<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.layersevensecurity.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.layersevensecurity.com/blog/</loc>
		<lastmod>2026-04-14T17:10:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-blog/</loc>
		<lastmod>2012-01-19T00:23:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/the-hidden-danger-of-sap-grc-solutions/</loc>
		<lastmod>2012-02-05T04:14:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-crack-sap-passwords-bypass-single-sign-on-and-install-rootkits-and-trojans-in-abap-programs/</loc>
		<lastmod>2012-02-05T15:15:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/why-did-it-take-sap-18-months-to-fix-a-session-hijacking-vulnerability-in-the-netweaver-portal/</loc>
		<lastmod>2012-02-14T18:53:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/netweaver-single-sign-on-is-it-worth-the-risk/</loc>
		<lastmod>2012-02-23T20:10:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/microsoft-hack-exposed-credit-card-details/</loc>
		<lastmod>2012-02-27T14:48:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/mastercard-confirms-it-will-enforce-the-pci-dss-compliance-deadline-for-level-2-merchants/</loc>
		<lastmod>2012-03-01T13:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/PCIBigUmbrella.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/why-you-should-immediately-patch-the-recent-dos-vulnerability-in-aix/</loc>
		<lastmod>2012-04-11T12:35:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/when-do-default-passwords-become-a-configuration-error/</loc>
		<lastmod>2012-04-13T12:25:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-had-reservations-with-deloittes-blueprint-for-marin-county/</loc>
		<lastmod>2012-04-18T13:12:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/a-ten-step-guide-to-implementing-saps-new-security-recommendations/</loc>
		<lastmod>2012-04-19T15:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/the-four-myths-of-erp-security/</loc>
		<lastmod>2012-05-03T02:39:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/the-top-5-security-notes-you-should-apply-to-patch-your-sap-systems/</loc>
		<lastmod>2012-05-24T17:16:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Advisory_SAP-Security-Notes_April-2012-300x201.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/white-hats-black-hats-and-skiddies-the-class-system-in-information-security/</loc>
		<lastmod>2012-06-01T02:55:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/ftc-takes-action-against-wyndham-worldwide-after-data-breach/</loc>
		<lastmod>2012-07-13T15:37:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/soap-opera-securing-sap-web-services/</loc>
		<lastmod>2012-07-20T02:15:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ICM1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-july-2012/</loc>
		<lastmod>2012-08-08T12:44:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/download-the-ultimate-guide-to-auditing-and-securing-procure-to-pay-controls-in-sap/</loc>
		<lastmod>2012-08-17T12:16:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cybersecurity-disclosures-a-three-step-strategy-for-compliance-with-the-new-sec-guidance/</loc>
		<lastmod>2012-08-23T17:22:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-august-2012/</loc>
		<lastmod>2012-09-14T14:51:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/security-researchers-expose-a-dangerous-authentication-bypass-in-oracle-databases-2/</loc>
		<lastmod>2012-09-27T23:05:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-september-2012/</loc>
		<lastmod>2012-10-18T18:09:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-audit-guides-for-inventory-and-human-resources/</loc>
		<lastmod>2012-11-30T15:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/the-final-frontier-the-challenges-in-developing-secure-custom-abap-programs/</loc>
		<lastmod>2013-01-18T19:11:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/lessons-from-the-top-ten-data-breaches-of-2012-defense-in-depth-for-sap-systems/</loc>
		<lastmod>2013-02-06T18:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/international-corporate-espionage-annual-cost-of-intellectual-property-theft-estimated-at-250-billion-for-u-s-economy/</loc>
		<lastmod>2013-03-27T12:40:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/05/Bridgestone.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/05/Indivior-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/countering-the-threat-of-corporate-espionage/</loc>
		<lastmod>2013-04-04T13:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/verizon-data-breach-investigations-report-dbir-2013-this-isnt-a-threat-you-can-afford-to-ignore/</loc>
		<lastmod>2013-04-26T16:29:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Verizon-DBIR-2013_CCA-CSC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Verizon-DBIR-2013_CCA-and-Threat-Actions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-your-sap-systems-how-to-counter-every-current-and-emerging-threat/</loc>
		<lastmod>2013-05-31T13:25:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Sapphire-2013.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/exploring-the-sap-diag-protocol/</loc>
		<lastmod>2013-06-27T20:15:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/lloyds-2013-risk-index-cyber-risk-rated-as-the-third-most-significant-risk-by-board-executives/</loc>
		<lastmod>2013-07-17T15:50:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/a-dangerous-flaw-in-the-sap-user-information-system-suim/</loc>
		<lastmod>2013-08-13T15:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/introducing-the-abap-test-cockpit-a-new-level-of-abap-quality-assurance/</loc>
		<lastmod>2013-08-15T12:56:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ABAP-Test-Cockpit1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/organisations-are-not-effectively-addressing-it-security-and-compliance-risks-according-to-accounting-professionals/</loc>
		<lastmod>2013-08-27T14:05:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/layered-database-security-in-oracle-12c/</loc>
		<lastmod>2013-09-17T17:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/security-in-sap-hana-the-challenges-of-in-memory-computing-2/</loc>
		<lastmod>2013-10-31T16:05:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/new-malware-variant-suggests-cybercriminals-are-targeting-sap-systems/</loc>
		<lastmod>2013-11-07T15:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/monitoring-access-to-sensitive-data-using-sap-ral/</loc>
		<lastmod>2013-11-20T19:35:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/three-parallels-between-the-pos-breach-at-target-corp-and-vulnerabilities-in-erp-systems/</loc>
		<lastmod>2013-12-20T17:55:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/measuring-the-risks-of-cyber-attack/</loc>
		<lastmod>2014-01-23T20:45:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/a-first-look-at-the-u-s-data-security-and-breach-notification-act/</loc>
		<lastmod>2014-02-11T19:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/trustwave-survey-reveals-that-it-professionals-are-feeling-the-pressure-of-board-level-scrutiny-over-cyber-security/</loc>
		<lastmod>2014-03-25T14:45:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/m-trends-verizon-dbir-symantec-istr-detecting-and-responding-to-cyber-attacks-has-never-been-more-important/</loc>
