selenium-log-analysis/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/17/is-server-monitoring-dead/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/16/end-to-end-iot-monitoring-with-log-data/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/12/top-3-takeaways-from-the-get-it-under-control-top-7-security-controls-to-focus-on-webcast/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/12/weekly-metasploit-wrapup-45/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/11/patch-tuesday-december-2014/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/11/poodle-is-back-to-take-a-byte-out-of-tls-cve-2014-8730/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/11/how-to-scan-for-cve-2014-8730/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/11/best-practices-for-cloud-logging-security-data-protection/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/10/amp-up-and-defy-amplification-attacks-detecting-traffic-amplification-vulnerabilities-with-nexpose/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/09/good-bye-msfpayload-and-msfencode/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/08/everything-happens-for-a-reason-in-security/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/05/community-packs-for-aws-out-of-the-box-dashboards-alerts-queries/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/05/top-3-takeaways-from-the-webcast-2015-security-outlook-see-how-your-security-program-measures-up/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/04/weekly-metasploit-wrapup-46/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/03/keepalived-and-haproxy-in-aws-an-exploratory-guide/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/02/infographic-the-modern-it-and-dev-ops-toolkit/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/02/your-photo-for-m-c3-a9decins-sans-fronti-c3-a8res-today-givingtuesday-msf4msf/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/01/giving-back-on-givingtuesday-msf4msf/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/01/es6-javascript-in-harmony-an-overview-of-new-language-features/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/12/01/cyber-monday-halftime-actionable-guidance-for-retail-teams/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/26/top-3-takeaways-from-the-pci-dss-30-are-you-ready-for-january-webcast/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/26/the-anatomy-of-a-credit-card-breach-whiteboard-wednesday-video/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/24/is-your-log-data-presentation-worthy/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/24/patch-cve-2014-6324-to-avoid-a-complete-domain-rebuild-when-userinsight-detects-its-exploit/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/21/controlsinsight/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/21/how-to-implement-json-formatting-of-iis-for-analytics-and-troubleshooting/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/21/weekly-metasploit-wrapup-48/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/20/securing-devops-monitoring-development-access-to-production-environments/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/20/for-the-love-of-code-why-we-use-jshint-for-static-code-analysis/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/19/r7-2014-18-hikvision-dvr-devices-multiple-vulnerabilities/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/19/http-trace-vulnerability-your-question-answered/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/19/how-to-adopt-devops-in-your-organization/</loc>
        
        
            <lastmod>2021-01-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/19/userinsight-detects-network-zone-access-violations/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/17/pci-30-seconds-newsletter-38-roc-fission-the-only-way-to-reach-compliance/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/17/top-3-takeaways-from-the-new-frontier-why-traditional-signature-based-defenses-don-t-work/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/14/weekly-metasploit-wrapup-49/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/13/patch-tuesday-november-2014/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/13/an-introduction-to-logentries-community-packs/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/13/how-to-use-nexpose-for-your-internal-pci-compliance-scans/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/13/whiteboard-wednesday-winshock-cve-2014-6321-what-is-it-how-to-remediate-video/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/13/whiteboard-wednesday-video-the-difference-between-an-ips-ids/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/12/nexpose-api-sitesaverequest-and-ip-addresses-vs-hostnames/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/12/schannel-and-ms14-066-another-red-alert/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/12/json-formatting-of-windows-events-its-hot/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/12/how-to-use-geolocation-to-detect-compromise-of-cloud-service-accounts/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/11/detecting-compromised-amazon-web-services-aws-credentials/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/10/controlsinsight-chart-features/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/10/unlimited-logging-a-new-chapter-in-log-management/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/10/more-efficient-incident-detection-and-investigation-saves-400000-per-year-says-idc/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/07/top-3-takeaways-from-the-when-every-minute-counts-accelerating-incident-investigations-webcast/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/07/federal-friday-11714-up-in-the-clouds/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/06/metasploit-weekly-wrapup-7/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/06/the-significance-of-fast-and-organized-tools-for-incident-investigations/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/05/what-is-the-role-of-logging-in-the-internet-of-things/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/05/userinsight-speeds-investigations-with-new-interactive-incident-timeline/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/04/what-is-json-an-introductory-guide/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/04/mo-mondays-at-rapid7-movember-week-1/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/03/top-3-takeaways-from-cybersecurity-awareness-panel-taking-it-to-the-c-level-and-beyond/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/11/03/4-ways-to-ensure-continuous-delivery-helps-not-hurts/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/31/cyber-security-awareness-month-crisis-response-and-communication/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/31/metasploit-weekly-wrapup-4/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/30/logging-activity-in-a-smart-home/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/29/with-security-periodic-and-consistent-is-key/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/29/united-2015-registration-is-open/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/28/mesos-yet-another-cloud-os/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/28/cyber-security-awareness-month-why-your-organization-needs-security-policies/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/27/how-to-use-node-red-with-logentries-for-cloud-based-logging/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/24/controlsinsight-server-controls-single-critical-role/</loc>
        
        
            <lastmod>2017-07-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/24/how-to-keep-calms-and-release-more/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/24/federal-friday-102414-nscam-week-4/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/24/whiteboard-wednesday-insider-threat-programs-how-to-get-started/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/23/user-statistics-give-great-visibility-for-incident-responders/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/23/blackhat-europe-printers-lasers-and-drones-oh-my/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/23/cyber-security-awareness-month-coordinated-disclosure-working-with-the-security-community/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/23/filter-for-poodle-and-other-specific-vulnerabilities/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/22/which-css-preprocessor-should-you-choose/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/22/improve-your-scan-performance-with-scan-engine-pooling/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/22/reducing-alert-fatigue-userinsight-helps-extract-more-value-from-your-security-investments/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/21/shared-services-the-unicorn-every-devops-is-looking-for/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/21/r7-2014-17-nat-pmp-implementation-and-configuration-vulnerabilities/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/20/metasploit-acquisition-fifth-anniversary/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/20/4-alerts-you-need-in-case-system-events-stop-occurring/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/18/cyber-security-awareness-month-data-custodianship/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/17/metasploit-weekly-wrapup-poodle-mitigations/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/17/federal-friday-101714-cybersecurity-awareness-month/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/16/site-consolidation/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/15/block-the-poodle-s-bite-how-to-scan-for-cve-2014-3566/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/15/why-great-logging-is-key-to-continuous-delivery/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/15/poodle-unleashed-understanding-the-ssl-30-vulnerability/</loc>
        
        
            <lastmod>2017-08-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/14/combining-controls-on-servers-to-reduce-attack-surface-area/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/14/6-challenges-facing-devops-and-operations-teams-in-2015/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/14/palo-alto-networks-userid-credential-exposure/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/14/october-patch-tuesday-sandworm/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/14/sandworm/</loc>
        
        
            <lastmod>2017-08-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/13/consumer-security-concerns-for-medical-devices-health-monitoring-tools/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/13/how-to-format-nginx-and-django-logs-using-kvps/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/09/logs-the-most-fine-grained-data-source/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/08/petition-for-reform-of-the-dmca-and-cfaa-why-i-care-and-why-i-think-you-should-too/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/07/become-a-windows-agent-power-user-from-the-command-line/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/06/cyber-security-awareness-month-taking-it-to-the-c-level-and-beyond/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/06/our-favorite-continuous-delivery-tools/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/03/federal-friday-10314-happy-fiscal-new-year/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/03/userinsight-helps-rapid7-stop-phishing/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/03/adventures-in-empty-udp-scanning/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/02/metasploit-weekly-wrapup-6/</loc>
        
        
            <lastmod>2017-08-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/02/how-to-master-the-installation-of-the-windows-agent/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/01/bsidesla-2014-trial-by-research-security-research-v-law/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/01/scan-exportimport-using-the-nexpose-client-gem/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/01/connecting-logs-and-metrics-logentries-and-hosted-graphite/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/10/01/phishing-how-userinsight-helps-you-get-off-the-hook/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/30/in-the-log-management-world-are-you-a-fox-or-hedgehog/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/30/pci-30-seconds-newsletter-37-get-pen-tested/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/30/apple-releases-patch-for-shellshock-may-still-be-vulnerable/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/30/userinsight-integrates-with-logrhythm-siem-to-accelerate-incident-detection-and-response/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/29/protect-your-service-accounts-detecting-service-accounts-authenticating-from-a-new-host/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/26/federal-friday-92614-shell-shocked-and-bashed/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/26/heroku-buttons-rock/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/26/get-hp-arcsight-alerts-on-compromised-credentials-phishing-attacks-and-suspicious-behavior/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/25/whiteboard-wednesday-video-bashbugshellshock-explained/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/25/logging-from-php-web-frameworks-like-laravel/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/25/userinsight-gets-the-all-clear-for-shellshock-and-helps-detect-attackers-on-your-network/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/25/bash-the-bash-bug-here-s-how-to-scan-for-cve-2014-6271/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/25/bash-ing-into-your-network-investigating-cve-2014-6271/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/24/working-with-reports-and-exports-via-the-rpc-api/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/24/cloud-platforms-vs-on-prem-a-guide-for-the-rest-of-us/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/23/how-to-trace-transactions-across-every-layer-of-your-distributed-software-stack/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/22/new-show-missing-command-in-msfconsole/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/22/e2n-reduces-anxiety-and-increases-customer-satisfaction-with-log-data/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/22/detecting-the-use-of-compromised-credentials/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/19/top-2-takeaways-from-the-incident-response-why-you-need-to-detect-more-than-pass-the-hash-webcast/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/19/ahoy-its-the-metasploit-weekly-wrapup-more-on-android-uxss-and-refreshing-jsobfu/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/19/federal-friday-91914-talk-like-a-pirate-day-edition/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/19/controlsinsight-30-integration-of-server-and-desktop-controls/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/18/3-common-problems-solved-with-json/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/18/android-browser-privacy-bug-explained-video-whiteboard-wednesday/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/18/the-3-things-you-need-to-do-to-reap-the-benefits-of-detecting-compromised-credentials/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/18/sharing-accounts-makes-security-teams-sad/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/17/7-benefits-of-cloud-based-computing-for-non-technical-techies/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/17/hacmebank-hacmecasnio-in-the-cloud-free-windows-security-trainings/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/17/mitigating-service-account-credential-theft/</loc>
        
        
            <lastmod>2017-09-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/16/log-analysis-takes-automated-orchestration-further/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/16/single-pane-of-glass-series-fireeye-threat-analytics-platform-tap/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/16/metasploit-gems-from-scratch/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/15/major-android-bug-is-a-privacy-disaster-cve-2014-6041/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/12/weekly-metasploit-update-3/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/12/how-to-avoid-the-big-data-black_hole/</loc>
        
