<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.boolebox.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.boolebox.com/blog/</loc>
		<lastmod>2026-04-13T13:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.boolebox.com/protect-corporate-credentials-credential-stuffing/</loc>
		<lastmod>2025-12-05T10:54:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/09/credential-stuffing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/zero-trust-model-cybersecurity/</loc>
		<lastmod>2026-01-27T17:16:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/08/approccio-zero-trust-2048x1367-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/hipaa-compliance-healthcare-data-security/</loc>
		<lastmod>2026-01-28T13:22:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/07/protezione-dati-sanitari-hpaa-compliance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/sovereign-cloud-security-model-europe/</loc>
		<lastmod>2026-01-28T13:22:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/06/sovranita-digitale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/malicious-digital-twins-how-to-protect-your-business/</loc>
		<lastmod>2026-01-28T13:22:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/11/boolebox_img_news_2c.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/backdoors-encryption-systems/</loc>
		<lastmod>2026-01-28T13:22:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/03/light-from-open-door-800x534-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/deeppseek-generative-ai-risks-benefits-regulations/</loc>
		<lastmod>2026-01-28T13:23:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/03/deepseek-ai-generative.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/dora-regulation-cyber-security/</loc>
		<lastmod>2026-01-28T13:23:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/12/regolamento-dora.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/enterprise-risk-management-and-cybersecurity-strategies-to-protect-your-business/</loc>
		<lastmod>2026-01-28T13:23:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/11/erm-cyber-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/protect-intellectual-property-business-offers-quotations/</loc>
		<lastmod>2026-01-28T13:23:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/10/tutela-proprieta-intellettuale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/dossiering-implications-and-prospects-for-businesses/</loc>
		<lastmod>2026-01-28T13:23:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/10/Dossieraggio.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/nis-2-directive-europe/</loc>
		<lastmod>2026-01-28T13:23:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/10/direttiva-nis-2-cybersecurity-europea.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/corporate-cybersecurity-strategies-usa-vs-europe-cybersecurity-comparison/</loc>
		<lastmod>2026-01-28T13:24:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/10/cybersecurity-usa-europa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/cybersecurity-usa-state-of-art/</loc>
		<lastmod>2026-01-28T13:24:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/02/cyber-security-in-usa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/cybersecurity-in-healthcare-threats-and-possible-defences/</loc>
		<lastmod>2026-01-28T13:24:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/12/cyber-security-strutture-sanitarie.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/ai-and-cybersecurity-risks-and-potential/</loc>
		<lastmod>2026-01-28T13:24:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/08/mano-robotica-protezione-ai-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/08/occhio-intelligenza-artificiale-unsplash-1024x683.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/how-do-freelancers-or-small-companies-without-an-it-department-manage-cybersecurity/</loc>
		<lastmod>2026-01-28T13:24:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/06/cyber-security-professionisti-pmi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/two-factor-authentication-an-indispensable-tool-for-data-security-also-within-the-company/</loc>
		<lastmod>2026-01-28T13:24:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/05/cyber-security-piccole-aziende.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/05/impostazioni-sicurezza-autenticazione-a-due-fattori.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/what-are-virtual-data-rooms/</loc>
		<lastmod>2026-01-28T13:24:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/02/virtual-data-room-e1769698081626.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/02/240223_GraficoXVDR-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/ethical-hacking-how-work/</loc>
		<lastmod>2026-01-28T13:24:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/11/ETHICAL-HACKER.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/work-virtualisation-and-it-security-vdi-solutions-are-becoming-increasingly-popular-what-are-the-advantages-for-companies-and-the-threats/</loc>
		<lastmod>2026-01-28T13:24:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/10/vdi-soluzioni-per-sicurezza-informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/data-loss-prevention-tools-for-companies/</loc>
		<lastmod>2026-01-28T13:24:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/08/dlp-strumenti-per-prevenire-la-perdita-dei-dati-sicurezza-informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/cyber-security-in-the-pa-risks-planned-interventions-solutions/</loc>
		<lastmod>2026-01-28T13:24:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/06/Cyber-security-nella-pubblica-amministrazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/remote-working-and-it-security-guide-for-companies/</loc>
		<lastmod>2026-01-28T13:25:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/03/gestione-smart-working-e-sicurezza-informatica-1024x683-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/encryption-and-ransomware-how-to-prevent-attacks-and-increase-cybersecurity-in-business/</loc>
		<lastmod>2026-01-28T13:25:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/01/ransomware-e-crittografia-scaled-1-1024x716-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/it/spionaggio-industriale-nel-settore-farmaceutico-un-pericolo-per-la-salute-di-tutti-i-cittadini/</loc>
		<lastmod>2026-01-28T13:41:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/11/spionaggio-industriale-1-300x200-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/shadow-it-risks-solutions/</loc>
		<lastmod>2026-01-28T13:41:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/10/boolebox_img_news_6a.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/protect-corporate-credentials-credential-stuffing/</loc>