		<lastmod>2014-04-28T16:20:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/five-reasons-you-do-not-require-third-party-security-solutions-for-sap-systems/</loc>
		<lastmod>2014-05-29T16:58:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cybersecurity-insurance-is-it-worth-the-cost/</loc>
		<lastmod>2014-06-26T14:16:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/a-five-step-guide-to-securing-sap-systems-from-cyber-attack-without-breaking-the-bank/</loc>
		<lastmod>2014-09-30T15:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/fbi-director-james-comey-speaks-out-on-the-threat-of-cybercrime/</loc>
		<lastmod>2014-10-09T21:15:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-secure-sap-systems-from-password-attacks/</loc>
		<lastmod>2014-11-04T20:35:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/new-sap-guidance-recommends-configuration-validation-for-security-monitoring/</loc>
		<lastmod>2014-12-02T18:26:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/three-steps-to-prevent-a-sony-scale-breach-of-your-sap-systems/</loc>
		<lastmod>2014-12-19T18:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-cybersecurity-framework-2-0-whats-new/</loc>
		<lastmod>2015-01-14T12:20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/five-logs-that-could-reveal-a-data-breach-in-your-sap-systems/</loc>
		<lastmod>2015-02-11T02:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/discover-security-patches-for-your-sap-systems-using-system-recommendations/</loc>
		<lastmod>2015-03-05T03:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Note-888889-e1425525218895.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SysRec2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SysRec10-300x83.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SysRec4-300x247.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SysRec11-300x139.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SysRec12-212x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/turn-the-tide-against-cyber-attacks-with-sap-enterprise-threat-detection/</loc>
		<lastmod>2015-04-09T16:59:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-ETD-Dashboard.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/are-95-percent-of-sap-systems-really-vulnerable-to-cyber-attack/</loc>
		<lastmod>2015-05-26T12:10:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/opm-data-breach-reveals-the-limitations-of-cybersecurity-solutions/</loc>
		<lastmod>2015-06-23T17:35:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/counting-the-costs-of-cyber-espionage/</loc>
		<lastmod>2015-07-03T19:03:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/can-you-trust-sap-with-your-system-security/</loc>
		<lastmod>2015-08-19T12:48:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-protect-access-to-sensitive-data-in-your-sap-systems-using-read-access-logging/</loc>
		<lastmod>2015-09-20T16:25:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Administration-2-300x257.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Logging-Purpose-Creation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Log-Domains-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Recording-2-300x118.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Recording-Session-2-300x115.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Monitor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Log-Results-Details-2-SSN-300x110.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Log-Results-Details-2-Bank-300x124.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Log-Results-Details-2-SALARY-300x140.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ST03-Table-Access-Log-by-Transaction-and-Table-300x163.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-discover-missing-security-notes-for-your-sap-systems-using-conval/</loc>
		<lastmod>2015-10-20T20:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ConVal-SysRec-1A-300x87.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ConVal-SysRec-2A.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ConVal-SysRec-3A-300x94.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ConVal-SysRec-4A-300x79.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ConVal-SysRec-5A-300x231.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ConVal-SysRec-6A-300x133.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/monitoring-sap-security-metrics-with-solman-dashboards/</loc>
		<lastmod>2015-11-19T02:13:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboards-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboards-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboards-1A.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboards-2A.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboards-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboards-3A-300x63.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboards-9-300x118.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboards-11-300x282.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboards-12A-300x187.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboards-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/are-your-system-users-vulnerable-to-sap-hacks/</loc>
		<lastmod>2015-11-24T23:58:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/BAPI_USER_CHANGE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-RFC-Destination-Remote-Logon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/RFCDES_TYPE_32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/RFCDES_TYPE_3_CHECK2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/whats-new-in-the-sap-cybersecurity-framework-3-0/</loc>
		<lastmod>2016-01-14T17:34:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cybersecurity-targets-in-chinas-new-five-year-plan/</loc>
		<lastmod>2016-02-19T18:41:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/survey-reveals-65-percent-of-sap-platforms-were-breached-between-2014-15/</loc>
		<lastmod>2016-02-26T21:36:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-block-rfc-callback-attacks-in-your-sap-systems/</loc>
		<lastmod>2016-03-23T18:58:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/RFC-Callback-Attacks-Function-Builder.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/RFC-Callback-Attacks-Connection-Test-Results.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/RFC-Callback-Attacks-Security-Audit-Log-300x117.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/RFC-Callback-Attacks-RFC-Callback-Rejected.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-visualize-cyber-security-risks-in-your-systems-with-sap-lumira/</loc>
		<lastmod>2016-04-29T01:35:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Lumira-1-300x129.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Lumira-2-300x127.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Lumira-3-300x129.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Lumira-4-300x120.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Lumira-5-300x133.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/us-cert-issues-alert-for-sap-invoker-servlet-vulnerability/</loc>