        
            <lastmod>2021-01-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/12/involve-us-and-spend-more-time-investigating-incidents/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/11/patch-tuesday-september-2014/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/11/scaling-with-restful-microservice-architecture/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/11/controlsinsight-v30-now-with-server-controls/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/10/aix-coverage-see-what-you-need-to-see/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/10/3-ways-to-stop-the-log-paparazzi/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/09/timeline-of-a-retail-credit-card-breach-infographic/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/09/logging-with-diamond/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/09/rely-on-data-center-audits-alone-and-you-ll-get-hit-eventually/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/08/how-log-data-could-help-win-your-fantasy-football-league/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/06/another-day-another-breach-a-template-for-home-depot-and-retail-credit-card-breaches/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/05/top-3-takeaways-from-the-simplify-controls-how-to-align-security-controls-to-reduce-risk-to-your-business-webcast/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/05/federal-friday-9514-keeping-3rd-parties-honest/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/05/weekly-metasploit-update-5/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/05/the-pros-and-cons-of-open-source-logging/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/04/making-your-voice-heard-for-the-future-of-automotive-safety/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/04/107000-web-sites-no-longer-trusted-by-mozilla/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/03/the-abcs-of-rest/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/02/what-you-need-to-know-to-build-a-solution-to-detect-compromised-credentials/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/09/02/happy-bits-shortens-time-to-resolution-from-4-days-to-5-minutes/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/29/weekly-metasploit-update-7/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/28/solving-the-business-app-adoption-riddle/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/27/how-to-find-and-solve-your-application-bottlenecks/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/27/how-do-you-usb/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/26/monitoring-and-analyzing-aws-cloudtrail-data-from-multiple-aws-regions/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/25/switching-sides-goodbye-metasploit-hello-userinsight/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/25/not-reinventing-the-wheel/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/25/software-defined-security-made-real/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/25/how-to-integrate-go-golang-with-logentries/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/22/federal-friday-82214-a-sensitive-cloud-and-some-additional-strategy/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/22/top-2-takeaways-from-the-credentials-are-the-new-exploits-how-to-effectively-use-credentials-in-penetration-tests-webcast/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/22/feedback-on-rapid7-s-tech-preview-process-and-metasploit-pro-410/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/22/like-playing-with-honey-pots-stop-playing/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/21/traditional-log-management-is-dead-long-live-autonomic-analytics/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/21/more-snmp-information-leaks-cve-2014-4862-and-cve-2014-4863/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/21/how-to-use-compromised-credentials-as-your-key-to-funding-success/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/21/alerting-on-anomaly-and-inactivity-made-simple/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/20/new-nexpose-help/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/20/msfconsole-failing-to-start-try-msfconsole-n/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/19/realcontext-asset-filtering-in-controlsinsight/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/19/let-the-logs-do-the-talking/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/15/how-metasploit-pro-beat-me-on-the-command-line/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/15/an-apm-solution-divided-cannot-stand/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/14/evolve-dont-revolve/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/14/metasploit-pro-s-new-credentials-features-save-us-time-in-workflows/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/13/improving-visibility-into-your-security-program-the-risk-scorecard-report/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/13/credentials-are-the-new-exploits-make-credentials-work-for-you-with-with-metasploit-410/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/13/why-we-love-log-management-and-you-should-too/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/13/end-of-vegas-2014-tail-end-of-blackhat-defcon22-roundup/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/13/august-patch-tuesday/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/13/walking-the-black-hat-conference-floor-2014-edition/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/12/why-hesitation-hurts-act-now-to-prevent-costly-problems-later/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/12/json-logging-in-apache-and-nginx-with-logentries/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/11/how-d3-can-help-you-build-effective-data-visualizations/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/09/r7-2014-10-disclosure-yokogawa-centum-cs3000-bkbcopydexe-file-system-access/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/08/federal-friday-8814-military-strategy-in-cybersecurity/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/08/the-log-so-important-it-deserves-a-book/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/07/vegas-roundup-day-2-black-hat-bsideslv-and-the-rapid7-party/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/07/set-up-logging-on-google-compute-engine-in-less-than-5-minutes/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/07/new-nexpose-charts/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/06/update-from-vegas-2014-bsideslv-and-passwordscon/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/06/controlsinsight-new-asset-filtering-based-on-business-context/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/06/tailing-all-your-logs-all-in-one-place/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/05/why-you-need-to-let-go-in-security-to-get-what-you-want/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/04/why-starting-from-scratch-with-security-is-delusional/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/01/federal-friday-8114-threat-sharing-and-cybersecurity-myths/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/01/race-to-root-and-loginpalooza/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/08/01/make-your-devops-team-more-efficient/</loc>
        
        
            <lastmod>2019-08-08</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/31/i-dont-always-write-my-own-web-application-fingerprints-but-when-i-do-i-use-xml/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/31/smart-continuous-delivery-using-automated-testing/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/30/4-ways-to-use-centralized-log-management-for-improved-production-monitoring/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/30/a-new-community-manager-with-a-familiar-face/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/30/rapid7-is-hiring-meet-us-during-hackersummercamp/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/29/embrace-the-change-we-need-in-security-to-reap-the-benefits/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/28/microsoft-false-positives-the-update-is-not-applicable-to-your-computer/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/25/top-3-takeaways-from-the-healthcare-insomnia-get-the-prescription-to-secure-unique-devices-people-and-organizations-webcast/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/25/weekly-metasploit-update/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/24/digging-deeper-on-aws-real-time-alerting-for-windows-security-events/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/24/why-we-can-be-optimistic-in-security-even-in-the-rise-of-compromised-credentials/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/22/cloud-based-syslog-server/</loc>
        
        
            <lastmod>2017-11-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/21/come-crash-my-party-your-invitation-to-our-summer-series/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/18/federal-friday-71814-mobile-movement/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/18/aws-cloudwatch-logs-making-log-management-innovation-easier-and-cheaper/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/17/weekly-metasploit-update-embedded-device-attacks-and-automated-syntax-analysis/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/17/logs-to-metrics-to-json-to-geckoboard/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/17/oracle-cpu-july-2014/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/17/talks-i-am-attending-at-def-con-22/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/16/proactive-with-log-management/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/15/tcp-or-udp-for-logging/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/11/federal-friday-71114-buying-agile/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/11/using-log-analysis-to-find-the-18/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/10/weekly-metasploit-update-2/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/10/how-to-get-full-visibility-of-cloudtrail-cloudwatch-system-logs/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/09/july-patch-tuesday-adobe-flash-steals-the-show/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/08/using-log-data-to-support-mobile-business/</loc>
        
        
            <lastmod>2017-11-01</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/08/meaning-of-assets-with-passwords-hardened-control/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/07/r7-2014-06-disclosure-yokogawa-centum-cs-3000-bkfsimvhfdexe-buffer-overflow/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/07/virtualbox-filename-command-execution-via-gksu/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/03/nexpose-search-update-find-partial-matches-by-default/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/03/federal-friday-7414-a-special-thursday-edition/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/03/simple-logging-to-logentries-from-a-docker-container/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/02/metasploit-weekly-update-prison-break/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/02/new-charts-are-coming/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/07/02/velocityconf-great-times-ghost-busting/</loc>
        
        
            <lastmod>2017-11-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/30/google-cloud-dataflow-a-game-changer/</loc>
        
        
            <lastmod>2020-12-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/30/gartner-calls-for-rebalancing-security-budgets-invest-more-in-detection-vs-prevention/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/28/federal-friday-62714-a-clash-of-cultures/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/27/top-3-takeaways-from-the-need-for-speed-5-tips-to-accelerate-incident-investigation-time-webcast/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/27/scanning-time-machine-reporting-on-a-historical-scan/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/27/smart-integration-testing/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/26/connecting-systems-teams-and-log-data/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/25/log-annotations-its-nice-to-share/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/20/federal-friday-62014-winter-is-coming/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/20/analyzing-your-logs-when-load-testing/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/19/weekly-metasploit-update-6/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/19/new-changes-to-nexpose-search/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/19/the-true-cost-of-free-xfinity-comcast-s-new-wifi-offering/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/18/nexpose-gem-version-080-released/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/18/how-to-run-jmeter-tests-for-500k-users-analyze-log-data-results/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/17/server-monitoring-using-logs/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/17/debugging-rails-with-log-data/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/16/federal-friday-61314-new-group-same-story/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/13/top-4-takeaways-from-the-live-bait-how-to-prevent-detect-and-respond-to-phishing-emails-webcast/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/13/the-relationship-between-data-breaches-and-lost-business/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/12/you-have-no-sql-inj-sorry-nosql-injections-in-your-application/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/12/patch-tuesday-june-2014/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/11/kali-for-ya/</loc>
        
        
            <lastmod>2017-11-04</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/11/weekly-metasploit-update-4/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/10/keep-your-web-browsers-safe-by-always-having-them-updated/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/10/sending-logs-from-your-java-application/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/09/hitting-the-jackpot-with-logentries-time-to-resolution-improves-by-300/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/06/federal-friday-6614-70-years-later/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/06/top-4-takeaways-from-mind-the-gap-5-steps-to-perform-your-own-pci-dss-30-gap-analysis-webcast/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/06/openssl-gets-more-open-scan-for-cve-2014-0224/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/06/managing-devops-across-multiple-clouds/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/05/ccs-injection-vulnerability-severe-vulnerability-shows-we-re-not-done-with-openssl-just-yet/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/05/new-guide-10-tips-for-detecting-malicious-compromised-users/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/05/security-advisory-openssl-vulnerabilities-cve-2014-0224-cve-2014-0221-in-metasploit/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/04/velocityconf-highlights-from-2013/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/03/the-verizon-data-breach-report-key-9-takeaways/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/06/03/how-to-get-useful-log-data-from-your-cloud-services/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/30/federal-friday-53014-social-engineering-from-the-middle-east/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/30/top-3-takeaways-from-7-ways-to-make-your-penetration-tests-more-productive/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/30/new-userinsight-features-detection-of-attacker-hiding-his-trails-phishing-and-better-agentless-end-point-monitoring/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/30/logging-for-windows-phone/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/29/joining-the-rapid7-team/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/29/metasploit-weekly-update-blinding-defenders-by-poking-at-wireshark/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/29/monitoring-the-most-common-tags-and-alerts-in-aws-cloud-trail/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/28/done-with-vulnerability-management-101-tips-for-building-an-advanced-risk-management-program/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/28/whiteboard-wednesday-pen-testing-for-productivity/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/27/got-risk-tag-you-re-it/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/27/velocity-2014-what-were-looking-forward-to/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/26/ive-got-sunshine/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/23/top-3-takeaways-from-9-top-takeaways-from-the-verizon-data-breach-investigations-report/</loc>
        
        
            <lastmod>2019-08-20</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/23/federal-friday-52314-thank-a-veteran/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/23/the-challenges-of-getting-log-data-from-cloud-services/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/23/incident-response-is-about-where-when-and-how/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/22/metasploit-weekly-update/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/22/configuration-free-auto-logging/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/21/becoming-a-metasploit-pro-specialist/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/21/managing-the-impact-of-the-ebay-breach-on-you-and-your-company/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/20/pci-30-seconds-newsletter-36-control-your-administrators-how-to-eliminate-the-keys-to-the-kingdom-problem/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/20/our-favorite-linux-performance-monitoring-tools/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/17/security-incident-notification/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/16/federal-friday-57614-cloudy-with-a-chance-of-insider-threats/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/16/making-azure-asp-net-and-mvc-logging-look-easy/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/16/r7-2014-01-r7-2014-02-r7-2014-03-disclosures-exposure-of-critical-information-via-snmp-public-community-string/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/15/from-the-trenches-the-new-generate-dynamic-stager-auxiliary-uac-bypass-and-nat/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/15/patch-tuesday-may-2014-lots-going-on/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/15/weekly-metasploit-update-more-meterpreters/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/15/trends-in-mobile-log-data-usage/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/14/goodnight-browserscan/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/14/oracular-spectacular/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/14/logging-whats-your-app-doing-right-now/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/13/controlsinsight-a-step-by-step-approach-to-troubleshoot-missing-assets/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/13/using-d3-js-to-graph-your-log-data/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/09/is-av-dead/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/09/federal-friday-5913-renewed-push-for-threat-sharing/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/09/logentries-customer-care-is-not-optional/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/09/r7-2013-192-disclosure-yokogawa-centum-cs-3000-vulnerabilities/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/08/weekly-metasploit-update-10/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/08/cyber-security-around-the-world-8514-uk-information-security-breaches-survey/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/08/log-management-and-analytics-strength-in-numbers/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/07/3-smart-ways-businesses-are-using-log-data/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/06/musings-on-the-future-of-docker/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/06/pay-attention-to-how-people-use-systems-userinsight-in-the-news-at-cso-online/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/06/bad-change-control-is-the-biggest-enemy-of-network-segmentation/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/05/finding-weak-remote-access-passwords-on-pos-devices/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/05/strong-encryption-on-logentries-endpoints/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/02/federal-friday-5214-alphaville-cybersecuritys-westeros/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/02/anti-virus-evasion-makes-vulnerability-validation-more-accurate/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/02/create-dashboards-from-your-logs-data/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/01/perspectives-on-the-2014-verizon-dbir/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/05/01/stolen-passwords-the-no-1-attack-vector/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/30/using-log-data-to-respond-to-security-incidents/</loc>
        
