<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.leansecurity.com.au/prices</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-10-09</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/551b41e0e4b002dbe1fbc6ce/1427849711021/Buisness-11.jpg</image:loc>
      <image:title>Prices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/58b531d91b10e3328dcb8f6b/1488269787516/light-blue-wallpaper-7846-8139-hd-wallpapers-1024x576.jpg</image:loc>
      <image:title>Prices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/593528c659cc687cc796e378/1496656075680/network+vulnerability+scanner.jpg</image:loc>
      <image:title>Prices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56c16ba3044262d0ab5eb6e6/1455516581431/background-805060.jpg</image:loc>
      <image:title>Prices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/553598f5e4b0a2269dcd63aa/1429575951836/13334048894_6e8b421c4e_o.jpg</image:loc>
      <image:title>Prices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56c16c0601dbae6f07073316/1455516679869/ellipse-784354.jpg</image:loc>
      <image:title>Prices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/551b4196e4b0f74d74c3af33/1427849631003/Buisness-11.jpg</image:loc>
      <image:title>Prices</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/new-blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-10-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/new-blog/2015/12/8/cyber-scammers-confess-every-trick-in-the-book-that-hurts-our-internet-security-part-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-12-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/new-blog/2016/10/5/three-main-considerations-for-cloud-network-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-10-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/11/9/3-reasons-why-your-business-would-benefit-from-a-mobile-application</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/4/21/magento-vulnerability-check-your-web-sites-now</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-04-21</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/why-you-need-ddos-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/4/20/ssl-3-is-dead-killed-by-the-poodle-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-04-21</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/the-evolution-of-e-commerce-amidst-rising-security-concerns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/web-application-security-are-your-measures-enough</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/protecting-your-virtual-businesses-better-to-be-safe-than-sorry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/data-loss-prevention-problems-and-solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/being-on-cloud-and-staying-updated-and-secure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/4/26/another-ssltls-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-04-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/protecting-your-network-perimeter-life-on-the-edge</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/controlling-security-risks-in-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/get-your-business-into-the-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/what-you-need-to-know-about-web-application-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/hidden-backdoors-into-your-wordpress-page</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/amazon-aws-security-mistakes-to-avoid</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tips-to-ensure-cloud-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/what-waf-managed-service-offers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/importance-of-web-application-security-in-business-environments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/how-are-you-shielding-your-business-against-the-threats-related-to-web-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/how-to-protect-your-business-from-ddos-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/how-to-protect-and-secure-your-important-data-using-saas-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/why-online-businesses-should-go-for-managed-and-secure-cloud-hosting-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/amazon-aws-security-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/wordpress-security-risks-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/cloud-security-tools-which-are-worth-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/top-cloud-computing-apps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/future-of-cloud-managed-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/what-is-network-perimeter-and-how-to-secure-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/potential-threats-to-web-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/10/20/the-most-problematic-mobile-security-threats-part-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-10-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/10/20/the-most-problematic-mobile-security-threats-part-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-10-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/10/20/what-is-source-code-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-10-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/11/3/analysing-vulnerability-scanning-reports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-11-03</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56383c66e4b052dc92adeb6d/1446526054956/Simple+risk+matrix.png</image:loc>
      <image:title>Blog - Analysing vulnerability scanning reports</image:title>
      <image:caption>Simple risk matrix</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56383a9de4b0f861c57f9781/1446545669093/Netsparker+sample+report</image:loc>
      <image:title>Blog - Analysing vulnerability scanning reports</image:title>
      <image:caption>Netsparker sample report</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56383a33e4b07c4dab784ae6/1446545637770/Burp+suite+sample+report</image:loc>
      <image:title>Blog - Analysing vulnerability scanning reports</image:title>
      <image:caption>Burp suite sample report</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56383cb5e4b0858b30e21c76/1446526134978/Nessus+sample+report</image:loc>
      <image:title>Blog - Analysing vulnerability scanning reports</image:title>
      <image:caption>Nessus sample report</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56388967e4b0a78fb6b85db3/1446545768879/Acunetix%2Bsample%2Breport.png</image:loc>
      <image:title>Blog - Analysing vulnerability scanning reports</image:title>
      <image:caption>Acunetix sample report</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56383b45e4b0d97eef623553/1446525767074/C%3A%5CUsers%5Csecurity%5CPictures%5CTop+10+products+with+the+most+reported+vulnerabilities.+Report+by+Qualys.png</image:loc>
      <image:title>Blog - Analysing vulnerability scanning reports</image:title>