		<lastmod>2016-05-12T16:56:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Invoker-Servlet-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Invoker-Servlet-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Invoker-Servlet-5-300x126.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Invoker-Servlet-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/security-in-sap-hana/</loc>
		<lastmod>2016-05-30T19:27:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/three-reasons-you-should-budget-for-sap-breach-costs/</loc>
		<lastmod>2016-06-28T17:49:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-august-2016/</loc>
		<lastmod>2016-09-02T19:31:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Security-Notes_August-2016-300x146.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cybercrime-projected-to-reach-2-trillion-by-2019/</loc>
		<lastmod>2016-10-28T17:20:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Data-Breach-Costs-2015-2020-e1477674693448.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Projected-Volume-of-Data-Breaches-2015-2020-e1477674816997.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-your-business-security-at-sap/</loc>
		<lastmod>2016-10-29T11:56:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/rfc-hacking-how-to-hack-an-sap-system-in-3-minutes/</loc>
		<lastmod>2017-01-21T18:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/introducing-the-sap-cybersecurity-framework-4-0/</loc>
		<lastmod>2017-01-25T14:49:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-january-2017/</loc>
		<lastmod>2017-02-07T18:07:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/06/SAP-Security-Notes-January-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/explore-service-level-reporting-in-solman-7-2/</loc>
		<lastmod>2017-02-27T20:10:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SLR-1-e1488225021797.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SLR-2-e1488225140135.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SLR-4-e1488225205356.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-february-2017/</loc>
		<lastmod>2017-03-07T18:34:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/06/SAP-Security-Notes-February-2017-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/security-kpi-monitoring-with-solman-dashboards/</loc>
		<lastmod>2017-03-29T01:42:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboard-Builder-e1490750439768.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-KPI-Catalog-e1490750687595.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/KPI-e1490750768352.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Dashboard-e1490750838753.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Details-e1490750878993.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-march-2017/</loc>
		<lastmod>2017-04-07T19:29:48+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/06/SAP-Security-Notes-March-2017-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-april-2017-2/</loc>
		<lastmod>2017-05-07T19:54:48+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/06/SAP-Security-Notes-April-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/highlights-of-the-2017-dbir-report/</loc>
		<lastmod>2017-05-10T20:30:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/DBIR-2017-1-e1494447873474.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/DBIR-2017-2-e1494447902187.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-may-2017/</loc>
		<lastmod>2017-06-07T20:07:21+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/06/SAP-Security-Notes-May-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-june-2017-2/</loc>
		<lastmod>2017-07-07T20:19:31+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/06/SAP-Security-Notes-June-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-july-2017/</loc>
		<lastmod>2017-08-08T20:32:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/06/SAP-Security-Notes-July-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/discover-vulnerable-system-connections-with-interface-monitoring/</loc>
		<lastmod>2017-08-23T20:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ICMon-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ICMon-e1503517932396.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ICMon-2-e1503518048418.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ICMon-3-e1503518104933.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ICMon-4-e1503518419843.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ICMon-7-e1503518448315.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/ICMon-6-e1503518513219.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-august-2017-2/</loc>
		<lastmod>2017-09-07T20:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/06/SAP-Security-Notes-August-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/equifax-data-breach-attackers-exploited-an-unapplied-security-patch-not-a-zero-day-vulnerability/</loc>
		<lastmod>2017-09-16T18:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-september-2017/</loc>
		<lastmod>2017-10-29T21:28:12+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/06/SAP-Security-Notes-September-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-october-2017-2/</loc>
		<lastmod>2017-11-07T12:38:49+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-October-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-november-2017-2/</loc>
		<lastmod>2017-12-07T12:43:41+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-November-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-december-2017/</loc>
		<lastmod>2018-01-09T12:52:18+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-December-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-january-2018-2/</loc>
		<lastmod>2018-02-01T12:55:59+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-January-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-february-2018/</loc>
		<lastmod>2018-03-07T13:03:58+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-February-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-march-2018-2/</loc>
		<lastmod>2018-04-07T13:23:46+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-March-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-april-2018/</loc>
		<lastmod>2018-05-08T13:25:09+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-April-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-may-2018-2/</loc>
		<lastmod>2018-06-07T13:33:27+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-May-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/top-five-tips-for-system-recommendations/</loc>
		<lastmod>2018-06-13T01:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SysRec-1-e1528852672350.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SysRec-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SysRec-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/u-s-treasury-sanctions-erpscan/</loc>
		<lastmod>2018-06-14T17:01:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-june-2018/</loc>
		<lastmod>2018-07-07T13:39:16+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-June-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/dhs-issues-warning-for-cyber-attacks-targeting-sap-applications/</loc>
		<lastmod>2018-07-26T14:46:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-july-2018-2/</loc>
		<lastmod>2018-08-07T13:44:37+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-July-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/solman-siem-integration-for-advanced-threat-detection/</loc>