        
            <lastmod>2017-10-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/30/are-your-users-exposed-to-ie-0-day-find-out-who-is-still-using-ie-in-your-organization/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/30/nxa-certification-keep-fighting-the-good-fight/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/29/the-report-of-my-death-was-an-exaggeration-windows-xp-and-mark-twain/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/28/if-you-lived-here-youd-be-home-now-thoughts-on-an-ie-0-day/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/28/ie-0-day-we-got-you-covered/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/25/second-annual-metasploit-t-shirt-design-contest/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/25/federal-friday-42514-a-whole-lot-of-oops/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/25/aggregate-and-group-your-logs/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/24/hackers-dome-an-online-capture-the-flag-ctf-competition/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/24/strategic-embarkation-why-i-am-boarding-the-rapid7-train/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/24/weekly-metasploit-update-8/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/24/sending-your-coreos-log-data/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/23/not-all-vulnerability-management-solutions-are-created-equal/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/23/log-management-alerting/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/23/breaches-of-unusual-size/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/21/love-your-log-data/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/18/federal-friday-41814-mandiant-trends-and-the-federal-cyber-brain-drain/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/18/real-time-log-management/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/17/weekly-metasploit-update-9/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/17/high-performance-distributed-systems/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/16/a-note-on-logentries-security/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/15/exploiting-csrf-without-javascript/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/14/from-the-trenches-av-evasion-with-dynamic-payload-generation/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/14/heartbleed-and-the-law/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/14/heartbleed-war-room-product-faq/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/11/how-are-your-users-affected-by-heartbleeding/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/11/open-letter-to-internet-users-and-businesses-help-us-test-openssl-and-make-the-internet-safer/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/11/sophos-web-appliance-privilege-escalation-and-remote-code-execution-vulnerability/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/11/federal-friday-41114-another-quiet-week/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/11/heartbleed-war-room-faq/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/10/using-nexpose-to-stop-the-bleeding-scanning-for-cve-2014-0160/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/10/automating-logging-to-logentries/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/10/security-advisory-openssl-heartbleed-vulnerability-cve-2014-0160-in-metasploit/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/10/its-the-end-of-xp-as-we-know-it-april-patch-tuesday-2014-and-oh-yeah-heartbleed/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/09/metasploits-heartbleed-scanner-module-cve-2014-0160/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/09/logentries_saved_search/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/08/gaping-ssl-my-heartbleeds/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/08/the-value-of-easy-peasy/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/07/this-week-in-cyber-security-around-the-world/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/07/friends-dont-let-friends/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/07/how-to-save-140-hours-a-month-on-vulnerability-management/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/07/hack-away-at-the-unessential-with-explib2-in-metasploit/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/07/apm-is-not-enough/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/04/federal-friday-4414-dod-embraces-nist-and-increases-cyberwarfare-force/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/04/7-tips-for-booking-your-pci-30-penetration-testing-service-and-why-consultants-will-book-out-early-this-year/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/04/logs-as-data-what-are-the-top-use-cases-for-your-logs/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/02/metasploitable-in-the-cloud/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/02/a-cisos-cloudy-reality/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/01/creating-custom-check-based-on-another-check/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/01/tracking-events-through-complex-stacks-part-2/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/01/wont-someone-think-of-the-av-vendors/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/04/01/this-week-in-cyber-security-around-the-world-2/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/28/r7-2014-05-vulnerability-in-metasploit-modules-fixed/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/28/federal-friday-32814-history-repeats-in-current-phishing-campaigns/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/28/like-msfvenom-heres-a-faster-way-to-generate-stand-alone-metasploit-payloads/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/28/5-great-blogs-for-devops/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/26/driving-risk-prioritization-through-realcontext-in-nexpose-59/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/26/new-metasploit-49-helps-evade-anti-virus-solutions-test-network-segmentation-and-increase-productivity-for-penetration-testers/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/26/hipchat-pagerduty-campfire-integrations-webhooks/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/24/tracking-events-through-complex-stacks-part-1/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/21/tarpits-a-nexpose-killer/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/21/rolling-your-own-logging-solution-when-will-you-jump-off-the-complexity-elevator/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/21/federal-friday-32114-a-day-of-reckoning/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/20/logentries-pixel-tracker/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/19/metasploit-weekly-update-3/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/18/back-to-the-future-with-old-school-devops/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/18/this-week-in-cyber-security-around-the-world-3/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/17/moving-beyond-rsa-conference-and-into-the-real-2014/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/17/synchronizing-clocks-in-a-cassandra-cluster-pt-2-solutions/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/14/federal-friday-31414-new-beginnings-and-new-fed-focused-benchmarks/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/14/debugging-metasploit-modules-with-pry-debugger/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/14/synchronizing-clocks-in-a-cassandra-cluster-pt-1-the-problem/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/13/metasploit-weekly-update-2/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/13/patch-tuesday-march-2014/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/12/devops-vagrant-with-chef-server/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/12/rapid7-for-sans-top-20-compliance/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/11/the-state-of-logging-on-docker/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/10/this-week-in-cyber-security-around-the-world-4/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/10/dogfooding-our-own-solution-cobblers-pet-food-jidoka/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/10/yokogawa-centum-cs3000-vulnerabilities/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/07/archiving-data-are-you-vulnerable/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/07/federal-friday-3714-rapid7-moose-are-on-the-move/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/05/metasploit-weekly-update-4/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/05/new-improved-windows-agent/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/04/dont-be-an-easy-target-testing-your-network-segmentation/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/04/how-to-run-rsyslog-in-a-docker-container-for-logging/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/04/disclosure-r7-2013-18-zte-f460-and-zte-f660-webshellcmdgch-backdoor/</loc>
        
        
            <lastmod>2019-05-10</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/03/this-week-in-cyber-security-around-the-world-5/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/03/rootedcon-2014/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/03/03/walking-the-rsa-conference-floor-a-working-title/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/28/federal-friday-22814-flash-zero-day-targets-foreign-policy-sites-the-irs-gone-phishing/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/28/and-the-winner-isyou/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/26/weekly-metasploit-update-encoding-fu-new-powershell-payload-bug-fixes/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/26/real-user-monitoring-i-need-insight-and-i-need-it-now/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/25/help-for-moving-from-physical-servers-to-the-cloud/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/24/rapid7-nexpose-vmware-nsx-integration/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/21/federal-friday-22114-nato-praises-nists-framework/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/20/metasploit-weekly-update-5/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/20/mobile-apps-a-wealth-of-untapped-data/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/19/highlights-of-the-controlsinsight-23-release/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/19/rapid7-given-vulnerability-management-market-penetration-leadership-award-by-frost-sullivan/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/19/an-inflection-point-for-mobile-devices-app-monitoring/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/18/when-s-history-going-to-repeat-itself-in-your-organization/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/18/lets-talk-about-your-security-breach-with-metasploit-literally/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/18/pci-30-seconds-newsletter-36-patch-management-how-to-comply-with-pci/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/17/this-week-in-cyber-security-around-the-world-6/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/14/federal-friday-21414-nist-s-cybersecurity-framework-v-10-released/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/14/shellcode-golf/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/13/weekly-metasploit-update-16/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/12/patch-tuesday-february-2014-also-say-buh-bye-to-md5/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/12/the-devops-tools-we-use-how-we-use-them/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/11/34804-the-next-40-attacked-the-us-federal-government/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/11/your-pentest-tools-arsenal/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/11/this-week-in-cyber-security-around-the-world-7/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/10/leverage-the-power-of-resource-scripts/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/07/federal-friday-2714-third-party-problems-olympics-edition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/06/weekly-metasploit-update-17/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/06/how-one-breach-can-lead-to-many-others/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/06/whats-so-great-about-aws-s3-archiving/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/05/attacker-theory-vs-attacker-practical-webinar-thursday-february-6-200-pm-est/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/04/how-to-check-if-logs-are-getting-blocked-by-a-firewall/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/04/pwn-faster-with-metasploits-multi-host-check-command/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/04/how-to-save-12-hours-a-day-investigating-an-it-security-threat-and-millions-of-dollars-resolving-with-userinsight/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/03/new-ms08-067/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/03/40-of-the-country-hacked/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/02/03/security-controls-in-practice/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/31/federal-friday-13114-positioning-for-a-holistic-cybersecurity-deployment/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/31/new-findings-on-target-breach-could-monitoring-privileges-help/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/30/hacking-as-one-moose/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/28/how-to-monitor-the-health-of-your-application-and-infrastructure-with-the-same-solution/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/27/supporting-the-security-community-why-i-joined-rapid7/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/24/federal-friday-12414-threats-from-afar/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/24/hacking-printers-with-metasploit/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/23/firefox-privileged-payloads/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/23/weekly-metasploit-update-18/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/22/amazon-s3-archiving-you-asked-we-delivered/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/21/could-a-frappuccino-make-you-vulnerable/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/21/controlsinsightcontrols-discussed/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/21/global-tags-alerts/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/17/free-tools-the-best-free-tools-of-2013/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/17/news-on-the-embedded-systems-land/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/17/rapid7-coming-to-a-city-near-you/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/17/federal-friday-11714-don-t-forget-to-wipe-your-device/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/17/security-lessons-learned-in-2013-the-year-of-deception-based-attacks/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/16/famous-quotes-and-their-bearing-on-information-security/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/16/january-2014-patch-tuesday/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/16/target-breach-could-now-compromise-your-users/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/16/weekly-metasploit-update-11/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/16/how-to-send-log-data-via-a-proxy-server-using-rsyslog/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/15/free-webcast-from-framework-to-pro-using-metasploit-pro-in-penetration-tests/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/15/a-place-for-everything-and-everything-in-its-place-custom-vulnerability-content/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/14/how-to-monitor-windows-with-logentries/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/14/enabledisable-security-controls-feature/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/11/federal-friday-11014-welcome-to-2014/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/11/metasploit-now-supports-malware-analysis-via-virustotal/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/10/pci-30-seconds-newsletters-published-so-far/</loc>
        
        
            <lastmod>2017-08-29</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/09/piercing-saprouter-with-metasploit/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/09/weekly-metasploit-update-14/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/09/integrating-logentries-and-scala/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/08/make-your-voice-heard-influence-metasploit-s-future/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/07/happy-2014-controlsinsight-followers-join-us-for-the-rapid7-roadshow/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/07/security-guide-evading-anti-virus-detection/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/07/5-tricks-to-become-a-logentries-power-user/</loc>
        
        
            <lastmod>2017-10-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/06/12-days-of-haxmas-metasploit-wrap-up/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/05/a-cat-and-mouse-game-between-exploits-and-antivirus/</loc>
        
        
            <lastmod>2020-02-12</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/04/diving-into-git-for-current-and-future-metasploit-devs/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/03/in-case-of-emergency-break-glass-unable-to-update-past-nexpose-version-580/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/03/donut-vigilante-raided-and-arrested-at-metasploit/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/02/12-days-of-haxmas-finding-shellbindtcprandomport-with-nmap-and-ndiff/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/02/four-things-you-can-do-to-improve-your-security-testing-in-2014/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/02/2014-predictions-cloudy-with-a-chance-of-data-loss/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2014/01/02/fun-with-icmp-exfiltration/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/31/metasploit-closes-out-2013/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/31/happy-new-year-from-the-engineers-at-nexpose/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/30/12-days-of-haxmas-supermicro-pwnage/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/30/did-cloud-kill-your-siem/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/29/remote-js-an-insecure-pattern-in-rails-code/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/28/live-up-your-name-as-your-familys-computer-wizard-with-metasploit/</loc>
        
        
            <lastmod>2020-01-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/27/meterpreter-reloaded/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/27/federal-friday-122713-tis-the-season/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/26/ui-vulnerability-exception-query/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/26/apple-safari-makes-password-stealing-fun-and-easy-yes-please/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/25/haxmas-sap/</loc>
        
        
            <lastmod>2021-04-07</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/23/the-adobe-breach-how-did-it-impact-you/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/20/bypassing-the-reader-sandbox-like-in-the-wild/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/20/federal-friday-122013-deck-the-halls-edition/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/20/metasploit-weekly-update-6/</loc>
        
        
            <lastmod>2017-08-19</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/19/revitalized-suse-coverage/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/19/how-to-configure-rsyslog-with-any-log-file-agents-bad-no-agents-good/</loc>
        
        
            <lastmod>2017-11-06</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/18/sql-export-report-using-the-api/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/18/controlsinsight-year-in-review/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/18/give-me-access-to-my-data/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/18/5-uses-for-log-data-that-you-never-thought-of/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/18/operating-system-up-to-date-control/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/16/pci-dssv30-rapid7s-guide-to-compliance/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/16/rapid7-webcasts-a-great-week-to-learn-about-pentesting-sap-infrastructures/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/13/federal-friday-121313-phishing-with-tumblr-and-pricing-for-worms/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/13/7-tips-for-safe-online-shopping-this-holiday-season/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/12/december-2013-patch-tuesday/</loc>
        
        
            <lastmod>2017-07-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/12/weekly-metasploit-update-12/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/12/assets-tab-redesign-faster-access-to-asset-data/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/12/top-3-reasons-small-to-medium-businesses-fail-at-security/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/12/big-data-is-getting-bigger-and-faster-how-we-help-you-handle-it/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/12/nex-37823-xss-in-nexpose-vuln-summaryjsp/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/11/pwnsap-tweet-chat-debrief/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/10/in-defense-of-the-agent/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/06/federal-friday-12613-post-turkey-digest/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/06/social-engineering-would-you-fall-for-this-phone-call/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/05/new-faster-administration-page-in-nexpose-58/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/05/weekly-metasploit-update-13/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/05/logentries-add-ons-for-heroku-environment-pt-1-cloudamqp/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/03/log-management-101-where-do-logs-come-from/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/02/a-pentester-s-introduction-to-sap-abap/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/12/02/honest-advice-from-rapid7s-chief-information-officer/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/27/trendsetting-with-controlsinsight/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/26/weekly-metasploit-update-15/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/26/announcing-our-new-convenient-powerful-tags-and-alerts/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/26/pci-30-seconds-newsletter-34-pci-dss-v3-should-you-care-changes-and-impacts/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/25/pwnsap-join-us-for-a-tweet-chat-on-dec-3/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/20/weekly-update/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/20/where-are-my-aws-logs/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/20/cloud-service-risk-cloud-monitoring-doesn-t-matter/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/19/how-controlsinsight-aligns-to-sans-20-critical-security-controls/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/18/rapid7-in-the-sc-awards/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/15/federal-friday-111513-weekly-recap/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/15/exploiting-the-supermicro-onboard-ipmi-controller/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/15/november-2013-patch-tuesday-summary/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/14/reinvent-keynote-day-2-verner-talks-innovation-and-announces-kinesis/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/14/new-in-5716-search-and-track-assets-by-open-ports/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/14/announcing-opsstream-for-aws-combining-cloudwatch-cloudtrail-trusted-advisor/</loc>
        