      <image:caption>Top 10 products with the most reported vulnerabilities. Report by Qualys.png</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56383be1e4b07bcac2c6a91e/1446525923182/Burp+suite+reporting+potential+Clickjacking+attack</image:loc>
      <image:title>Blog - Analysing vulnerability scanning reports</image:title>
      <image:caption>Burp suite reporting potential Clickjacking attack</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/11/9/here-is-how-you-can-prevent-data-breaches-in-your-company</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/11/9/security-risks-that-small-businesses-should-know-about</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/12/7/cyber-scammers-confess-every-trick-in-the-book-that-hurts-our-internet-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/12/7/cyber-scammers-confess-every-trick-in-the-book-that-hurts-our-internet-security-part-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-12-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/12/11/what-measures-do-you-take-to-keep-your-businesss-web-and-mobile-applications-secure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/12/11/your-businesss-website-just-got-hacked-here-is-what-you-should-do-now</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/1/4/what-makes-penetration-testing-different-than-vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/1/15/what-is-a-web-application-firewall-waf</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/1/15/theres-a-security-gap-within-your-organization-how-can-you-fix-that</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/1/15/top-areas-you-shouldnt-miss-while-testing-your-web-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/1/15/what-to-expect-when-you-hire-a-web-application-testing-service-provider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/the-future-of-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/16/the-minimalist-guide-to-mobile-application-security-why-less-can-be-more</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/16/5-little-known-facts-that-can-affect-web-application-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/17/5-shortcuts-for-choosing-the-perfect-vulnerability-scanner-in-record-time</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/17/7-simple-steps-to-protect-your-website-from-most-common-cyber-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/17/9-things-everyone-should-know-about-website-security-scans-and-why-they-are-a-must-for-all-serious-webmaster</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/26/here-are-the-mobile-security-predictions-for-the-year-2016</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/26/know-the-common-web-security-vulnerabilities-and-how-to-fix-them</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/26/take-these-steps-to-further-improve-your-authenticated-vulnerability-scans</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/4/1/byod-and-growing-security-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-04-01</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/4/7/4-tips-to-improve-security-of-financial-apps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/4/7/a-guide-to-establishing-a-successful-byod-policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/4/7/top-4-application-security-issues-in-healthcare-industry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/5/4/3-reasons-how-managed-security-services-can-help-save-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-05-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/5/4/3-tips-for-creating-better-web-browsing-experience-for-your-customers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-05-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/5/5/can-your-website-withstand-the-pressure-of-a-live-video-event</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/5/5/web-security-concerns-in-2016-healthcare-under-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/6/10/web-security-practices-the-financial-sector-must-implement-asap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-06-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/6/10/your-websites-security-is-important-find-the-best-vulnerability-scanner-for-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-06-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/7/14/avoid-a-costly-security-breach-with-these-essential-tips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/8/25/eliminate-the-blind-spot-on-your-web-application</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-08-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/10/5/three-main-considerations-for-cloud-network-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-10-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/10/5/steps-to-web-application-vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/10/7/penetration-testing-should-you-go-for-automatic-or-manual-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/10/10/mobile-security-assessment-three-points-of-focus</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/7/ask-us-difference-between-penetration-testing-security-audit-and-vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/8/how-to-choose-the-right-penetration-testing-vendor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/9/security-compliance-and-audits-what-you-should-know</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/10/what-are-your-resolutions-for-web-applications-pen-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/20/are-all-web-security-vulnerabilities-equally-dangerous-for-your-online-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/22/do-you-know-all-there-is-to-know-about-sql-injections</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/25/performing-a-web-vulnerability-assessment-are-you-making-these-mistakes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/28/session-hijacking-what-is-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/6/30/challenges-faced-by-automated-application-security-testing-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-06-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/4/how-important-is-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/8/simple-tips-for-security-testing-web-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/12/why-choose-lean-security-for-your-web-security-testing-needs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/15/boost-customer-satisfaction-by-maintaining-web-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/18/major-challenges-that-hamper-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/21/testing-for-application-securitycan-you-skip-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-21</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/24/web-application-mistakes-that-lead-to-security-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-24</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/8/10/3-pci-compliance-mistakes-you-need-to-stop-making-today</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/8/14/application-security-is-fraught-with-mystery-3-myths-busted</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-14</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/8/18/conducting-web-application-testing-on-your-own-this-checklist-will-help</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/8/10/web-security-issues-youre-not-addressing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/8/25/infographic-five-most-common-security-concerns-businesses-face-today</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-25</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/598c30fce6f2e1a6fa2b7d4a/1502360392657/</image:loc>