		<lastmod>2018-08-26T11:30:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Cybersecurity-Monitoring-with-SAP-Solution-Manager-2.0-e1535282444442.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Splunk-1-e1535282556758.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Splunk-2-e1535282570631.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-august-2018/</loc>
		<lastmod>2018-09-07T01:09:10+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-August-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-september-2018-2/</loc>
		<lastmod>2018-10-09T01:15:42+00:00</lastmod>
		<image:image>
			<image:loc>https://new.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-September-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-comply-with-the-dhs-recommendations-for-securing-sap-systems-from-cyber-attacks/</loc>
		<lastmod>2018-10-16T16:40:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/coming-soon-security-reporting-with-sap-web-intelligence/</loc>
		<lastmod>2018-10-16T22:36:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Web-Intelligence-1-e1539728616322.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Web-Intelligence-2-e1539728720889.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Web-Intelligence-3-e1539728767978.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Web-Intelligence-3A-e1539728819244.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-october-2018/</loc>
		<lastmod>2018-11-07T21:32:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-October-2018-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/secure-patch-respond-security-analytics-with-sap-web-intelligence/</loc>
		<lastmod>2018-11-21T01:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/webinar-security-analytics-with-sap-web-intelligence/</loc>
		<lastmod>2018-11-27T17:13:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Capture-e1543334148858.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-november-2018-2/</loc>
		<lastmod>2018-12-07T21:54:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-November-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/webinar-recording-security-analytics-with-sap-web-intelligence/</loc>
		<lastmod>2018-12-17T17:23:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Capture-e1543334148858.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/layer-seven-security-recognized-as-an-sap-cybersecurity-leader/</loc>
		<lastmod>2018-12-17T19:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Layer-Seven-Security-Roadmap-1-e1545073587764.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-december-2018/</loc>
		<lastmod>2019-01-08T22:05:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/07/SAP-Security-Notes-December-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-january-2019/</loc>
		<lastmod>2019-02-07T10:39:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-January-2019-e1559918170590.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cyber-espionage-warning-30-growth-in-targeted-attacks/</loc>
		<lastmod>2019-02-25T21:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-february-2019/</loc>
		<lastmod>2019-03-07T10:43:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-February-2019-e1559918602449.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-march-2019/</loc>
		<lastmod>2019-04-07T10:47:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-March-2019-e1559918823285.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-administrative-access-in-sap-as-java/</loc>
		<lastmod>2019-04-25T16:22:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Java-User-Monitoring-2-e1556208704241.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/Java-User-Monitoring-1-e1556209113475.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-april-2019/</loc>
		<lastmod>2019-05-07T10:51:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-April-2019-e1559919022855.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/webinar-10kblaze-secure-your-sap-systems-with-cva-and-solman/</loc>
		<lastmod>2019-05-09T13:34:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-may-2019/</loc>
		<lastmod>2019-06-07T17:13:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-May-2019-e1559927517785.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-june-2019/</loc>
		<lastmod>2019-07-05T19:09:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/recommended-settings-for-sap-logging-and-auditing/</loc>
		<lastmod>2019-07-25T18:41:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-july-2019/</loc>
		<lastmod>2019-08-14T23:44:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-august-2019/</loc>
		<lastmod>2019-09-05T20:40:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-vulnerability-assessment-vs-penetration-testing/</loc>
		<lastmod>2019-09-19T15:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-september-2019/</loc>
		<lastmod>2019-10-05T20:06:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/64-of-erp-systems-have-experienced-security-breaches-between-2017-19/</loc>
		<lastmod>2019-10-31T15:23:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-october-2019/</loc>
		<lastmod>2019-11-04T19:34:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/siem-integration-with-sap-solution-manager/</loc>
		<lastmod>2019-11-20T22:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/11/SIEM-Integrator-for-SAP-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/11/Splunk-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/11/Splunk-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-november-2019/</loc>
		<lastmod>2019-12-10T15:33:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/seasons-greetings-layer-seven-security/</loc>
		<lastmod>2019-12-17T21:57:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2019/12/Christmas.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-december-2019/</loc>
		<lastmod>2020-01-03T15:31:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/whitepaper-siem-integration-for-sap/</loc>
		<lastmod>2020-01-17T16:27:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-january-2020/</loc>
		<lastmod>2020-02-03T16:33:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/webinar-playback-siem-integration-for-sap/</loc>
		<lastmod>2020-03-17T15:08:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-february-2020/</loc>
		<lastmod>2020-03-18T22:15:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-march-2020/</loc>
		<lastmod>2020-04-03T16:52:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/dramatic-growth-in-cyber-attacks-increases-enterprise-risk/</loc>
		<lastmod>2020-04-07T16:04:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-the-saprouter-from-remote-attacks/</loc>
		<lastmod>2020-04-14T22:08:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/layer-seven-security-recognized-as-top-25-cyber-security-company/</loc>
		<lastmod>2020-04-23T14:53:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-april-2020/</loc>
		<lastmod>2020-05-07T17:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-discloses-security-gaps-in-cloud-solutions/</loc>
		<lastmod>2020-05-13T13:26:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/visualize-security-risks-for-sap-systems-with-threat-maps/</loc>