        
            <lastmod>2017-11-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/14/something-to-look-forward-to-in-metasploit-48/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/14/reinvent-keynote-overview-amazon-cloudtrail-appstream-and-workspaces-announced/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/13/logentries-partner-add-ons-program/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/13/dont-get-blindsided-better-visibility-into-user-and-asset-risks-with-metasploit-48/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/13/network-complexity-is-dangerouslong-live-complexity/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/12/customer-triggered-assessments/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/11/learn-to-pentest-sap-with-metasploit-as-erp-attacks-go-mainstream/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/08/federal-friday-11813-zero-day-phishing-and-mobile/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/08/ctf365-information-security-through-gamification-learning-training-improving/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/07/pci-30-seconds-newsletter-33-key-takes-away-from-the-pci-community-meeting-2013/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/06/weekly-update-2/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/06/supermicro-ipmi-firmware-vulnerabilities/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/05/nexpose-and-controlsinsight-better-together-2/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/05/nexpose-and-controlsinsight-better-together/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/05/how-to-dynamically-pick-up-logs-when-scaling-your-amazon-web-services-ec2-environment/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/04/soho-router-horror-stories-german-webcast-with-mike-messner/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/01/federal-friday-11113-a-war-on-two-fronts/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/11/01/vulnerability-management-and-expert-systems/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/31/national-cyber-security-awareness-month-the-value-of-vigilance/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/31/hashtags-and-headphones-the-first-winner/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/31/digging-into-22-billion-heroku-log-entries-forget-big-data-its-the-little-data-that-matters/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/31/nightmare-on-pwn-street/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/30/weekly-update-3/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/30/seven-foss-disclosures-part-one/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/30/seven-tricks-and-treats/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/30/project-sonar-one-month-later/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/30/legal-considerations-for-widespread-scanning/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/29/the-controlsinsight-unique-password-control/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/29/social-engineer-ctf-report-released/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/29/log-maths-why-you-dont-want-to-play-spot-the-error/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/28/estimating-readynas-exposure-with-internet-scans/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/25/federal-friday-102513-some-semblance-of-normalcy/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/25/the-security-space-age/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/25/national-cyber-security-awareness-month-avoiding-cloud-crisis/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/23/responsible-for-security-assessments-you-need-to-join-me-tomorrow/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/23/close-the-gates-by-updating-your-browsers/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/22/how-to-easily-get-all-your-logs-from-amazon-web-services-ec2/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/18/federal-friday-10182013-the-were-back-in-business-edition/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/18/send-the-attackers-elsewhere/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/17/weekly-update-11/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/17/audit-the-security-configuration-on-your-cisco-devices-with-nexpose-5714/</loc>
        
        
            <lastmod>2019-02-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/17/log-data-for-business-insights-how-marketing-at-logentries-uses-logentries/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/16/national-cyber-security-awareness-month-basic-password-hygiene/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/16/whiteboard-wednesday-dread-methodology/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/16/oracle-october-2013-cpu-roundup/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/16/how-vulnerable-are-your-phishing-targets/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/15/asset-search-assets-cannot-hide-anymore/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/15/putting-the-fax-straight-rapid7com-and-metasploitcom-website-defacement/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/15/how-to-track-peak-load-and-memory-usage-vs-response-time-on-heroku/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/14/pci-30-seconds-newsletter-32-money-for-nothing/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/11/what-actually-happened-the-challenges-of-incident-response/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/11/and-then-there-were-9/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/10/patch-tuesday-october-2013/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/10/how-to-receive-log-alerts-via-flashing-lights-in-your-office-or-home/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/09/weekly-update-18/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/09/whiteboard-wednesday-the-three-controls-you-may-not-be-using/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/09/passive-network-discovery-sniffing-for-network-discovery-with-metasploits-metamodules/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/08/gleaning-value-from-the-controlsinsight-executive-report/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/08/how-to-track-business-metrics-in-3-simple-steps-log-em-tag-em-report-em/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/07/national-cyber-security-awareness-month-keeping-mobile-devices-safe/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/04/gestioip-authenticated-remote-command-execution-module/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/04/its-the-great-pumpkin-patching-contest-charlie-brown/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/03/weekly-update-19/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/03/two-computer-nerds-enter-a-bar/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/02/national-cyber-security-awareness-month-foiling-phishing/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/02/a-history-about-hard-conditions/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/10/01/leveraging-the-controlsinsight-rest-api-v10/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/30/metasploit-releases-cve-2013-3893-ie-setmousecapture-use-after-free/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/27/federal-friday-92713-attackers-changing-tactics/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/27/introducing-rapid7-userinsight/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/27/join-project-sonar-and-scanallthethings/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/26/internet-wide-probing-rapid7-sonar/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/26/welcome-to-project-sonar/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/25/weekly-update-22/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/25/change-the-theme-get-a-shell/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/24/understanding-security-control-grades/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/24/ie-0-day-exploit-code-is-now-widely-available-cve-2013-3893/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/24/how-to-log-client-side-javascript-events-logging-for-the-web-with-le-js/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/23/rapid7s-new-contest-hashtags-and-headphones/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/23/kvasir-penetration-data-management/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/20/federal-friday-92013-the-air-gapped-off-line-edition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/19/vulnerability-display-filters-is-now-live/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/19/getting-nexpose-help-to-load-in-your-community-edition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/19/using-the-gem-for-shared-credentials/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/18/weekly-update-23/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/17/the-threat-within-riskrater-user-risk-report/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/17/site-import-procedure/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/13/federal-friday-91313-apples-touch-id-release/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/13/why-business-execs-know-more-about-security-than-you-do/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/13/ann-nepose-gem-05-release/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/12/weekly-update-5/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/12/video-tutorial-introduction-to-xml-external-entity-injection/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/11/patch-tuesday-sept-2013/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/10/controlsinsight-the-operational-report/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/06/federal-friday-9613-pocbs-edition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/05/weekly-update-7/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/09/05/cve-2013-1662-vmware-mount-exploit/</loc>
        
        
            <lastmod>2017-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/30/dhsfbi-highlight-the-importance-of-keeping-android-devices-updated/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/30/rapid7-free-tools-download-today/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/29/vmworldtv-2013-rapid7/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/29/weekly-update-9/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/29/finding-out-what-users-are-doing-on-your-network/</loc>
        
        
            <lastmod>2020-04-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/28/firewall-egress-filtering-why-and-how-you-should-control-whats-leaving-your-network/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/28/whiteboard-wednesday-united-edition/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/28/pci-30-seconds-newsletter-31-pci-dss-crypto-framework/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/27/rapid7-part-of-vmware-nsx-partner-ecosystem/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/27/flatten-the-learning-curve/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/26/upcoming-g20-summit-fuels-espionage-operations/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/23/federal-friday-weekly-recap-8232013/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/23/riskrater-endpoint-report/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/22/weekly-update-13/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/19/looking-for-centrics/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/19/introducing-rapid7-controls-insight/</loc>
        
        
            <lastmod>2017-08-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/19/byebye-and-the-targeting-of-pakistan/</loc>
        
        
            <lastmod>2017-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/16/r7-vuln-2013-07-24/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/15/time-to-patch-joomla/</loc>
        
        
            <lastmod>2017-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/15/weekly-update-15/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/15/august-patch-tuesday-2/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/14/filtering-file-names-on-client-side/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/13/field-level-search/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/09/secureninjatv-interview-tod-beardsley-about-metasploit-10th-anniversary/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/07/weekly-update-16/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/07/heres-that-fbi-firefox-exploit-for-you-cve-2013-1690/</loc>
        
        
            <lastmod>2017-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/07/black-hat-conference-floor/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/08/02/capture-the-flag-at-bsideslv/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/31/greetings-from-blackhat-2013/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/26/federal-friday-weekly-recap-72613/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/26/build-your-own-sms-alerts-logentries-and-clickatell-combined/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/25/bulk-asset-delete-operations-via-the-asset-filter-page/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/24/metasploit-weekly-update-7/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/19/how-to-best-structure-your-logs-logging-tips-and-best-practices-with-gal-segal-from-etoro/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/18/asset-discovery-troubleshooting-guide/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/17/simplifying-security-programs-with-nexpose-57/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/17/security-testing-just-got-easier-metasploit-47-with-new-metamodules/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/17/oracle-cpu-july-2013/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/16/metasploit-design-contest-winners/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/15/if-you-can-t-explain-it-simply-you-don-t-understand-it-well-enough/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/12/federal-friday-weekly-recap-7-11-2013/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/11/patch-tuesday-july-edition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/11/assessing-risk-beyond-cvss/</loc>
        
        
            <lastmod>2018-02-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/10/good-exploits-never-die/</loc>
        
        
            <lastmod>2017-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/10/metasploit-update/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/10/introducing-riskrater-a-free-tool-for-benchmarking-endpoint-mobile-and-user-risk-management-programs/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/09/buttinsky-release-one/</loc>
        
        
            <lastmod>2017-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/03/metasploit-update-weaponizing-local-exploits/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/03/one-year-after-end-of-magnificent-7-project/</loc>
        
        
            <lastmod>2017-08-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/03/searching-with-logical-operators/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/07/02/a-penetration-testers-guide-to-ipmi/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/28/customer-spotlight-adept-mobile/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/28/weekly-update-4/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/28/federal-friday-62913-weekly-recap/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/27/from-the-wild-to-metasploit/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/27/hackmiami2013/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/21/cuckoo-sandbox-approaching-10/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/21/federal-friday-weekly-recap-62113/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/20/weekly-update-6/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/20/xss-vs-injection/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/14/video-tutorial-installing-kali-linux-on-bootable-persistent-usb/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/14/weekly-update-8/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/14/pci-30-seconds-newsletter-30-trainings-your-organization-must-deliver-to-comply-with-pci-dss/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/14/musings-from-an-awsmeetup-boston/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/13/custom-vulnerability-checks-using-nexposes-vulnerability-schemas/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/13/dev-ops-scaling-infrastructure/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/12/whiteboard-wednesday-pci-compliance/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/12/patch-tuesday-june-edition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/12/is-it-a-pen-test-an-audit-or-a-vulnerability-assessment/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/07/keyboy-targeted-attacks-against-vietnam-and-india/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/07/have-a-taste-of-communism-with-a-mouthful-of-apt/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/06/vulnerability-assessment-evaluation-criteria/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/06/weekly-update-10/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/06/03/video-tutorial-introduction-to-web-application-pen-testing/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/30/guide-to-http-header-configuration/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/30/weekly-update-12/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/30/john-the-ripper-180/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/29/new-vulnerability-trending-report-available-in-nexpose/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/29/securitystreet-talks-houston/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/25/using-nexpose-to-set-short-term-goals-and-demonstrate-it-security-progress/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/24/heroku-account-consolidation-single-view-of-all-your-logs/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/23/using-nexpose-to-scan-for-vulnerabilities-associated-with-iava-alerts/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/22/weekly-update-14/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/22/easily-assessing-wireless-networks-with-kali-linux/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/20/git-clone-metasploit-dont-svn-checkout/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/17/logentries-new-feature-round-up/</loc>
        
        
            <lastmod>2017-10-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/15/nexpose-56-top-remediation-reports-reports-that-provide-the-biggest-bang-for-your-buck/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/15/new-1day-exploits-mutiny-vulnerabilities/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/15/may-2013-patch-tuesday-the-yet-another-ie-0-day-edition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/13/vaccinating-systems-against-vm-aware-malware/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/10/april-nodejs-meetup-in-dublin-from-a-newbies-perspective/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/08/creating-asset-groups-from-ips/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/08/announcement-end-of-life-for-nexpose-32-bit-versions/</loc>
        
        
            <lastmod>2019-01-18</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/08/whiteboard-wednesday/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/07/tail-f-is-dead-long-live-tail-f/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/06/using-dynamic-asset-groups-to-detect-0-day-vulnerabilities/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/06/pci-30-seconds-newsletter-29-do-all-pci-dss-requirements-apply-to-me/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/06/switching-between-utc-and-local-time/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/05/department-of-labor-ie-0day-now-available-at-metasploit/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/03/metasploits-10th-anniversary-laptop-decal-design-competition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/02/weekly-update-17/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/01/nexpose-56-cis-rhel-certified/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/05/01/live-tail/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/30/webcast-qa-owasp-top-10-and-web-app-scanning-webcast/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/29/spying-on-the-seven-seas-with-ais/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/29/livingsocial-breached/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/25/abusing-safaris-webarchive-file-format/</loc>
        