      <image:title>Blog - Infographic: Five Most Common Security Concerns Businesses Face Today</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/2/highlighting-open-source-software-how-detrimental-it-is-for-your-company</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-02</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/59d1e2f380bd5e3735143192/1506927377815/Open+source+software.png</image:loc>
      <image:title>Blog - Highlighting Open Source Software – How Detrimental It Is For Your Company</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/7/how-to-improve-cyber-security-for-non-profit-organisations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/11/how-well-is-the-security-testing-in-your-organisation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/16/web-application-security-checklist-2017-are-you-ready</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-16</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/2/data-breach-a-guide-for-mitigating-the-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-20</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/59d1f11fbce176b4eb348168/1506930995987/Data+Breach-+A+Guide+For+Mitigating+The+Risks.png</image:loc>
      <image:title>Blog - Data Breach- A Guide For Mitigating The Risks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/31/5-trends-to-watch-out-for-in-cyber-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/59f871c4ec212d7d77682e96/1509454285064/Greater+Threats+to+Mobile+Security.png</image:loc>
      <image:title>Blog - 5 Trends to Watch Out For in Cyber Security!</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/11/4/mobile-app-vulnerabilities-you-should-keep-in-mind</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/11/8/social-media-security-some-common-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/11/13/why-usability-testing-is-so-important</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/11/16/five-security-tips-for-your-e-commerce-website-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-16</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/59f8752c8e7b0fc8a7c6392c/1509455433453/Five+Security+Tips+For+Your+E-Commerce+Website.png</image:loc>
      <image:title>Blog - Five Security Tips For Your E-Commerce Website - Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/8/bulk-up-on-web-application-security-by-following-these-3-tips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-08</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5a531dbb53450aea17397d86/1515396553790/Penetration+Testing.png</image:loc>
      <image:title>Blog - Bulk Up On Web Application Security by Following These 3 Tips</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5a531d9a0d9297f9a5b17c39/1515396513729/DDOS+PROTECTION</image:loc>
      <image:title>Blog - Bulk Up On Web Application Security by Following These 3 Tips</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/10/how-to-guarantee-mobile-application-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-10</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5a5321f3ec212d62e316df17/1515397641372/Encrypt+Your+Source+Code.png</image:loc>
      <image:title>Blog - How to Guarantee Mobile Application Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/13/the-many-benefits-of-network-vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-13</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5a53251b53450aea173a0a94/1515398431936/</image:loc>
      <image:title>Blog - The Many Benefits of Network Vulnerability Assessment</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/8/why-pci-dss-compliance-matters-to-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-16</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5a532688419202e3245971c2/1515398801255/multi-layered+security+setup.png</image:loc>
      <image:title>Blog - Why PCI DSS Compliance Matters to Your Business</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/18/organising-a-risk-based-security-strategy-for-your-online-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/24/predicting-2018-cyber-security-solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-23</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/29/protect-your-site-from-vulnerabilities-why-you-should-have-a-scan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/2/1/is-cloud-hosting-secure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-01</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/2/15/reasons-why-mobile-app-security-testing-is-vital-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-14</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5a5c615d4192027c0653b842/1516003732951/Reasons+Why+Mobile+App+Security+Testing+is+Vital.png</image:loc>
      <image:title>Blog - Reasons Why Mobile App Security Testing is Vital -Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/2/19/reasons-why-you-need-to-keep-your-business-data-safe-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-19</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5a5c62ce085229750fbc1ea3/1516004073207/Reasons+Why+You+Need+To+Keep+Your+Business+Data+Safe.png</image:loc>
      <image:title>Blog - Reasons Why You Need To Keep Your Business Data Safe - Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/2/22/cyber-security-stat-trends-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-22</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5a8e4a1a0d92971dab5115bb/1519274667229/Cyber+Security-++Stats+%26+Trends.png</image:loc>
      <image:title>Blog - Cyber Security - Stat &amp; Trends Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/2/26/5-reasons-to-invest-in-online-or-cyber-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-26</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5a93f3e20d9297895cbf422e/1519645672297/invest+in+cyber+security+services.png</image:loc>