		<lastmod>2020-05-26T21:32:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/05/Threat-Maps-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/05/Threat-Maps-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/05/Threat-Maps-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/05/Threat-Maps-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/05/Threat-Maps-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/05/Threat-Maps-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/05/Threat-Maps-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-may-2020/</loc>
		<lastmod>2020-06-04T14:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-discloses-critical-vulnerabilities-in-ase-databases/</loc>
		<lastmod>2020-06-04T16:32:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/anomaly-detection-with-cybersecurity-extension-for-sap/</loc>
		<lastmod>2020-06-26T16:53:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/06/Anomaly-Detection-with-SAP-Solution-Manager-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/06/Anomaly-Detection-with-SAP-Solution-Manager-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/06/Anomaly-Detection-with-SAP-Solution-Manager-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/06/Anomaly-Detection-with-SAP-Solution-Manager-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/06/Anomaly-Detection-with-SAP-Solution-Manager-07-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-june-2020/</loc>
		<lastmod>2020-07-03T17:48:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-july-2020/</loc>
		<lastmod>2020-08-05T00:30:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-august-2020/</loc>
		<lastmod>2020-09-03T19:43:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-september-2020/</loc>
		<lastmod>2020-10-09T17:16:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-october-2020/</loc>
		<lastmod>2020-11-06T18:46:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-november-2020/</loc>
		<lastmod>2020-12-04T16:57:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/compliance-reporting-for-the-sap-security-baseline/</loc>
		<lastmod>2020-12-16T22:08:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/12/SAP-Security-Baseline-Compliance-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/12/SAP-Security-Baseline-Compliance-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/12/SAP-Security-Baseline-Compliance-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/12/SAP-Security-Baseline-Compliance-04-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/12/SAP-Security-Baseline-Compliance-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/12/SAP-Security-Baseline-Compliance-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2020/12/SAP-Security-Baseline-Compliance-07.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-december-2020/</loc>
		<lastmod>2021-01-04T21:49:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/solarwinds-attack-lessons-learned-for-sap-cyber-security/</loc>
		<lastmod>2021-01-26T18:32:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2021/01/SUNBURST.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-january-2021/</loc>
		<lastmod>2021-02-19T19:08:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/layer-seven-securitys-cybersecurity-extension-for-sap-solutions-achieves-sap-certification-as-integrated-with-sap-netweaver/</loc>
		<lastmod>2021-03-08T17:53:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2021/03/SAP-Certified.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-february-2021/</loc>
		<lastmod>2021-03-10T18:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-linux-platforms-for-sap-hana-and-s-4hana/</loc>
		<lastmod>2021-03-26T18:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2021/03/OS-Security-Monitoring-with-SAP-Solution-Manager-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-march-2021/</loc>
		<lastmod>2021-04-09T15:05:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cybersecurity-extension-for-sap-identifies-signatures-of-active-sap-cyberattacks/</loc>
		<lastmod>2021-04-27T14:25:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2021/04/Active-SAP-Cyberattacks-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-april-2021/</loc>
		<lastmod>2021-05-03T19:21:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/protecting-sap-systems-from-ransomware/</loc>
		<lastmod>2021-05-14T16:09:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2021/05/Protecting-SAP-from-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-may-2021/</loc>
		<lastmod>2021-06-08T19:22:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/webinar-playback-protecting-sap-systems-from-ransomware-attacks/</loc>
		<lastmod>2021-06-30T10:48:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2021/06/Layer7_Protecting-SAP-Systems-from-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-software-supply-chains-for-sap-systems/</loc>
		<lastmod>2021-06-30T11:39:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2021/06/shutterstock_680078968-1-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-june-2021/</loc>
		<lastmod>2021-07-16T21:49:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-july-2021/</loc>
		<lastmod>2021-08-06T17:09:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-the-system-user-in-sap-hana/</loc>
		<lastmod>2021-08-30T17:36:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2021/08/HANA-SYSTEM-USER-ALERT-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-august-2021/</loc>
		<lastmod>2021-09-10T18:05:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-september-2021/</loc>
		<lastmod>2021-10-08T00:39:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-october-2021/</loc>
		<lastmod>2021-11-05T14:27:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cisa-issues-directive-for-actively-exploited-sap-vulnerabilities/</loc>
		<lastmod>2021-11-23T19:54:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-november-2021/</loc>
		<lastmod>2021-12-02T22:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-sap-systems-from-log4j-exploits/</loc>
		<lastmod>2021-12-17T19:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-december-2021/</loc>
		<lastmod>2022-01-03T18:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-sap-solutions-from-log4shell/</loc>
		<lastmod>2022-01-18T20:23:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-january-2022/</loc>
		<lastmod>2022-02-04T02:54:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/security-advisory-for-critical-sap-icmad-vulnerabilities/</loc>
		<lastmod>2022-02-15T19:08:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/02/dhs-cisa-1024x294-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cisa-fbi-warn-organizations-to-protect-against-state-sponsored-malware/</loc>
		<lastmod>2022-03-02T16:59:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/03/CISA-Shields-Up.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-february-2022/</loc>
		<lastmod>2022-03-04T22:52:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-march-2022/</loc>
		<lastmod>2022-04-08T00:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-april-2022/</loc>
		<lastmod>2022-05-06T17:09:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-may-2022/</loc>
		<lastmod>2022-06-03T00:22:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/30-percent-of-security-notes-in-system-recommendations-are-false-positives/</loc>