        
            <lastmod>2017-08-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/25/simplify-vulnerability-management-with-nexpose-56/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/25/social-media-vector-for-the-new-economic-attack/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/24/weekly-update-20/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/23/ip-address-resolving-now-optional/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/23/serial-offenders-widespread-flaws-in-serial-port-servers/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/23/inaugural-php-dublin-meetup-at-engineyard/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/22/microsoft-emet-40-might-be-the-best-enterprise-security-tool-youre-not-using-yet/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/18/weekly-update-21/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/18/running-internal-pentests-remotely-with-metasploit-pro/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/17/oracle-april-2013-cpu-42-java-vulns/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/16/fooling-malware-like-a-boss-with-cuckoo-sandbox/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/15/how-to-set-up-the-management-frontend-for-ghost/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/15/top-10-tips-stay-safe-from-phishing-on-tax-day/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/14/herokus-add-on-provider-summit-london/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/12/botnets-and-the-war-on-bitcoin/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/12/patch-tuesday-april-2013-edition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/10/metasploit-adds-owasp-top-10-2013-and-penetration-test-wizards/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/10/weekly-update-metasploit-460/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/10/video-tutorial-installing-kali-linux-on-virtual-box/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/08/logs-as-data-logs-as-sms-logentries-twillio-combined/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/05/compromising-embedded-linux-routers-with-metasploit/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/04/weekly-update-24/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/03/pci-30-seconds-newsletter-28-the-pci-library-what-docs-are-required/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/04/01/metasploit-now-supports-plan-9-the-evolution-of-unix/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/28/weekly-update-26/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/27/open-s3-buckets/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/21/weekly-update-27/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/21/internet-census-2012-thoughts/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/20/whiteboard-wednesday-metasploitable/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/14/calculating-your-average-scan-time/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/13/patch-tuesday-march-2013-edition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/13/metasploit-now-supports-kali-linux-the-evolution-of-backtrack/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/12/exploit-popularity-contest/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/12/bridgint-asset-groups-and-sites-using-the-nexpose-gem/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/11/cve-2013-0108-honeywell-ebi/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/09/psexec-demystified/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/07/video-tutorial-introduction-to-pen-testing-simple-network-management-protocol-snmp/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/06/pci-30-seconds-newsletter-27-static-versus-active-protection-systems-what-impact-on-quarterly-scans/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/06/whiteboard-wednesday-abusing-windows-remote-management-with-metasploit/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/06/postgresql-we-got-you-covered/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/04/new-heap-spray-technique-for-metasploit-browser-exploitation/</loc>
        
        
            <lastmod>2019-10-02</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/04/using-scripts-to-analyze-your-security-console/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/03/01/do-you-unknowingly-exfiltrate/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/27/malicious-ssids-and-web-apps/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/25/making-the-nexpose-gem-easier-to-use/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/25/java-abused-in-the-wild-one-more-time/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/21/weekly-update-29/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/21/per-log-retention-period/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/20/password-auditing-with-metasploit/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/20/vulnerability-correlation-enabled-by-default/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/15/weekly-update-30/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/14/port-forwarding-how-to-verify-that-the-payload-can-connect-back-to-metasploit/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/13/white-house-cybersecurity-executive-order/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/13/adobe-reader-sandbox-escaping-0day-reported/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/13/patch-tuesday-february-2013-edition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/11/getting-started-with-the-nexpose-virtual-appliance/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/07/whiteboard-wednesday-password-security-tips/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/06/weekly-update-25/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/06/video-tutorial-basics-of-using-sqlmap-automated-sql-injection-audit-tool/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/05/webhooks-are-hmac-authenticated/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/04/twitter-hacked/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/02/01/stage-encoding-or-how-i-learned-to-stop-worrying-and-love-the-string-operator/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/30/weekly-update-28/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/30/to-debian-and-beyond/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/30/latest-coverage-vlc-media-player/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/29/exploit-for-ruby-on-rails-cve-2013-0333/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play/</loc>
        
        
            <lastmod>2017-10-09</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/28/ray-sharp-cctv-dvr-password-retrieval-remote-root/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/24/weekly-update-31/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/24/pci-30-seconds-newsletter-27-pcip-is-it-worth/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/24/demystifying-pci-dss-a-rapid7-ebook/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/23/whats-new-in-nexpose-557/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/23/new-vmware-esxesxi-coverage-is-elegant-in-its-simplicity/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/23/the-forgotten-spying-feature-metasploits-mic-recording-command/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/22/new-java-modules-in-metasploit-no-0-days-this-time/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/17/weekly-update-32/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/17/metasploit-updates-and-msfupdate/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/17/evading-anti-virus-detection-whiteboard-wednesday/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/16/hacking-like-its-1985-rooting-the-cisco-prime-lan-management-solution/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/16/buried-under-the-oracle-patching-avalanche-january-2013-edition/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/15/december-exploit-trends/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/15/video-tutorial-introduction-to-burp-suite-15-web-pen-testing-proxy/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/14/january-is-not-over-yet/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/11/omg-java-everybody-panic/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/10/exploiting-ruby-on-rails-with-metasploit-cve-2013-0156/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/10/weekly-metasploit-update-24/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/08/adobe-joins-the-january-patching-fun/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/08/microsoft-patch-tuesday-january-8-2013/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/08/compiling-payloads-on-the-fly-for-postgresql/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/08/free-metasploit-penetration-testing-lab-in-the-cloud/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/04/weekly-metasploit-update-27/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/03/the-malware-lifecycle-whiteboard-wednesday/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2013/01/03/using-backtrack-5-r3-with-metasploit-community-or-metasploit-pro/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/31/guide-to-monitoring-jvm-memory-usage-draft/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/30/microsoft-internet-explorer-0-day-marks-the-end-of-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/27/how-to-extract-any-archive/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/27/security-death-match-open-source-vs-pay-for-play-exploit-packs/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/24/twas-the-night-before-a-big-breach/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/21/how-metasploit-s-3-step-quality-assurance-process-gives-you-peace-of-mind/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/19/new-metasploit-exploit-crystal-reports-viewer-cve-2010-2590/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/19/weekly-metasploit-update-32/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/19/how-can-i-protect-against-phishing-whiteboard-wednesdays/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/19/pci-30-seconds-newsletter-25-a-new-standard-is-born/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/18/5-tips-to-ensure-safe-penetration-tests-with-metasploit/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/17/metasploit-hooks/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/14/microsoft-security-bulletin-summary-for-december-2012/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/14/the-odd-couple-metasploit-and-antivirus-solutions/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/14/weekly-metasploit-update-19/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/11/exploit-trends-new-exploits-make-the-top-10/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/11/enhanced-reporting-user-experience/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/10/nexpose-55-reporting-and-configuration-assessment-overview/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/07/metasploit-hits-1000-exploits/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/07/go-phishing-how-to-manage-phishing-exposure-with-metasploit/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/06/skynet-a-tor-powered-botnet-straight-from-reddit/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/05/what-would-trinity-do-with-kingcopes-ssh-0day/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/12/03/a-new-look-for-rapid7/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/30/lets-do-followfriday-the-metasploit-way/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/29/video-tutorial-introduction-to-custom-exploits-for-buffer-overflows-local-privilege-escalation/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/28/weekly-metasploit-update-20/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/28/invasion-of-the-mobile-monster/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/26/getting-terminal-colors-right/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/26/lets-have-more-colors/</loc>
        
        
            <lastmod>2018-03-13</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/21/weekly-metasploit-update-47/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/20/whats-in-your-latest-nexpose-coverage-update/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/19/pci-30-second-newsletter-24-pcico-strengthens-the-scoping-rules/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/15/weekly-metasploit-update-22/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/14/microsoft-security-bulletin-summary-for-november-2012/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/09/feature-requests/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/08/abusing-windows-remote-management-winrm-with-metasploit/</loc>
        
        
            <lastmod>2020-10-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/05/rapid7-is-a-boston-globe-top-place-to-work-again/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/05/exploit-trends-october/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/11/01/weekly-metasploit-update-26/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/31/why-you-should-care-about-ipv6-security-even-if-you-think-you-shouldnt-whiteboard-wednesday/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/31/how-to-save-150-hours-a-month-with-your-vulnerability-management-program-whiteboard-wednesday/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/30/rapid7-at-the-movies-halloween-special/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/29/weekly-metasploit-update-30/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/29/pci-2013-sigs-now-open-for-po-votes/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/21/buttinsky-hello-world/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/19/weekly-metasploit-update-33/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/17/how-to-justify-your-penetration-testing-budget-whiteboard-wednesdays/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/17/john-the-ripper-joins-magnificent7/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/16/ghost-an-introduction/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/15/welcome-to-securitystreet/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/15/cve-2012-4933-novell-zenworks/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/12/weekly-metasploit-update-36/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/11/pci-30-seconds-newsletter-23-introduction-to-risk-assessment/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/11/multi-tenant-silo-provisioning-through-api/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/10/microsoft-security-bulletin-summary-for-october-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/10/reporting-united-security-summit-2012-cpes/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/09/cooking-up-engine-yard-logs-with-chef/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/09/multi-tenant-user-provisioning/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/08/phpfog-application-logging/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/08/exploit-trends-java-and-ie-0days/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/04/nexpose-site-creation-now-with-more-scheduling/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/04/weekly-metapsloit-update/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/03/defeat-the-hard-and-strong-with-the-soft-and-gentle-metasploit-ropdb/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/03/moving-from-hml-high-medium-low-hell-to-security-heaven-whiteboard-wednesdays/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/03/how-to-generate-reports-through-the-api/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/02/white-house-spear-phished/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/10/02/nexpose-reporting-with-the-java-api-client/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/27/creating-a-bunch-of-users-at-once-using-the-nexpose-api/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/27/focus-on-the-first-input-element-in-jquery/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/26/weekly-metasploit-update-21/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/26/what-is-penetration-testing-whiteboard-wednesdays/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/25/apis-the-fastest-and-easiest-way-to-get-nexpose-integrated-in-your-environment/</loc>
        
        
            <lastmod>2017-07-24</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/25/how-to-find-latest-ie-vulnerability-cve-2012-4969-with-nexpose/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/21/how-do-i-know-if-my-heroku-app-is-slow/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/20/cve-2012-2122-mysql-password-vulnerability-scanner-scannow/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/19/weekly-metasploit-update-23/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/19/united-security-summit-2012-post-wrap-info/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/19/using-nexpose-at-home-scanning-reports/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/18/webcast-decrease-your-risk-of-a-data-breach-effective-security-programs-with-metasploit/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/17/lets-start-the-week-with-a-new-internet-explorer-0-day-in-metasploit/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/15/man-on-the-securitystreet-united-day-3/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/14/man-on-the-securitystreet-day-2-continued/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/13/man-on-the-securitystreet-united-day-2/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/13/microsoft-security-bulletin-summary-for-september-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/13/seek-and-you-shall-findinformation/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/13/man-on-the-securitystreet-united-day-1/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/12/weekly-metasploit-update-25/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/12/current-user-psexec/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/12/united-security-summit-your-man-on-the-street/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/06/weekly-metasploit-update-28/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/06/cve-2012-2611-the-walk-to-the-shell/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/09/05/exploit-trends-august-java-0-day/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/30/weekly-metasploit-update-29/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/29/hair-today-con-tomorrow/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/27/webcast-playing-in-the-sandbox-open-source-tools-for-threat-intelligence/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/27/lets-start-the-week-with-a-new-java-0day/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/23/weekly-metasploit-update-31/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/23/when-lifes-a-breach-dont-be-a-breach-bum/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/23/pci-30-seconds-newsletter-22-dont-get-lost-in-translation-with-executives-get-them-listening/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/21/metasploit-portable-ios/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/20/soc-monkey-week-in-review-82012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/17/adobe-flash-player-exploit-cve-2012-1535-now-available-for-metasploit/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/16/weekly-metasploit-update-34/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/16/microsoft-security-bulletin-summary-for-august-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/15/the-stack-cookies-bypass-on-cve-2012-0549/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/14/sc-magazine-awards-round-2/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/13/soc-monkey-week-in-review-81312/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/10/exploit-trends-july/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/09/theres-a-hole-in-the-network/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/09/weekly-metasploit-update-35/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/09/nexpose-report-category-filtering-focus-focus-focus/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/08/security-configuration-assessment-capabilities-that-meet-your-needs-with-nexpose-54/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/08/finfisher/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/08/06/soc-monkey-week-in-review-8612/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/31/video-pen-testing-html-5-web-storage/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/30/soc-monkey-week-in-review-73012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/26/magnificent7-in-the-press/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/24/cuckoo-sandbox-04-is-here/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/24/tutorial-using-web-command-injection-vulnerability-to-gain-administrative-shell-on-windows-web-server/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/23/soc-monkey-week-in-review-72312/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/19/logentries-goes-jelastic/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/18/video-introduction-to-basic-host-and-service-discovery-scanning/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/17/risk-validation-and-verification-in-vulnerability-management-with-metasploit/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/17/lessons-learned-from-yahoo-breach/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/17/soc-monkey-week-in-review-71612/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/12/microsoft-security-bulletin-summary-for-july-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/12/weekly-metasploit-update-41/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/11/it-isnt-always-about-buffer-overflow/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/10/exploit-trends-ms12037sameid-msxmlgetdefinitioncodeexec-mysqlauthbypasshashdump/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/10/tutorial-how-to-scan-exploit-metasploitable-2-using-metasploit-nexpose-nessus-nmap-and-john-the-ripper/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/09/the-end-of-dnschanger-business-as-usual-for-the-other-400-million/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/09/soc-monkey-week-in-review-7912/</loc>
        