      <image:title>Blog - 5 Reasons To Invest In Online Or Cyber Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/services</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2017-02-09</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5721ed5eb6aa60c7040120ac/1461841249407/background-805060.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5721ec7e9f72666d6e3bd387/1461841031128/purple-abstract-blur-bokeh.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/58955ba22e69cf7fda5d4f24/1486183339033/penetration+testing+services.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5721eb4627d4bd9f8070521e/1461840711598/9090-an-abstract-blue-background-pv.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-security-ebooks</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-02-03</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/568f31507086d7ca717e0a34/568f31711115e08523a18f1a/1452226331619/</image:loc>
      <image:title>Application Security eBooks - Secure Mobile Applications Development Guidelines</image:title>
      <image:caption>Mobile companies have as well encountered with the challenge of meeting the increasing expectations for secured and innovative mobile applications. Along with the increasing expectations of customers, the ever-changing mobile technology put an additional pressure on the developers. In order to stay ahead of the competitors, different companies have been trying on creating more portable and innovative applications. It has resulted in a trend to outsource the development of mobile application development specialized companies for wireless devices.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/568f31507086d7ca717e0a34/569c7b6725981de028b38b6a/1453096059907/3D.png</image:loc>
      <image:title>Application Security eBooks - Secure Web Applications Development Guidelines</image:title>
      <image:caption>Security is an important portion of the web application; therefore, through understanding and executing accurate security procedures, you can protect all your resources together with providing a secure environment wherein the users can be comfortable in working with your apps.  This secure web applications development guideline is composed of technical and procedural control statements. The control statements show security requirements, which must be adhered in order to develop a web-based application directed for administration. The control statements contained in this guideline have been categorized into appropriate sections like Web Access Authentication and Control, Auditing and Logging, Error Handling, and Session Management.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/568f31507086d7ca717e0a34/56a719e2c647ad6b8c437eac/1453791835721/</image:loc>
      <image:title>Application Security eBooks - Cloud Security Guidelines</image:title>
      <image:caption>Cloud Computing has created a lot of buzz in the IT industry, especially in our information driven world. In fact, as of 2015, 88% of businesses have already adopted cloud services to leverage their business operation and well as to reinforce their ROI. However, since private cloud computing controls most HIPPA and PCI-sensitive organizations using a complex web-based infrastructure, the security of the data has been one of the leading concern imposed to many IT professional. Since cloud services offer instances for many clients to utilize a single hardware, the data stored on its database has the possibility to get lost in the cloud when you didn’t have a proper control over where your own data lives.  </image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/568f31507086d7ca717e0a34/56b1537501dbae20b9c6c67b/1454461946336/3D.png</image:loc>
      <image:title>Application Security eBooks - Internet of Things (IoT) Security Guidelines</image:title>
      <image:caption>Internet of Things or (IoT) is a blazing point these days. However, what exactly is IoT? An explanation in the simplest way is that it could be regarded as an internet connects virtually between everything that is present in the surroundings, and it can be monitored and operated online. It can depict a situation in which everything that encompasses the surroundings is prepared and made to do consequent interactions with each other without any human-to-machine or inter-human contact.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56b153fa86db439f9f8d1876/1452226331619/</image:loc>
      <image:title>Application Security eBooks - Secure Mobile Applications Development Guidelines</image:title>
      <image:caption>Mobile companies have as well encountered with the challenge of meeting the increasing expectations for secured and innovative mobile applications. Along with the increasing expectations of customers, the ever-changing mobile technology put an additional pressure on the developers. In order to stay ahead of the competitors, different companies have been trying on creating more portable and innovative applications. It has resulted in a trend to outsource the development of mobile application development specialized companies for wireless devices.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/company-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-19</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/557d4752e4b071274fc19dce/1434273634892/10006007.JPG</image:loc>
      <image:title>Company</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/569dd47b05caa74dde83ddb6/1453184123579/5686-abstract-background-of-blue-rays-pv.jpg</image:loc>
      <image:title>Company</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55782813e4b062d1db05df78/1433937952332/Dollarphotoclub_77267238.jpg</image:loc>
      <image:title>Company</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/infographics</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/56ad85c88a65e2a286059700/56ad85e8356fb02b30ed5932/1454212740392/</image:loc>
      <image:title>InfoGraphics - Worst Cloud Security Threats</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/56ad85c88a65e2a286059700/56ad8750d51cd4b8d340affa/1454213084448/Benefits+of+Web+Application+Scanning.png</image:loc>
      <image:title>InfoGraphics - Benefits of Web Application Scanning</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/56ad85c88a65e2a286059700/56ad881ebe7b963e327a6884/1454213336100/Basics+of+Information+Security.png</image:loc>
      <image:title>InfoGraphics - Basic Do's and Don'ts of Information Security</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/56ad85c88a65e2a286059700/56ad8839be7b963e327a68ec/1454213263601/Cloud+Infrastructure+Testing.png</image:loc>
      <image:title>InfoGraphics - Cloud Infrastructure Testing</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56ad88d88b38d4e9f6cf7194/1454212740392/</image:loc>
      <image:title>InfoGraphics - Worst Cloud Security Threats</image:title>
      <image:caption />
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/videos</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/56ad894ccf80a19c489f0a16/56ad89601a52032fce0c316d/1454213472041/</image:loc>
      <image:title>Videos</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56ad89601a52032fce0c316e/1454213472041/</image:loc>
      <image:title>Videos</image:title>
      <image:caption />