		<lastmod>2022-06-28T15:37:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/06/SYSREC-STATUS-CHANGE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/06/SYSREC-CVE-CVSS-VECTOR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-june-2022/</loc>
		<lastmod>2022-07-08T00:39:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-july-2022/</loc>
		<lastmod>2022-08-05T21:17:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-oracle-databases-for-sap/</loc>
		<lastmod>2022-08-17T17:09:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/08/Securing-Oracle-Databases-for-SAP-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/08/Securing-Oracle-Databases-for-SAP-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-august-2022/</loc>
		<lastmod>2022-09-02T00:59:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-custom-sapui5-applications-using-the-cybersecurity-extension-for-sap/</loc>
		<lastmod>2022-09-28T17:44:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/09/UI5-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/09/UI5-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-september-2022/</loc>
		<lastmod>2022-09-30T22:55:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-october-2022/</loc>
		<lastmod>2022-10-31T22:33:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-microsoft-platforms-with-the-cybersecurity-extension-for-sap/</loc>
		<lastmod>2022-11-23T20:41:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/11/Microsoft-Security-Monitoring-with-the-Cybersecurity-Extension-for-SAP-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/11/Microsoft-Security-Monitoring-with-the-Cybersecurity-Extension-for-SAP-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/11/Securing-Microsoft-Platforms-with-the-Cybersecurity-Extension-for-SAP-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/11/Microsoft-Security-Monitoring-with-the-Cybersecurity-Extension-for-SAP-06.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-november-2022/</loc>
		<lastmod>2022-12-06T01:10:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-the-journey-to-sap-s-4hana/</loc>
		<lastmod>2022-12-20T22:16:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2022/12/s4hana-praxiserfahrung.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-december-2022/</loc>
		<lastmod>2023-01-09T23:18:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/onapsis-transition-guide-to-sap-cybersecurity-competitors-alternatives-2/</loc>
		<lastmod>2023-01-18T00:57:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-onapsis-to-the-cybersecurity-extension-for-sap-part-2/</loc>
		<lastmod>2023-01-18T01:19:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-onapsis-to-the-cybersecurity-extension-for-sap-part-3/</loc>
		<lastmod>2023-01-18T03:26:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-onapsis-to-the-cybersecurity-extension-for-sap-part-4/</loc>
		<lastmod>2023-01-18T03:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-onapsis-to-the-cybersecurity-extension-for-sap-part-5/</loc>
		<lastmod>2023-01-18T03:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-onapsis-to-the-cybersecurity-extension-for-sap-part-6/</loc>
		<lastmod>2023-01-18T03:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-onapsis-to-the-cybersecurity-extension-for-sap-part-7/</loc>
		<lastmod>2023-01-18T03:37:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-onapsis-to-the-cybersecurity-extension-for-sap-part-8/</loc>
		<lastmod>2023-01-18T03:45:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-onapsis-to-the-cybersecurity-extension-for-sap-part-9/</loc>
		<lastmod>2023-01-18T03:48:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-security-bridge-to-the-cybersecurity-extension-for-sap-part-1/</loc>
		<lastmod>2023-01-19T18:11:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-security-bridge-to-the-cybersecurity-extension-for-sap-part-2-2/</loc>
		<lastmod>2023-01-19T20:26:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-security-bridge-to-the-cybersecurity-extension-for-sap-part-3-2/</loc>
		<lastmod>2023-01-19T20:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-security-bridge-to-the-cybersecurity-extension-for-sap-part-4-2/</loc>
		<lastmod>2023-01-19T20:38:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-security-bridge-to-the-cybersecurity-extension-for-sap-part-5-2/</loc>
		<lastmod>2023-01-19T20:41:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-security-bridge-to-the-cybersecurity-extension-for-sap-part-6-2/</loc>
		<lastmod>2023-01-19T20:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-security-bridge-to-the-cybersecurity-extension-for-sap-part-7-2/</loc>
		<lastmod>2023-01-19T20:47:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-security-bridge-to-the-cybersecurity-extension-for-sap-part-8-2/</loc>
		<lastmod>2023-01-19T20:51:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-security-bridge-to-the-cybersecurity-extension-for-sap-part-9-2/</loc>
		<lastmod>2023-01-19T20:54:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-etd-to-the-cybersecurity-extension-for-sap-part-1/</loc>
		<lastmod>2023-01-19T21:53:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-etd-to-the-cybersecurity-extension-for-sap-part-2-2/</loc>
		<lastmod>2023-01-19T21:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-etd-to-the-cybersecurity-extension-for-sap-part-3-2/</loc>
		<lastmod>2023-01-19T22:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-etd-to-the-cybersecurity-extension-for-sap-part-4-2/</loc>
		<lastmod>2023-01-19T22:06:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-etd-to-the-cybersecurity-extension-for-sap-part-5-2/</loc>
		<lastmod>2023-01-19T22:09:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-etd-to-the-cybersecurity-extension-for-sap-part-6-2/</loc>
		<lastmod>2023-01-19T22:12:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-etd-to-the-cybersecurity-extension-for-sap-part-7-2/</loc>
		<lastmod>2023-01-19T22:15:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-etd-to-the-cybersecurity-extension-for-sap-part-8-2/</loc>
		<lastmod>2023-01-19T22:18:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-etd-to-the-cybersecurity-extension-for-sap-part-9-2/</loc>
		<lastmod>2023-01-19T22:21:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-code-vulnerability-analyzer-to-the-cybersecurity-extension-for-sap-part-1/</loc>
		<lastmod>2023-01-19T23:21:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-code-vulnerability-analyzer-to-the-cybersecurity-extension-for-sap-part-2/</loc>
		<lastmod>2023-01-19T23:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-code-vulnerability-analyzer-to-the-cybersecurity-extension-for-sap-part-3/</loc>
		<lastmod>2023-01-19T23:27:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-code-vulnerability-analyzer-to-the-cybersecurity-extension-for-sap-part-4/</loc>
		<lastmod>2023-01-19T23:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-code-vulnerability-analyzer-to-the-cybersecurity-extension-for-sap-part-5/</loc>
		<lastmod>2023-01-19T23:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-code-vulnerability-analyzer-to-the-cybersecurity-extension-for-sap-part-6/</loc>
		<lastmod>2023-01-19T23:38:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-code-vulnerability-analyzer-to-the-cybersecurity-extension-for-sap-part-7/</loc>