        
            <lastmod>2021-01-21</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/06/an-example-of-egghunting-to-exploit-cve-2012-0124/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/06/stack-smashing-when-code-execution-becomes-a-nightmare/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/05/weekly-metasploit-update-42/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/05/part-1-metasploit-module-development-the-series/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/04/small-business-experience-with-nexpose-to-help-meet-pci-compliance/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/03/vulnerabilities-in-my-samba-its-more-likely-than-you-think/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/03/untangle-the-knot-risk-assessment-essentials/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/02/soc-monkey-week-in-review-722012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/07/02/pci-30-seconds-newsletter-20-qualified-internal-scanning-staff-using-appropriate-scanning-tools-what-does-that-mean/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/29/tutorial-using-sql-injection-to-generate-cross-site-scripts/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/29/5-non-technical-reasons-organization-get-breached/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/28/weekly-metasploit-update-43/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/28/using-nexpose-at-home-theory/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/26/metasploit-team-collaboration-mentoring/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/25/soc-monkey-week-in-review-62512/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/25/press-f5-for-root-shell/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/22/the-secret-sauce-to-cve-2012-0779-adobe-flash-object-confusion-vulnerability/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/21/direct-downloads/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/20/weekly-metasploit-update-44/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/20/how-does-the-sustaining-team-at-rapid7-making-nexpose-better/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/19/pci-penetration-testing-metasploit-report/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/18/metasploit-exploits-critical-microsoft-vulnerabilities/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/18/soc-monkey-week-in-review-6182012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/16/tutorial-how-to-discover-hosts-using-metasploit-community-edition/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/16/tutorial-basics-of-launching-exploits-from-metasploit-community-edition/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/16/tutorial-importing-nmap-xml-into-metasploit-community-edition/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/16/tutorial-how-to-forward-connection-through-meterpreter-shell-to-reach-internal-web-server/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/16/tutorial-using-metasploit-community-edition-built-in-exploit-analysis/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/16/tutorial-how-to-use-export-hashdumped-creds-to-jtr/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/16/tutorial-how-to-import-nessus-scan-into-metasploit-community-edition/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/14/weekly-update-33/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/13/microsoft-security-bulletin-summary-for-june-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/13/oracle-issues-java-security-fixes/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/13/introducing-metasploitable-2/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/12/metasploit-custom-reporting-templates/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/11/its-time-to-ban-bad-passwords/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/11/scanning-for-vulnerable-f5-bigips-with-metasploit/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/11/soc-monkey-week-in-review-61112/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/11/pci-30-seconds-newsletter-18-pci-versus-sans-or-minimum-versus-critical/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/11/cve-2012-2122-a-tragically-comedic-security-flaw-in-mysql/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/08/microsoft-releases-windows-server-update-services-wsus/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/08/nexpose-adds-cyberscope-support/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/08/iphone-notifications/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/08/logs-in-the-phpfog/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/07/weekly-metasploit-update-37/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/06/nexpose-shared-scan-credential-to-your-rescue/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/06/how-to-change-your-linkedin-password/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/05/mays-top-10-most-searched-metasploit-exploit-and-auxiliary-modules/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/04/managing-your-nexpose-scan-engines-through-the-api/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/04/webcast-dont-pick-the-lock-steal-the-key-password-auditing-with-metasploit/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/03/tutorial-using-web-command-injection-to-gain-remote-desktop-on-windows-web-server/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/01/soc-monkey-week-in-review-6112/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/06/01/metasploit-exploit-failed-how-to-test-if-metasploit-is-working/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/31/weekly-metasploit-update-38/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/30/install-metasploit-on-backtrack/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/29/confusion-over-the-flame-platform-and-flame-malware/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/27/collecting-heroku-exception-stack-traces/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/25/soc-monkey-week-in-review-52512/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/24/weekly-metasploit-update-39/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/23/are-you-in-the-fear-business/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/23/my-first-week-at-metasploit/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/22/10-hottest-metasploit-exploit-and-auxiliary-modules-in-april/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/21/pci-compliance-dashboard-new-version-including-sans-top20-critical-security-controls/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/17/weekly-metasploit-update-40/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/16/how-often-should-you-look-at-your-event-and-system-logs-daily-weekly-or-just-when-there-is-a-problem/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/15/attacking-cctv-video-surveillance-systems-with-metasploit/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/14/pci-30-seconds-newsletter-19-your-pci-logbook-what-is-required-in-terms-of-log-management/</loc>
        
        
            <lastmod>2019-10-28</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/11/soc-monkey-week-in-review-51112/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/10/apple-os-x-java-woes/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/10/metasploit-update-2/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/09/logging-on-linux-part-1-ive-got-a-bunch-of-linux-boxes-what-should-i-be-looking-out-for-in-my-logs/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/09/getting-the-most-from-customizable-csv-exports-part-9/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/09/how-data-breaches-affect-your-brand-value/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/09/the-federal-cybersecurity-bills-and-what-they-mean-for-security-for-the-99/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/09/microsoft-security-bulletin-summary-for-may-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/08/eternal-sunshine-of-the-spotless-ram/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/08/getting-the-most-from-customizable-csv-exports-part-7/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/04/soc-monkey-week-in-review-5412/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/04/getting-the-most-from-customizable-csv-exports-part-7-2/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/03/metasploit-update-3/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/02/getting-the-most-from-customizable-csv-exports-part-6/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/05/01/getting-the-most-from-customizable-csv-exports-part-5/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/27/soc-monkey-week-in-review-42612/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/27/getting-the-most-from-customizable-csv-exports-part-4/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/25/getting-the-most-from-customizable-csv-exports-part-3/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/24/automated-security-assessments-can-stop-untargeted-attacks/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/24/metasploit-43-released-task-schedules-email-reports-upgrades-and-more-modules/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/24/getting-the-most-from-customizable-csv-exports-part-2/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/23/getting-the-most-from-customizable-csv-exports-part-1/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/20/new-track-for-nerdcore-fans-what-you-need-metasploit/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/20/soc-monkey-week-in-review-41912/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/19/a-penetration-test-is-quality-assurance-for-your-security-controls/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/18/why-security-risk-intelligence-is-crucial/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/16/how-to-secure-your-videoconferencing-systems-h323-scanning-with-rapid7-nexpose/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/13/soc-monkey-week-in-review-4132012/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/13/microsoft-security-bulletin-summary-for-april-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/10/communicating-and-integrating-with-metasploit-from-your-mononet-applications/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/09/pci-30-seconds-newsletter-18-what-to-do-in-case-of-compromise/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/06/metasploit-sighting-reboot-movie/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/06/rapid7-at-the-movies-recruitment-videos/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/06/soc-monkey-week-in-review-462012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/05/metasploit-update-4/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/02/myth-busted-apple-is-hacker-proof/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/04/01/progress-on-the-internet/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/30/is-java-exploitable-new-t/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/30/soc-monkeys-week-in-review-32912/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/30/automating-nexpose-discovery-connections-through-the-java-api/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/29/magnificent7-supports-first-round-of-open-source-projects/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/29/cve-2012-0507-java-strikes-again/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/28/metasploit-update-5/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/28/identifying-ipv6-security-risks-in-ipv4-networks-tools/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/24/soc-monkeys-week-in-review-32312/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/23/integrating-nexpose-community-and-metasploit-community-in-backtrack-5-r2/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/23/csv-exporting-technical-dive/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/23/verizon-2012-data-breach-investigations-report/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/22/configuration-assessment-and-policy-management-in-nexpose-52/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/21/nexpose-log-files-whats-changed/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/21/vulnerability-and-threat-data-export-leveraging-xml-export-20-format/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/21/metasploit-update-6/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/16/soc-monkey-free-and-in-the-app-store-now/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/15/metasploit-update-7/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/14/java-api-client-how-to-augment-it-and-share-with-the-community/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/14/how-to-check-for-remote-desktop-protocol-rdp-services/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/14/microsoft-security-bulletin-summary-for-march-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/13/metasploit-online-store-t-shirt-baseball-hat-cap-backpack/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/12/uri-parsing-its-harder-than-you-think/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/08/metasploit-update-9/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/08/cve-2012-0754/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/08/real-time-alerts-upgraded/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/07/why-security-assessments-must-cover-ipv6-even-in-ipv4-networks/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/05/how-to-own-a-virtual-data-center/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/02/protip-you-really-shouldnt-try-redacting-tweets/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/03/01/metasploit-update-10/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/29/information-disclosure-out-of-office-replies/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/29/rapid7-wins-coveted-sc-magazine-award-for-best-vulnerability-management-tool/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/28/quality-security-people-process-and-products/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/27/how-to-set-up-an-oracle-policy-scan/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/27/free-microsoft-virtual-machines-for-testing/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/27/what-you-need-to-do-to-become-an-pci-approved-scanning-vendor-asv/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/24/rapid7-is-one-of-bostons-most-admired-companies/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/24/nexpose-java-api/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/22/dont-let-your-heroku-apps-fail-silently/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/22/interview-with-dan-guido-draft/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/22/metasploit-42-released/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/22/key-statements-from-the-global-risks-2012-report/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/21/metasploit-javascript-keylogger/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/17/change-is-inevitable-except-from-a-vending-machine/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/15/weekly-metasploit-update-46/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/15/microsoft-security-bulletin-summary-for-february-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/14/digging-into-engineyard-logs/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/13/what-is-this-whole-updating-thing-anyways/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/03/two-sides-of-the-same-metasploit-penetration-testing-and-vulnerability-validation/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/02/how-to-scan-your-network-for-open-h323-video-conferencing-systems/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/01/weekly-metasploit-update-45/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/02/01/migrate-nexpose-to-a-newer-platform/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/31/exploiting-single-vulnerabilities-with-metasploit-pro/</loc>
        
        
            <lastmod>2017-11-05</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/31/nexpose-reaches-owasp-top10-coverage/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/30/how-to-import-third-party-vulnerability-scanner-reports-into-metasploit-pro/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/28/using-dynamic-asset-groups-to-find-installed-software/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/27/pass-the-hash-with-nexpose-and-metasploit/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/27/pci-30-seconds-newsletter-17-why-is-my-scan-reports-so-thick-impact-of-potential-vulnerabilities/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/27/remote-controlling-metasploit-through-apis/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/26/is-your-data-too-sensitive-for-a-penetration-test/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/25/metasploit-update-8/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/25/mythical-videoconferencing-hackers/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/25/get-software-donations-for-ccdc-red-teams/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/24/a-good-word-to-remember-glossary/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/24/whats-new-in-the-nexpose-51-users-guide/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/23/video-conferencing-and-self-selecting-targets/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/19/simple-outlook-web-access-phishing/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/19/metasploit-framework-updated/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/18/granular-asset-searches-and-a-policy-tab/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/17/get-cpe-credits-for-attending-free-rapid7-online-webinars/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/16/adventures-in-the-windows-nt-registry-a-step-into-the-world-of-forensics-and-ig/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/13/password-auditing-with-metasploit-2/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/13/communicating-and-integrating-with-nexpose-from-your-netmono-applications/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/11/metasploit-framework-updated-railgun-ssh-scanning-and-more/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/11/microsoft-security-bulletin-for-january-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/11/qa-transcription-security-war-stories-life-on-the-front-lines-of-a-breach/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/09/critical-threats-and-incredible-hype-reflections-on-security-in-2011-and-what-matters-in-2012/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/09/three-ways-to-integrate-metasploit-with-nexpose/</loc>
        