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/sitemap</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-10-13</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/incident-detection-and-responce</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-10-02</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/557977fbe4b01eeef8e01dc8/1434023948989/computer_hacked_image.jpg</image:loc>
      <image:title>Incident Responce</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/vulnerability-scanning-service</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-22</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f8b838e4b067b8c2b19697/1442363454211/network+vulnerability+scanner.jpg</image:loc>
      <image:title>Managed Internal Vulnerability Scanning</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cloud-infrastructure-testing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-06-27</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f8b979e4b062404f4cfd81/1442363774495/cloud+infrastructure+testing+background.jpg</image:loc>
      <image:title>Managed Cloud Security Assessments</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/contact-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-02-08</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5538b087e4b002ebf3fdc1d6/1429778751565/Dollarphotoclub_64287959.jpg</image:loc>
      <image:title>Contact Us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/source-code-analysis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-10-09</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/563887f2e4b0d88d43b46d43/1446545478934/Static+Source+Code+Analysis+screenshot</image:loc>
      <image:title>Static Testing and Source Code Analysis</image:title>
      <image:caption>Example of Static Source Code Analysis findings</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f88727e4b0d99faf17fdf9/1442351089922/source_code_scanning.jpg</image:loc>
      <image:title>Static Testing and Source Code Analysis</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/intro</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-03-04</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55388c4ce4b027f5e06fb9bb/1429769292877/source-code-scanning</image:loc>
      <image:title>Intro</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55388caae4b072aaad1d1778/1429769387083/mobile-app-testing.jpg</image:loc>
      <image:title>Intro</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55388c76e4b09cd3aa080cfb/1429769334552/web-application-scanning.jpg</image:loc>
      <image:title>Intro</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5538ad5de4b07179e5b97189/1429778049909/Dollarphotoclub_48710694.jpg</image:loc>
      <image:title>Intro</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/webappscan</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-14</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55388d63e4b09f4577daee00/1429769572343/cloud-service</image:loc>
      <image:title>Web Application Scanning Service</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55388e79e4b0ca81a893444b/1429769850082/zero-false-positives</image:loc>
      <image:title>Web Application Scanning Service</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55388d8ee4b079c545ef6017/1429769615474/owasp+logo</image:loc>
      <image:title>Web Application Scanning Service</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5538ab10e4b00b1c15ca305d/1429777375223/Dollarphotoclub_55826385.jpg</image:loc>
      <image:title>Web Application Scanning Service</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/staticanalysis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-14</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5518dde4e4b06fca1717e23c/1427693039433/supported+coding+languages.png</image:loc>
      <image:title>Static Source Code Analysis</image:title>
      <image:caption>Supported Coding Languages</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5538ac60e4b002ebf3fdb84a/1429777672471/Dollarphotoclub_78212757.jpg</image:loc>
      <image:title>Static Source Code Analysis</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobileapptesting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-14</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55388aa7e4b06ba92bee9dfa/1429768875011/</image:loc>
      <image:title>Mobile Application Security Testing</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5538af15e4b0c2d27e3fa4d4/1429778426171/Dollarphotoclub_77020857.jpg</image:loc>
      <image:title>Mobile Application Security Testing</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/penetration-testing-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-10-05</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56831074dc5cb44ad78116c1/1451430012428/</image:loc>
      <image:title>Manual Application Penetration Testing Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/555e0deae4b0fbd59d8c2238/1432227573200/</image:loc>
      <image:title>Manual Application Penetration Testing Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/555e2670e4b0a3c6fb390431/1432233689320/</image:loc>
      <image:title>Manual Application Penetration Testing Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/555e1002e4b0d48844100646/1432227861908/</image:loc>
      <image:title>Manual Application Penetration Testing Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/555e1440e4b003d47ad02bbe/1432228933723/</image:loc>
      <image:title>Manual Application Penetration Testing Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f8b8c0e4b00ec16bd4c0ba/1442363602844/penetration+testing+services.png</image:loc>
      <image:title>Manual Application Penetration Testing Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/malware-detection-service</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-06-27</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f88e66e4b091a208911fa2/1442352757568/background-213649_1280.jpg</image:loc>
      <image:title>Managed Malware Detection Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/trial-service</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-31</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/penetration-testing-methodology</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-05-19</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/managed-ddos-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-10-02</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/568c422569492e087209ae01/1452032553112/Incapsula+DDoS+protection+service</image:loc>
      <image:title>Managed DDoS Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f901fbe4b090953a9391d2/1442382533827/ddos-attack-protection.jpg</image:loc>
      <image:title>Managed DDoS Protection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/managed-cloud-waf</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-05</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/568c3fe9c647ad1e5183ae40/1452031979828/Cloud+Web+Application+Firewall+Features</image:loc>
      <image:title>Managed Cloud WAF</image:title>
      <image:caption>Cloud Web Application Firewall Features</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f903d3e4b091a208935e3a/1442382813629/managed_cloud_waf.png</image:loc>