		<lastmod>2023-01-19T23:40:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-code-vulnerability-analyzer-to-the-cybersecurity-extension-for-sap-part-8/</loc>
		<lastmod>2023-01-19T23:43:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-switch-from-sap-code-vulnerability-analyzer-to-the-cybersecurity-extension-for-sap-part-9/</loc>
		<lastmod>2023-01-19T23:45:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-january-2023/</loc>
		<lastmod>2023-02-17T01:51:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/analyzing-security-notes-with-sap-maintenance-planner/</loc>
		<lastmod>2023-02-22T01:35:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/02/Analyzing-Security-Notes-with-SAP-Maintenance-Planner-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/02/Analyzing-Security-Notes-with-SAP-Maintenance-Planner-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/02/Analyzing-Security-Notes-with-SAP-Maintenance-Planner-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/02/Analyzing-Security-Notes-with-SAP-Maintenance-Planner-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/02/Analyzing-Security-Notes-with-SAP-Maintenance-Planner-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-february-2023/</loc>
		<lastmod>2023-03-03T01:34:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-march-2023/</loc>
		<lastmod>2023-04-04T02:41:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/whats-new-in-the-cybersecurity-extension-for-sap/</loc>
		<lastmod>2023-04-19T21:58:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/04/Cybersecurity-Extension-for-SAP-v4.4-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/04/Cybersecurity-Extension-for-SAP-v4.4-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-april-2023/</loc>
		<lastmod>2023-05-03T03:51:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/is-sap-ase-the-most-vulnerable-point-in-your-sap-landscape/</loc>
		<lastmod>2023-05-24T16:30:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/05/SAP-ASE-Database-Security-06-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/05/SAP-ASE-Database-Security-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/05/SAP-ASE-Database-Security-08-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/05/SAP-ASE-Database-Security-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/05/SAP-ASE-Database-Security-07-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/05/SAP-ASE-Database-Security-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/05/SAP-ASE-Database-Security-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/05/SAP-ASE-Database-Security-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/05/SAP-ASE-Database-Security-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-may-2023/</loc>
		<lastmod>2023-06-02T17:56:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cybersecurity-threats-to-sap-systems-report/</loc>
		<lastmod>2023-06-07T20:27:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/security-patching-for-sap-solutions/</loc>
		<lastmod>2023-06-21T23:04:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-june-2023/</loc>
		<lastmod>2023-07-10T23:05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/how-to-discover-actively-exploited-vulnerabilities-in-your-sap-systems/</loc>
		<lastmod>2023-07-26T16:44:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/07/Cybersecurity-Extension-for-SAP-Vulnerability-Management-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/07/Cybersecurity-Extension-for-SAP-Vulnerability-Management-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/07/Cybersecurity-Extension-for-SAP-Vulnerability-Management-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/07/Cybersecurity-Extension-for-SAP-Vulnerability-Management-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/07/Cybersecurity-Extension-for-SAP-Vulnerability-Management-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/07/Cybersecurity-Extension-for-SAP-Vulnerability-Management-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/07/Cybersecurity-Extension-for-SAP-Vulnerability-Management-07.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-july-2023/</loc>
		<lastmod>2023-08-04T16:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/new-sec-rules-for-cybersecurity-incident-and-risk-management-disclosures/</loc>
		<lastmod>2023-08-09T23:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-august-2023/</loc>
		<lastmod>2023-08-31T23:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/layer-seven-security-release-updated-ransomware-guide-for-sap/</loc>
		<lastmod>2023-09-19T16:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/09/Ransomware-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-september-2023/</loc>
		<lastmod>2023-10-03T17:57:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/maximize-your-sap-security-budget-how-to-cut-costs-without-downgrading-cybersecurity/</loc>
		<lastmod>2023-10-13T19:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/10/cutting-costs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-october-2023/</loc>
		<lastmod>2023-11-03T21:02:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/security-with-sap-rise-a-shared-model-of-responsibility/</loc>
		<lastmod>2023-11-29T17:25:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/11/SAP-RISE-Security-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2023/11/SAP-RISE-Security-02-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-november-2023/</loc>
		<lastmod>2023-12-01T22:26:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-december-2023/</loc>
		<lastmod>2023-12-14T01:31:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-january-2024/</loc>
		<lastmod>2024-01-12T01:02:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-cybersecurity-buyers-guide-from-sapinsider/</loc>
		<lastmod>2024-01-24T23:29:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/01/SAP-Buyers-Guide-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-february-2024/</loc>
		<lastmod>2024-02-16T03:27:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/security-compliance-for-sap-rise-solutions/</loc>
		<lastmod>2024-02-19T23:03:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/02/SAP-RISE-Security-Compliance-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/02/SAP-RISE-Security-Compliance-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/02/SAP-RISE-Security-Compliance-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/02/SAP-RISE-Security-Compliance-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/02/SAP-RISE-Security-Compliance-06-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/02/SAP-RISE-Security-Compliance-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/02/SAP-RISE-Security-Compliance-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/02/SAP-RISE-Security-Compliance-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-march-2024/</loc>
		<lastmod>2024-03-13T23:38:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/fbi-and-cisa-issue-alert-for-threat-actors-actively-exploiting-sql-injection-vulnerabilities/</loc>
		<lastmod>2024-03-26T17:17:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/03/Cybersecurity-Extension-for-SAP_SQL-Injection-Detection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-april-2024/</loc>