        
            <lastmod>2018-03-16</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/06/flying-under-the-radar-of-av-and-ips-with-metasploits-stealth-features/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/05/bait-the-hook-how-to-write-good-phishing-emails-for-social-engineering/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/04/metasploit-updated-year-in-review/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/04/creating-a-fisma-report-in-metasploit-pro/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2012/01/03/finding-web-servers-you-didnt-know-you-had/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/30/how-to-leverage-the-command-line-in-metasploit-pro/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/29/jumping-into-another-network-with-vpn-pivoting/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/28/metasploit-updated-telnet-exploits-msf-lab-and-more/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/28/more-fun-with-bsd-derived-telnet-daemons/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/28/bsd-telnet-daemon-encrypt-key-id-overflow/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/23/remote-egress-scanning-with-metasploit/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/23/dhs-daily-cyber-report/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/23/webinar-how-to-set-up-a-penetration-testing-test-lab/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/23/where-can-i-find-vulnerable-machines-for-my-penetration-testing-lab/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/22/using-the-base-tag-to-clone-a-web-page-for-social-engineering-attacks/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/21/metasploit-updated-trivial-tftp-access/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/21/metasploit-tutorial-an-introduction-to-metasploit-community/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/20/git-friendly/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/19/pci-30-seconds-newsletter-16-is-your-organization-acting-as-a-fashion-victim-or-a-clown/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/19/installing-metasploit-community-edition-on-backtrack/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/14/metasploit-framework-updated-whats-your-favorite-resource-script/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/14/microsoft-security-bulletin-for-december-2011/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/11/metasploit-framework-updated-h323-fastlib-and-more/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/08/six-ways-to-automate-metasploit/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/07/thoughts-on-security/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/06/vendor-security/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/05/recon-wireless-and-password-cracking-on-a-metasploit-bun/</loc>
        
        
            <lastmod>2017-09-22</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/05/adding-custom-wordlists-in-metasploit-for-brute-force-password-audits/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/12/02/metasploit-and-ptes/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/30/test-results-for-javarhino/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/28/pci-30-seconds-newsletter-15-nice-look/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/28/three-great-new-metasploit-books/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/21/introducing-alerts/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/21/hd-moores-law/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/17/nexpose-50-release/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/17/rapid7-secures-50m-in-growth-equity/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/14/pci-30-seconds-newsletter-14-the-world-isnt-perfect/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/14/rapid7-finalist-in-2-sc-awards-categories/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/11/is-cyber-espionage-cheating/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/10/git-while-the-gitting-is-good/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/10/new-w3af-release-11/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/10/microsoft-patch-tuesday-november-2011/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/10/technology-meets-empathy/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/08/metasploit-framework-sighting-exploiting-iphone/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/07/boston-globe-selects-rapid7-as-a-top-place-to-work/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/05/new-sectoolsorg-list-is-out/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/04/simulating-apt-tactics-with-vsploit-modules/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/02/logentries-and-appharbor-partners-in-cloud/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/01/cloudarena-business-intelligence-in-the-cloud/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/01/how-to-explain-penetration-testing-to-your-management/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/01/the-advanced-policy-engine/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/11/01/virtualization-introduces-new-security-gaps/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/31/new-version-of-the-pci-compliance-spreadsheet/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/28/metasploit-framework-featured-on-cnn-phishing-made-simple/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/26/cocktails-with-customers-endless-summer/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/25/moving-up-in-the-world/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/24/pci-30-seconds-newsletter-13-compensating-controls-magic-trick-or-mirage/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/23/nexpose-50-preview-modernized-usability-interface/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/20/pci-diy-how-to-do-an-internal-pentest-to-satisfy-pci-dss-requirement-113/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/18/logentries-gets-pm-approval-dogpatch-labs/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/18/introducing-metasploit-community-edition/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/13/zero-day-attacks-dont-believe-the-hype/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/13/microsoft-october-2011-patch-tuesday/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/11/monasploit/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/10/market-siemplification-or-more-of-the-seim/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/10/new-version-of-the-pci-compliance-dashboard-spreadsheet/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/10/client-side-exploit-testing-with-adobecooltypesing/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/09/metasploit-scanners-and-dns/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/07/magnificent7-submission-deadline/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/06/derbycon-was-awesome/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/06/in-memory-of-jeff-berger/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/10/05/logentries-now-an-engine-yard-partner/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/09/30/consideration-about-the-verizon-2011-payment-card-compliance-report/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/09/27/a-security-lesson-from-benjamin-franklin/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/09/26/can-i-use-compensating-control-to-resolve-vulnerabilities-found-during-a-scan/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/09/22/what-to-do-if-my-organization-can-t-demonstrate-four-passing-pci-internal-or-external-scans/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/09/19/is-my-mobile-app-buggy-or-do-they-simply-not-like-it/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/09/15/september-patch-tuesday/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/09/12/ruby-ireland-august-extraveganza-review/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/09/12/logentries-try-it-now-for-free-no-signup-required/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/09/08/rapid7-at-owasp-appsec-us/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/09/02/rapid7-contributes-to-hackers-for-charity/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/31/pci-30-seconds-newsletter-12-the-gap-analysis-process/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/30/virtualization-and-vulnerability-management/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/29/morto-another-reason-to-secure-local-user-accounts/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/26/a-tale-from-defcon-and-the-fun-of-bnat/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/22/rapid7-supports-open-source-projects-with-magnificent7-100000-fund/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/19/pci-30-seconds-newsletter-11-tokenization/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/17/10-password-tips-to-avoid-data-breach-catastrophes/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/17/who-protects-your-digital-footprint-it-better-be-you/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/17/loyalty-cards-vs-privacy-concerns/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/16/who-benefits-from-nexpose-2011-summer-release-you-do/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/11/pci-30-seconds-newsletter-10-prioritized-approach/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/10/august-patch-tuesday-3/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/04/w3af-winning-the-fight-against-encodings/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/03/pci-assessor-update-july-2011-in-a-nutshell/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/02/a-key-for-a-key-rapid7-competition/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/01/metasploit-40-available-for-download/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/08/01/metasploit-40-released/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/28/what-happens-in-vegas-jabra-edition/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/27/password-cracking-in-metasploit-with-john-the-ripper/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/26/metasploit-pro-40-brings-greater-enterprise-integration-cloud-deployment-options-and-penetration-testing-automation/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/25/ascii-artists-of-the-world-unite/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/25/node-js-supported-logentries/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/25/logging-its-a-gem/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/23/metasploit-40-the-database-as-a-core-feature/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/21/oracle-critical-patch-update-advisory-july-2011/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/21/metasploit-bounty-the-end/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/19/caching-ajax-responses-in-javascript/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/19/the-attackers-triad/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/14/pci-30-seconds-newsletter-9-defining-the-scope-of-the-pci-assessment/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/13/unified-unanimous-converged-and-united/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/13/july-patch-tuesday/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/12/the-security-confab/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/08/testing-snort-ids-with-metasploit-vsploit-modules/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/08/jsobfu/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/06/pci-30-sec-newsletter-8-dss-in-a-nutshell/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/05/wall-street-journal-fastech-50/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/07/01/detecting-ldap-injections/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/30/metasploit-exploit-bounty/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/30/pci-30-sec-newsletter-7-certification-programs-striving-for-quality/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/29/meterpreter-httphttps-communication/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/27/ms11-030-exploitable-or-not/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/25/metasploit-framework-console-output-spooling/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/24/satisfaction-guaranteed-evolution-of-the-rapid7-customer-experience/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/24/introducing-cocktails-with-customers/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/22/hello-ripper/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/21/pci-30-seconds-newsletter-n-6-the-validation-toolbox/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/21/metasploit-framework-372-released/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/16/w3af-and-nexposes-web-application-security-scanner/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/15/pci-30-seconds-newsletter-n-5-what-is-your-type/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/15/june-patch-tuesday/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/14/metasploit-exploit-bounty-30-exploits-500000-in-5-weeks/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/13/emulating-suspicious-dns-traffic-with-metasploit-framework/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/08/being-agile-within-an-open-source-project/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/06/pci-30-seconds-newsletter-n-4-merchant-levels-what-who-and-how/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/02/vsploit-virtualizing-exploitation-attributes-with-metasploit-framework/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/06/01/overview-of-the-pci-assessor-newsletter-of-may-11/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/27/recent-developments-in-java-signed-applets/</loc>
        
        
            <lastmod>2017-09-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/26/pci-30-sec-newsletter-3-role-distribution/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/25/consulting-for-profit-building-a-business-on-security-assessments/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/25/w3af-and-now-with-a-stable-core/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/24/introducing-msfvenom/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/24/looking-back-nccdc-2011-recap/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/21/using-kernelload-to-speed-up-exploit-dev/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/19/metasploit-ation-for-the-nation/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/18/rapid7-first-asv-having-its-employees-qualified-as-per-the-new-pci-requirements/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/17/metasploit-framework-371-released/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/12/pci-30-sec-newsletter-1-pci-what-are-you-talking-about/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/12/pci-newsletter-2-payment-processing-terminology-and-workflow/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/12/may-patch-tuesday/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/11/rapid7-production-presentsthe-pci-30-sec-newsletters/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/09/and-the-award-goes-to-us/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/04/metasploit-pro-37-better-faster-stronger/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/03/strictly-https/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/05/03/metasploit-framework-370-released/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/04/28/advice-for-sony-psn-users/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/04/26/metasploit-t-shirt-design-contest-and-the-winner-is/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/04/15/april-patch-tuesday-round-up/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/04/14/log-management-as-a-windows-service/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/04/13/who-will-you-be-wearing-vote-for-the-new-metasploit-t-shirt/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/04/05/be-a-superhero-design-the-new-metasploit-swag/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/04/02/happy-april-fools-day/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/03/31/learn-download-contribute-the-new-metasploit-website/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/03/26/adobe-flash-cve-2011-0609/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/03/22/join-me-for-the-pci-sc-magazine-econference-this-tuesday-march-22-2011/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/03/20/announcing-the-unstable-module-tree/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/03/16/empowering-security-professionals/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/03/15/nmap-in-my-metasploit-its-more-likely-than-youd-think/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/03/15/march-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/03/07/metasploit-version-36-delivers-enhanced-command-line-options-and-pci-reports/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/03/07/metasploit-framework-360-released/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/03/05/css-color-picker/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/03/01/user-defined-tags/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/02/24/dual-cores-metasploit-track-free-download/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/02/22/dont-get-blinded-by-the-flash/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/02/22/stronger-passwords-for-django/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/02/19/rapid7-sponsors-7-boston-high-schools-for-the-2011-cyber-foundations-competition/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/02/19/rapid7s-high-flying-rsa-party/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/02/18/dual-core-puts-the-rap-back-into-rapid7/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/02/17/tagging/</loc>
        
        
            <lastmod>2017-10-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/02/14/metasploit-training-at-cansecwest/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/02/12/february-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/02/09/metasploit-framework-352-released/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/01/31/exploiting-seh-overwrites-using-rop/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/01/27/oh-iana-dont-you-pwn-for-me/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/01/26/exploit-engineer-wanted-get-paid-for-open-source/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/01/19/last-years-journey-and-the-road-ahead/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/01/19/w3af-10-rc5-better-stronger-faster/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/01/19/w3af-better-stronger-faster/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/01/18/mobile-device-security-and-android-file-disclosure/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/01/14/january-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/01/06/become-invisible-to-anti-virus-protection/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/01/05/how-to-set-up-a-pentesting-lab/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2011/01/05/chinese-agencies-double-cyber-attacks-on-germany/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/30/plunderous-informative-pirates/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/23/december-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/22/four-holiday-tips-to-protect-against-identity-theft/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/22/the-next-security-frontier-virtualization/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/20/rapid7-scam-busters-using-social-engineering-to-train-your-users-about-phishing-attacks/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/17/cisco-ios-penetration-testing-with-metasploit/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/16/offensive-security-backtrack-linux-metasploit-pro/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/16/sesame-open-auditing-password-security-with-metasploit-351/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/15/metasploit-framework-351-released/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/14/mubix-and-carnal0wnage-join-the-rapid7-family/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/14/hock-and-awe-with-gawkercom-how-to-test-if-you-have-been-breached/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/13/semipublic-password-dumps/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/13/capturing-windows-logons-with-smartlocker/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/02/setting-up-a-test-environment-for-vpn-pivoting-with-metasploit-pro/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/12/01/the-big-easy/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/11/23/turning-your-world-upside-down-metasploit-ambigram-tattoos/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/11/13/help-your-new-sweethearts-call-home-to-metasploit/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/11/12/metasploit-now-with-more-commercial-grade-y-ness/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/11/11/november-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/11/10/wheres-the-0x1337beef/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/11/09/how-vpn-pivoting-creates-an-undetectable-local-network-tap/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/11/04/open-source-on-steroids-how-we-boosted-w3af-development/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/11/03/metasploit-framework-350-win32-respin/</loc>
        
        
            <lastmod>2017-08-30</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/11/03/w3af-10-rc4-is-ready-for-you-to-download/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/11/01/we-weren-t-joking-when-we-said-tattoos/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/10/26/embrace-the-chaos/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/10/20/metasploit-anniversary-marks-world-s-most-successful-open-source-acquisition/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/10/20/one-year-later-metasploit-framework-350-released/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/10/19/take-an-earlier-flight-home-with-the-new-metasploit-pro/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/10/15/october-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/09/24/september-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/09/21/impersonating-the-windows-print-spooler-for-relayed-rpc/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/09/08/return-of-the-unpublished-adobe-vulnerability/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/08/25/better-faster-stronger-dllhijackauditkit-v2/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/08/23/application-dll-load-hijacking/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/08/23/exploiting-dll-hijacking-flaws/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/08/18/metasploit-express-crucial-to-win-in-south-florida-issa-hack-the-flag/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/08/17/redesigning-the-credential-cracking-strategy/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/08/11/august-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/08/10/black-hat-race-to-root-results/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/08/05/ms10-046-a-rude-awakening/</loc>
        