      <image:title>Managed Cloud WAF</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/web-site-security-scanning</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-22</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/569730485dc6def158444c59/1452748875027/benefits+of+managed+dynamic+web+application+scanning</image:loc>
      <image:title>Dynamic Web Application Testing</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/56cce3c601dbae1c17963850/1456268349610/Web+Application+Security+Assessment+Methodology</image:loc>
      <image:title>Dynamic Web Application Testing</image:title>
      <image:caption>Download our Web Application Security Assessment Methodology</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/567b71cd0ab37790ca48ead0/1450930638279/example+web+vulnerabilities+summary</image:loc>
      <image:title>Dynamic Web Application Testing</image:title>
      <image:caption>  Example web vulnerabilities summary report</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f88d8fe4b0d99faf18297b/1442352530458/9090-an-abstract-blue-background-pv.jpg</image:loc>
      <image:title>Dynamic Web Application Testing</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/pci-dss-compliance-service</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-06-27</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f906b6e4b09fd61947fbd7/1442383546930/pci-dss-compliance-service-image.jpg</image:loc>
      <image:title>PCI DSS Compliance</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/continuous-monitoring-service</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-05-15</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f905d6e4b0c432ff793c26/1442383322969/continious_monitoring_service.jpg</image:loc>
      <image:title>Managed Assets Monitoring</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobile-application-assessment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-05-14</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5917fdce37c581c19ca33ea5/1494744550088/mobile+application+penetration+test</image:loc>
      <image:title>Mobile Application Security Assessment</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/567a56e39cadb6b997950531/1450858214314/mobile+application+security+assessment+deliverables</image:loc>
      <image:title>Mobile Application Security Assessment</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f8b777e4b075e46824a3f3/1442363287252/mobile+application+security.jpg</image:loc>
      <image:title>Mobile Application Security Assessment</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/secure-managed-cloud-hosting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-05</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/568c42eb40667a5449908153/1452032752479/Secure+Managed+Hosting+Offer</image:loc>
      <image:title>Managed Secure Cloud Hosting</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f9051ee4b090953a939b19/1442383143481/secure_cloud_hosting.jpg</image:loc>
      <image:title>Managed Secure Cloud Hosting</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/saas-application-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-15</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55c84083e4b00c506c6311ed/1439187075786/cloud.jpg</image:loc>
      <image:title>SaaS Application Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/ecommerce-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-04-17</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55c840c3e4b0672c6264a62b/1439187139731/ecommerce.jpg</image:loc>
      <image:title>eCommerce Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/managed-event-correlation-seim</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-08-10</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/55f90108e4b03cd7231e967f/1442382094089/event+correlation+image.jpg</image:loc>
      <image:title>Managed Event Correlation / SEIM</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/waf-overview</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-11-02</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobile-top-10-security-issues</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/trial-mobile-scan</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-11-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/penetration-test-report-sample</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/online-gaming-applications-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-04-17</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5689f41640667a3869219f53/1451881495282/9090-an-abstract-blue-background-pv.jpg</image:loc>
      <image:title>Online Gaming Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/healthcare-applications-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-15</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5698589f25981d2a2f405ec4/1452824736118/5686-abstract-background-of-blue-rays-pv.jpg</image:loc>
      <image:title>Healthcare Applications Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/financial-application-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-15</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5689f6da05f8e23aa291fd89/1451882205071/background-15.jpg</image:loc>
      <image:title>Financial Application Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/internet-of-things-iot-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-15</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5689f7f11115e06a4a2cff10/1451882483130/warm-blurred-colors-wallpaper-14291.jpg</image:loc>
      <image:title>Internet of Things (IoT) Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/digital-media-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-04</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/5689f9001115e06a4a2d07f6/1451882754884/background-waves-1445353418_40.jpg</image:loc>
      <image:title>Digital Media Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-security-knowledge-base</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-security-resources</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-26</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/568f31507086d7ca717e0a34/568f31711115e08523a18f1a/1452226331619/</image:loc>
      <image:title>eBooks - Secure Mobile Applications Development Guidelines</image:title>
      <image:caption>Mobile companies have as well encountered with the challenge of meeting the increasing expectations for secured and innovative mobile applications. Along with the increasing expectations of customers, the ever-changing mobile technology put an additional pressure on the developers. In order to stay ahead of the competitors, different companies have been trying on creating more portable and innovative applications. It has resulted in a trend to outsource the development of mobile application development specialized companies for wireless devices.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/568f31507086d7ca717e0a34/569c7b6725981de028b38b6a/1453096059907/3D.png</image:loc>