		<lastmod>2024-04-09T23:28:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/artificial-intelligence-exploits-vulnerabilities-in-systems-with-a-87-percent-success-rate/</loc>
		<lastmod>2024-04-18T20:07:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-may-2024/</loc>
		<lastmod>2024-05-14T23:06:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cybersecurity-extension-for-sap-version-5-1/</loc>
		<lastmod>2024-05-16T14:51:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/05/Cybersecurity-Extension-for-SAP-v5.1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-june-2024/</loc>
		<lastmod>2024-06-11T23:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-july-2024/</loc>
		<lastmod>2024-07-09T22:48:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/crowdstrike-outage-lessons-learned-for-sap-solutions/</loc>
		<lastmod>2024-07-23T19:20:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-augusr-2024/</loc>
		<lastmod>2024-08-16T22:09:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/new-whitepaper-nis2-compliance-for-sap-solutions/</loc>
		<lastmod>2024-08-20T16:20:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/08/NIS2-Compliance-for-SAP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-september-2024/</loc>
		<lastmod>2024-09-11T01:43:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/security-logging-and-alerting-for-sap-btp/</loc>
		<lastmod>2024-09-24T22:11:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/09/Cybersecurity-Extension-for-SAP-BTP-Logging-and-Alerting-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2024/09/Cybersecurity-Extension-for-SAP-BTP-Logging-and-Alerting-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-october-2024/</loc>
		<lastmod>2024-10-09T01:27:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cybersecurity-extension-for-sap-version-5-2-support-for-sap-btp-critical-access-and-sod-for-sap-ecc-and-more/</loc>
		<lastmod>2024-10-22T18:41:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-november-2024/</loc>
		<lastmod>2024-11-15T03:35:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/buyers-guide-to-sap-enterprise-threat-detection/</loc>
		<lastmod>2024-11-27T15:36:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-december-2024/</loc>
		<lastmod>2024-12-12T22:42:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/the-most-critical-sap-security-notes-of-2024/</loc>
		<lastmod>2024-12-16T20:23:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-january-2025/</loc>
		<lastmod>2025-01-15T18:42:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/erp-disruption-leads-stoli-to-file-for-bankruptcy/</loc>
		<lastmod>2025-01-28T18:29:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-february-2025/</loc>
		<lastmod>2025-02-14T14:50:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/securing-the-sap-cloud-connector/</loc>
		<lastmod>2025-02-26T20:55:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2025/02/SAP-Cloud-Connector-Security-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2025/02/SAP-Cloud-Connector-Security-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-march-2025/</loc>
		<lastmod>2025-03-11T15:44:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/proposed-changes-to-the-security-rule-for-hipaa-compliance/</loc>
		<lastmod>2025-03-26T20:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-april-2025/</loc>
		<lastmod>2025-04-09T21:26:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/the-24-month-rule-for-sap-security-patching/</loc>
		<lastmod>2025-04-24T19:21:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2025/04/SAP-24-Month-Rule-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2025/04/SAP-24-Month-Rule-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-zero-day-vulnerability-cve-2025-31324/</loc>
		<lastmod>2025-04-28T22:22:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2025/04/CVE-2025-31324-Alert-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2025/04/CVE-2025-31324-Alert-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-may-2025/</loc>
		<lastmod>2025-05-23T20:28:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-vulnerability-actively-exploited-by-ransomware-groups-and-threat-actors/</loc>
		<lastmod>2025-05-28T19:08:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-june-2025/</loc>
		<lastmod>2025-06-10T21:21:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/whats-new-in-the-cybersecurity-extension-for-sap-version-5-3/</loc>
		<lastmod>2025-06-25T17:41:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-july-2025/</loc>
		<lastmod>2025-07-08T14:33:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/cybersecurity-extension-for-sap-netweaver-edition/</loc>
		<lastmod>2025-07-29T13:48:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-august-2025/</loc>
		<lastmod>2025-08-20T18:42:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/top-sap-cybersecurity-protection-solution-2025/</loc>
		<lastmod>2025-08-26T22:18:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2025/08/Top-SAP-Cybersecurity-Protection-Solution-2025.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-september-2025/</loc>
		<lastmod>2025-09-12T00:33:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/workarounds-for-sap-security-notes/</loc>
		<lastmod>2025-09-24T19:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-october-2025/</loc>
		<lastmod>2025-10-15T00:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/penetration-testing-for-sap-rise-sap-cloud-erp/</loc>
		<lastmod>2025-10-29T21:47:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-november-2025/</loc>
		<lastmod>2025-11-11T23:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/whats-new-in-the-cybersecurity-extension-for-sap-version-2-0/</loc>
		<lastmod>2025-11-26T21:44:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-december-2025/</loc>
		<lastmod>2025-12-12T17:04:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/key-security-findings-from-the-rise-with-sap-2025-benchmark-report/</loc>
		<lastmod>2025-12-17T19:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2025/12/RISE-with-SAP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-january-2026/</loc>
		<lastmod>2026-01-14T20:52:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/digital-operational-resilience-act-dora-compliance-for-sap-solutions/</loc>
		<lastmod>2026-01-28T20:40:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.layersevensecurity.com/wp-content/uploads/2026/01/DORA-Compliance-for-SAP.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-february-2026/</loc>
		<lastmod>2026-02-11T23:08:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/state-sponsored-cyber-attacks-an-increasing-threat-to-sap-solutions/</loc>
		<lastmod>2026-02-25T01:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-march-2026/</loc>
		<lastmod>2026-03-10T16:19:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/layer-seven-security-achieves-cybersecure-certification/</loc>
		<lastmod>2026-03-16T19:05:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/now-on-sap-btp-access-the-cybersecurity-extension-for-sap-on-sap-build-work-zone/</loc>
		<lastmod>2026-04-10T14:10:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.layersevensecurity.com/sap-security-notes-april-2026/</loc>
		<lastmod>2026-04-14T17:10:18+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->