        
            <lastmod>2017-07-25</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/08/02/new-vxworks-vulnerabilities/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/08/02/shiny-old-vxworks-vulnerabilities/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/07/29/w3af-on-the-rise/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/07/29/better-is-not-good-enough/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/07/28/w3af-an-open-source-success-story/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/07/23/cheer-and-pwning-in-las-vegas/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/07/20/metasploit-express-v341-released/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/07/19/july-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/07/12/metasploit-framework-341-released/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/06/14/meterpreter-for-pwned-home-pages/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/06/09/time-for-the-june-2010-summary-of-the-upcoming-microsoft-security-updates/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/06/08/rapid7-one-of-bostons-hottest-companies/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/06/02/recently-joined-rapid7/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/05/27/its-ruby-all-the-way-down/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/05/19/introducing-metasploitable/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/05/18/metasploit-framework-340-released/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/05/14/may-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/04/22/approaching-metasploit-340-and-metasploit-express/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/04/15/the-java-web-start-argument-injection-vulnerability/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/04/14/april-microsoft-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/04/13/persistent-meterpreter-over-reverse-https/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/04/04/penetration-testing-learn-assembly/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/03/31/release-candidate-three-is-out/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/03/31/march-microsoft-out-of-band-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/03/26/visualizing-microsoft-security-bulletin-supersedence/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/03/22/automating-the-metasploit-console/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/03/19/it-takes-a-village-to-raise-the-pci-bar/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/03/18/the-latest-adobe-exploit-and-session-upgrading/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/03/17/freebsd-port/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/03/15/creating-your-own-vulnerability-checks-in-nexpose-community-edition/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/03/10/march-microsoft-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/03/08/locate-and-exploit-the-energizer-trojan/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/02/23/introducing-exploit-exposure/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/02/10/february-microsoft-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/02/09/automatically-routing-through-new-subnets/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/02/05/postgres-fingerprinting/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/02/05/exploiting-the-samba-symlink-traversal/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/02/05/february-microsoft-patch-tuesday-preview/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/01/22/the-true-value-of-free-in-vulnerability-management/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/01/22/january-out-of-band-microsoft-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/01/19/the-story-behind-nexpose-community-edition/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/01/15/reproducing-the-aurora-ie-exploit/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/01/13/january-microsoft-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2010/01/01/safe-reliable-hash-dumping/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/31/exporting-the-registry-for-fun-and-profit/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/28/exploiting-microsoft-iis-with-metasploit/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/27/happy-holidays-project-updates/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/23/metasploit-framework-333-exploit-rankings/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/18/metasploit-psexec-scanner-via-perl/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/14/meterpreter-pivoting-web-scanning-wireless-and-more/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/09/december-microsoft-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/04/december-microsoft-patch-tuesday-preview/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/04/nexpose-community-editionmetasploit-integration-responding-to-the-needs-of-users/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/03/metasploit-331-nexpose-community-edition/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/03/the-noisy-assembly/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/12/02/confidence-integrity-and-immediate-availability/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/11/17/metasploit-v33-released/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/11/17/metasploit-framework-33-released/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/11/12/ms09-065-and-the-worrisome-web/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/11/11/november-microsoft-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/11/08/a-refreshing-new-direction/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/10/21/metasploit-rising/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/10/21/joining-the-team/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/10/14/october-microsoft-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/10/09/october-microsoft-patch-tuesday-preview/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/10/04/smb2-351-packets-from-the-trampoline/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/09/27/metasploit-33-development-updates/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/09/25/forcing-payloads-through-restrictive-firewalls/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/09/21/nss-labs-endpoint-protection-test-results/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/09/09/once-again-time-for-a-quick-summary-of-this-months-microsoft-security-updates/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/08/19/binary-obfuscation-from-the-top-down/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/08/12/jutsu-searchvtptr/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/08/12/august-microsoft-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/08/06/unmasking-you-demos/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/08/06/unmasking-you-at-blackhat-09-and-defcon-17/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/07/29/meet-us-at-blackhat-and-defcon/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/07/22/scan-softly-and-carry-a-big-scope-pci-clarifies-wireless-guidelines/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/07/15/what-we-have-here-is-failure-to-communicate/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/07/15/july-microsoft-patch-tuesday-roundup/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/07/08/ie-directshow-msvidctldll-mpeg-2-metasploit-exploit/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/07/07/socializing-white-noise/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/07/03/the-future-is-friendly/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/05/11/mastering-the-metasploit-framework/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/05/05/sans-penetration-testing-summit/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/03/25/57259696-2/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/03/22/capturing-logon-credentials-with-meterpreter/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/03/22/remote-keystroke-sniffing-with-meterpreter/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/03/22/vmware-virtual-pc-and-fdcc-images/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/02/23/the-best-defense-is-information/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/02/19/tactical-exploitation-at-black-hat-dc/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/02/14/metasploit-mass-exploitation-for-dummies/</loc>
        
        
            <lastmod>2017-09-27</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/02/13/metasploit-ddos-redux/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/02/10/pathetic-ddos-vs-metasploit-round-3/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/02/09/pathetic-ddos-vs-metasploit-round-2/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/02/08/pathetic-ddos-vs-security-sites/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/01/23/tactical-exploitation-at-black-hat-dc-2/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/01/18/netcat-like-console-command-connect/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/01/16/identbuf-has-a-new-format-and-new-features/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/01/15/jutsu-memdiff/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/01/09/windows-7-byakugan-binaries-added/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/01/07/new-justsu-trackval/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/01/04/scanning-for-md5-signed-ssl-certificates/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2009/01/03/fuzzing-flash-for-fun-asnative/</loc>
        
        
            <lastmod>2019-08-23</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/12/18/add-synergy-with-symport/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/12/14/metasploit-decloak-v2-unanonymizer/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/11/11/ms08-068-metasploit-and-smb-relay/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/10/13/uninformed-journal-volume-10/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/10/10/metasploit-32-bsd-licensing/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/09/24/metasploit-25100/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/08/25/improved-windbg-opcode-searching/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/08/20/byakugan-windbg-plugin-released/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/08/08/karmetasploit-wireless-fun/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/08/04/best-of-open-source-software-awards-2008/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/08/01/dns-multiple-race-exploiter/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/07/30/dns-attacks-in-the-wild/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/07/29/checking-for-cache-poisoning/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/07/28/evilgrade-will-destroy-us-all/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/07/25/bailiwicked-automatic-tuning/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/07/24/bailiwicked/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/04/05/april-fools-2008-recap/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/02/08/rise-security-vs-asus-eee-pc/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2008/01/27/metasploit-unleashes-version-31/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/10/23/reliable-staging-without-a-stager-receive-loop/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/10/21/cracking-the-iphone-part-3/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/10/16/cracking-the-iphone-part-21/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/10/14/cracking-the-iphone-part-2/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/10/11/cracking-the-iphone-part-1/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/09/25/a-root-shell-in-my-pocket-and-maybe-yours/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/08/26/an-easier-way-to-create-payload-modules-in-30/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/08/02/the-pwnie-awards-winners-announced/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/08/02/black-hat-usa-tactical-exploitation/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/07/26/the-pwnie-awards-nominate-your-favorites-today/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/04/29/april-codings-bring-may-pwnings/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/04/03/heaplib-support-added-to-metasploit-3/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/04/01/exploiting-the-ani-vulnerability-on-vista/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/03/27/metasploit-framework-30-released/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2007/01/30/update-on-the-status-of-30/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/10/21/kernel-mode-payloads-in-metasploit-30/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/10/14/meterpreter-scripts-and-msrt/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/09/17/metasploit-30-automated-exploitation/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/08/28/metasploit-framework-30-beta-2/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/08/17/metasploit-411-from-the-451-group/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/08/16/putting-the-fun-in-browser-fun/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/08/02/metasploit-framework-30-beta-1/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/07/23/internet-drive-by-shootings/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/07/13/rasmans-dhcp-registry/</loc>
        
        
            <lastmod>2017-07-31</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/07/02/month-of-browser-bugs/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/06/29/black-hat-2006-and-defcon-14/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/06/23/microsoft-is-disappointed/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/06/08/a-few-quick-updates/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/04/15/groupwise-messenger-server/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/04/12/interprocedural-data-flow-dependencies/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/04/06/post-exploitation-fun-in-metasploit-30/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/04/06/cansecwest-vancouver-bc-2006/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/03/30/browser-fuzzing-for-fun-and-profit/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/03/30/a-few-msrt-graph-illustrations/</loc>
        
        
            <lastmod>2021-03-03</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/post/2006/03/30/metasploit-reversing-toolkit-intro/</loc>
        
        
            <lastmod>2017-07-26</lastmod>
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/harley-geiger/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/aaron-wells/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/caitlin-condon/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/bri/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/sam/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/pearce-barry/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/adam-bunn/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/tod-beardsley/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/sagi/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/jamie/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/bob-rudis/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/chris/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/david/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/jackie/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/author/carrie/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/dot-net/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/alcide/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/android/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/antivirus/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/api/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/apple/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/application-security/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/appspider/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/attack-surface-management/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/authentication/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/automation-and-orchestration/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/automation-remediation/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/awards/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/aws/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/azure/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/black-friday/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/botnets/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/breach-preparedness/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/breach-response-news/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/capture-the-flag/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/car-hacking/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/career-development/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/chrome/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/cis-controls/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/cisos/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/cloud-infrastructure/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/cloud-security/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/cmmc/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/compliance/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/confessions-of-a-former-ciso/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/consulting-services/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/covid-health/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/covid-19/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/critical-infrastructure/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/cryptocurrency/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/customer-perspective/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/cyber-monday/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/dast/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/denial-of-service-dos/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/detection-and-response/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/devops/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/devsecops/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/divvycloud/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/email-security/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/emergent-threat-response/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/end-of-life/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/endpoints/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/episode-10/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/episode-11/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/episode-12/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/episode-16/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/episode-9/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/events/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/expert-commentary/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/exploits/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/finance/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/firefox/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/flash/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/fundamentals/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/gdpr/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/google/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/government/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/guest-perspective/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/hacking/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/haxmas/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/higher-education/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/hipaa/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/home-automation/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/honeypots/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/incident/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/incident-detection/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/incident-response/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/industry-cyber-exposure-report-icer/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/infosec/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/insight-platform/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/insightappsec/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/insightconnect/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/insightidr/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/insightops/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/insightphishing/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/insightvm/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/internet-explorer/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/iot/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/it-ops/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/java/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/javascript/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/komand/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/kubernetes/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/labs/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/legal/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/linux/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/log-management/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/log-search/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/logentries/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/malware/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/managed-detection-and-response/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/managed-security-service-providers/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/mdr/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/mdr-must-haves/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/medical/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/metasploit/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/metasploit-weekly-wrapup/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/microsoft/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/mssp/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/national-industry-cloud-exposure-report-nicer/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/national-cybersecurity-awareness-month/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/national-exposure/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/ncsam/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/network-traffic-analysis/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/networking/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/news/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/nexpose/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/nist/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/open-source/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/oscp/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/patch-tuesday/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/payload/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/pci/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/penetration-testing/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/permissions/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/phishing/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/podcast/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/product-updates/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/project-heisenberg/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/project-sonar/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/public-policy/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/python/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/quarterly-threat-report/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/r7-book-club/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/ransomware/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/rapid7-culture/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/rapid7-disclosure/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/rapid7-discuss/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/rapid7-perspective/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/rapid7-support/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/red-team/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/release-notes/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/remote-working/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/reports/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/research/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/rsa/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/ruby-on-rails/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/saml/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/secops/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/security-assertion-markup-language/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/security-nation/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/security-operations-center-soc/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/security-strategy/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/siem/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/skills/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/snyk/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/soar/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/social-engineering/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/tcell/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/third-party-disclosure/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/this-one-time-on-a-pen-test/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/thotcon/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/threat-intel/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/threat-intel-book-club/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/tips-and-tricks/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/transportation/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/under-the-hoodie/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/united/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/user-behavior-analytics/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/user-experience/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/verizon-dbir/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/virtual-infrastructure/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/virtual-vegas/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/vulnerability-disclosure/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/vulnerability-management/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/vulnerability-risk-management/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/wannacry/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/whiteboard-wednesday/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/windows/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/worms/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/xss/</loc>
        
        
    </url>
    <url>
        <loc>https://www.rapid7.com/blog/tag/zero-day/</loc>
        
        
    </url>
</urlset>