      <image:title>eBooks - Secure Web Applications Development Guidelines</image:title>
      <image:caption>Security is an important portion of the web application; therefore, through understanding and executing accurate security procedures, you can protect all your resources together with providing a secure environment wherein the users can be comfortable in working with your apps.  This secure web applications development guideline is composed of technical and procedural control statements. The control statements show security requirements, which must be adhered in order to develop a web-based application directed for administration. The control statements contained in this guideline have been categorized into appropriate sections like Web Access Authentication and Control, Auditing and Logging, Error Handling, and Session Management.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/568f31507086d7ca717e0a34/56a719e2c647ad6b8c437eac/1453791835721/</image:loc>
      <image:title>eBooks - Cloud Security Guidelines</image:title>
      <image:caption>Cloud Computing has created a lot of buzz in the IT industry, especially in our information driven world. In fact, as of 2015, 88% of businesses have already adopted cloud services to leverage their business operation and well as to reinforce their ROI. However, since private cloud computing controls most HIPPA and PCI-sensitive organizations using a complex web-based infrastructure, the security of the data has been one of the leading concern imposed to many IT professional. Since cloud services offer instances for many clients to utilize a single hardware, the data stored on its database has the possibility to get lost in the cloud when you didn’t have a proper control over where your own data lives.  </image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/568f31507086d7ca717e0a34/56b1537501dbae20b9c6c67b/1454461946336/3D.png</image:loc>
      <image:title>eBooks - Internet of Things (IoT) Security Guidelines</image:title>
      <image:caption>Internet of Things or (IoT) is a blazing point these days. However, what exactly is IoT? An explanation in the simplest way is that it could be regarded as an internet connects virtually between everything that is present in the surroundings, and it can be monitored and operated online. It can depict a situation in which everything that encompasses the surroundings is prepared and made to do consequent interactions with each other without any human-to-machine or inter-human contact.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/what-is-sql-injection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/malicious-code-injection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cross-site-scripting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/directory-traversal</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/ldap-injection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/buffer-overflow</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/crlf-injection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cross-site-request-forgery</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/failure-to-restrict-url</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/insecure-cryptographic-storage</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/insufficient-transport-layer-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/infographics-application-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/56ad85c88a65e2a286059700/56ad85e8356fb02b30ed5932/1454212740392/</image:loc>
      <image:title>InfoGraphics - Worst Cloud Security Threats</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/56ad85c88a65e2a286059700/56ad8750d51cd4b8d340affa/1454213084448/Benefits+of+Web+Application+Scanning.png</image:loc>
      <image:title>InfoGraphics - Benefits of Web Application Scanning</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/56ad85c88a65e2a286059700/56ad881ebe7b963e327a6884/1454213336100/Basics+of+Information+Security.png</image:loc>
      <image:title>InfoGraphics - Basic Do's and Don'ts of Information Security</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/56ad85c88a65e2a286059700/56ad8839be7b963e327a68ec/1454213263601/Cloud+Infrastructure+Testing.png</image:loc>
      <image:title>InfoGraphics - Cloud Infrastructure Testing</image:title>
      <image:caption />
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/terms-and-conditions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/internal-and-external-vulnerability-scanning</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-11</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/57e3498fcd0f682593f12b30/1474513439371/</image:loc>
      <image:title>Internal And External Vulnerability Scanning</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/57e34b6015d5dbede545e030/1474513762365/9090-an-abstract-blue-background-pv.jpg</image:loc>
      <image:title>Internal And External Vulnerability Scanning</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/infrastructure-configuration-audit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-04-17</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/managed-website-defacement-monitoring-service</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-01-26</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/58894ac2c534a5a85e46f37d/1485392726471/Website+defacement+monitoring+service</image:loc>
      <image:title>Managed Website Defacement Monitoring Service</image:title>
      <image:caption>Lean Security is authorised partner of Banffcyber Technologies. https://www.banffcyber.com</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/58894c2286e6c0fdd2efec3e/1485392934419/post_67_13.jpg</image:loc>
      <image:title>Managed Website Defacement Monitoring Service</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/web-services-penetration-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-02-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/58b52c57ff7c50fb6b0c6dba/1488268377781/light-blue-wallpaper-7846-8139-hd-wallpapers-1024x576.jpg</image:loc>
      <image:title>Web Services Penetration Test</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/iot-penetration-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-02-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/58b52c4ad482e976ebefb575/1488268363518/light-blue-wallpaper-7846-8139-hd-wallpapers-1024x576.jpg</image:loc>
      <image:title>IoT Penetration Test</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/security-risks-assessment-and-consulting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-11</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/58c35c3c725e25606fa48f37/1489198142559/9090-an-abstract-blue-background-pv.jpg</image:loc>
      <image:title>Security Risks Assessments</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/penetration-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-11</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/58c3642f1b631bea2c2c954e/1489200176869/image033.png</image:loc>
      <image:title>Penetration Test</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/58c365c41b10e3fe89dbb069/1489200583511/iphone-1422026_640.png</image:loc>
      <image:title>Penetration Test</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/external-network-penetration-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-11</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/58c36a23197aea79a9a311f4/1489201702048/9090-an-abstract-blue-background-pv.jpg</image:loc>
      <image:title>External Network Penetration Test</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-penetration-test-prices</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-penetration-test-prices/basic-web-application-test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-03-11</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/563150b4e4b083ece641b72a/1446072501702/Basic+Dynamic+Web+Application+Security+Testing+Methodology</image:loc>
      <image:title>Application Penetration Test - Application Penetration Test - Tier 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/551b4246e4b071275ffc1346/58c36efa2e69cfc36094fb36/1489202970169/image033.png</image:loc>
      <image:title>Application Penetration Test - Application Penetration Test - Tier 1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-penetration-test-prices/standard-web-application-test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-03-11</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/563151e3e4b0326d058e6f4f/1446072804571/C%3A%5CValera%5Carticles%5CStandard+Dynamic+Web+Application+Security+Testing+Methodology.png</image:loc>
      <image:title>Application Penetration Test - Application Penetration Test - Tier 2</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/551b4246e4b071275ffc1346/58c36f26cd0f68690ff0d6b6/1489202983977/image033.png</image:loc>
      <image:title>Application Penetration Test - Application Penetration Test - Tier 2</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-penetration-test-prices/premium-web-application-test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-03-11</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/563154a1e4b0918ad71aee89/1446073506482/Web+Application+Penetration+Testing+Methodology</image:loc>
      <image:title>Application Penetration Test - Application Penetration Test - Tier 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/551b4246e4b071275ffc1346/58c36f588419c2ae2bea9f42/1489203033310/image033.png</image:loc>
      <image:title>Application Penetration Test - Application Penetration Test - Tier 3</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/static-source-code-analysis-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-10-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/static-source-code-analysis-1/on-demand-source-code-analysys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-22</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/55261bace4b09e55321499f9/553596fce4b09695be6de92c/1507532602669/Code_Icon.PNG</image:loc>
      <image:title>Static Source Code Analysis - Static Source Code Analysys</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobile-application-testing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobile-application-testing/standard-mobile-application-penetration-test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-25</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/5527755de4b09a3d0e894b91/58c3708e5016e1ebfdd93836/1489203346900/iphone-1422026_640.png</image:loc>
      <image:title>Mobile Application Testing - Mobile Application Penetration Test - Tier 1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobile-application-testing/premium-mobile-application-penetration-test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-03-11</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/5527755de4b09a3d0e894b91/58c370a8414fb5f3a759a7c3/1489203536456/iphone-1422026_640.png</image:loc>
      <image:title>Mobile Application Testing - Mobile Application Penetration Test - Tier 2</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/network-penetration-tests</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-09-23</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/network-penetration-tests/external-network-penetration-test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-03-14</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/55416e97e4b086faa73e06fb/55416f5de4b0dcf3b9841f40/1430351709217/icon128-2x.png</image:loc>
      <image:title>External Infrastructure Penetration Test - External Infrastructure Penetration Test</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/web-services-penetration-test-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-02-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/t/58b530be1b10e3328dcb883c/1488269503946/light-blue-wallpaper-7846-8139-hd-wallpapers-1024x576.jpg</image:loc>
      <image:title>Web Services Penetration Test</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/web-services-penetration-test-1/web-service-penetration-test-tier-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-03-11</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/58b52ccfebbd1a0f1760d87e/58c37516cd0f68690ff10d89/1489204506794/gear-47203_640.png</image:loc>
      <image:title>Web Services Penetration Test - Web Service Penetration Test - Tier 1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/security-risks-assessment-and-consulting-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/security-risks-assessment-and-consulting-1/phone-skype-consultation-1-hour</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-03-11</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/58c35ca5b8a79bba777f5ce9/58c35d4a6b8f5b5e4d5120b7/1489198412260/vector_65_01-512.png</image:loc>
      <image:title>Security Risks Assessment and Consulting - Phone / Skype Consultation - 1 hour</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cloud-infrastructure-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cloud-infrastructure-security/amazon-aws-security-audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-06-05</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/59352763725e25b450abd2d8/593527b9c534a56c19637638/1496655802567/AWS_LOGO_RGB.png.scaled.500.jpg</image:loc>
      <image:title>Cloud Infrastructure Security - Amazon AWS Security Audit</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cloud-infrastructure-security/salesforce-security-audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-06-05</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5516199be4b05ede7c57f94f/59352763725e25b450abd2d8/593529db1b631ba4719217f6/1496656347693/Salesforce_logo.jpg</image:loc>
      <image:title>Cloud Infrastructure Security - Salesforce Security Audit</image:title>
    </image:image>
  </url>
</urlset>