		<lastmod>2026-01-28T13:41:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/09/credential-stuffing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/hipaa-compliance-healthcare-data-security/</loc>
		<lastmod>2026-01-28T13:41:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/07/protezione-dati-sanitari-hpaa-compliance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/sovereign-cloud-security-model-europe/</loc>
		<lastmod>2026-01-28T13:42:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/06/sovranita-digitale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/malicious-digital-twins-how-to-protect-your-business/</loc>
		<lastmod>2026-01-28T13:42:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/11/boolebox_img_news_2c.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/backdoors-encryption-systems/</loc>
		<lastmod>2026-01-28T13:42:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/03/light-from-open-door-800x534-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/deeppseek-generative-ai-risks-benefits-regulations/</loc>
		<lastmod>2026-01-28T13:42:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/03/deepseek-ai-generative.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/dora-regulation-cyber-security/</loc>
		<lastmod>2026-01-28T13:42:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/12/regolamento-dora.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/enterprise-risk-management-and-cybersecurity-strategies-to-protect-your-business/</loc>
		<lastmod>2026-01-28T13:42:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/11/erm-cyber-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/protect-intellectual-property-business-offers-quotations/</loc>
		<lastmod>2026-01-28T13:42:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/10/tutela-proprieta-intellettuale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/dossiering-implications-and-prospects-for-businesses/</loc>
		<lastmod>2026-01-28T13:42:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/10/Dossieraggio.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/nis-2-directive-europe/</loc>
		<lastmod>2026-01-28T13:42:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/10/direttiva-nis-2-cybersecurity-europea.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/corporate-cybersecurity-strategies-usa-vs-europe-cybersecurity-comparison/</loc>
		<lastmod>2026-01-28T13:42:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/10/cybersecurity-usa-europa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/zero-trust-model-cybersecurity/</loc>
		<lastmod>2026-01-28T13:42:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/08/approccio-zero-trust-2048x1367-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/cybersecurity-usa-state-of-art/</loc>
		<lastmod>2026-01-28T13:42:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/02/cyber-security-in-usa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/cybersecurity-in-healthcare-threats-and-possible-defences/</loc>
		<lastmod>2026-01-28T13:43:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/12/cyber-security-strutture-sanitarie.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/ai-and-cybersecurity-risks-and-potential/</loc>
		<lastmod>2026-01-28T13:43:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/08/mano-robotica-protezione-ai-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/08/occhio-intelligenza-artificiale-unsplash-1024x683.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/how-do-freelancers-or-small-companies-without-an-it-department-manage-cybersecurity/</loc>
		<lastmod>2026-01-28T13:43:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/06/cyber-security-professionisti-pmi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/two-factor-authentication-an-indispensable-tool-for-data-security-also-within-the-company/</loc>
		<lastmod>2026-01-28T13:43:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/05/cyber-security-piccole-aziende.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/05/impostazioni-sicurezza-autenticazione-a-due-fattori.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/dropbox-acquires-boxcryptor-the-ensuing-changes-for-european-customers-boolebox/</loc>
		<lastmod>2026-01-28T13:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/04/Dropbox-boxcryptor-boolebox.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/ethical-hacking-how-work/</loc>
		<lastmod>2026-01-28T13:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/11/ETHICAL-HACKER.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/it/data-protection-webinar/</loc>
		<lastmod>2026-01-28T13:43:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/11/boolebox_img_news_2c.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/work-virtualisation-and-it-security-vdi-solutions-are-becoming-increasingly-popular-what-are-the-advantages-for-companies-and-the-threats/</loc>
		<lastmod>2026-01-28T13:43:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/10/vdi-soluzioni-per-sicurezza-informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/data-loss-prevention-tools-for-companies/</loc>
		<lastmod>2026-01-28T13:43:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/08/dlp-strumenti-per-prevenire-la-perdita-dei-dati-sicurezza-informatica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/cyber-security-in-the-pa-risks-planned-interventions-solutions/</loc>
		<lastmod>2026-01-28T13:44:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/06/Cyber-security-nella-pubblica-amministrazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/it/boolebox-sole-24-ore-marzo-2022/</loc>
		<lastmod>2026-01-28T13:44:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/03/Rassegna-stampa-sole-24-ore-aprile-2022-1-980x613-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/remote-working-and-it-security-guide-for-companies/</loc>
		<lastmod>2026-01-28T13:44:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/03/gestione-smart-working-e-sicurezza-informatica-1024x683-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/encryption-and-ransomware-how-to-prevent-attacks-and-increase-cybersecurity-in-business/</loc>
		<lastmod>2026-01-28T13:44:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/01/ransomware-e-crittografia-scaled-1-1024x716-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/it/sicurezza-online-e-protezione-privacy-5-regole-fondamentali/</loc>
		<lastmod>2026-01-28T13:44:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2022/01/sicurezza-online-300x200-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/it/regole-per-condividere-dati-e-file-in-sicurezza/</loc>
		<lastmod>2026-01-28T13:44:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2021/09/ladder-success-concept-scaled-1-2048x1178-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/it/boolebox-cyber-security-virtual-conference-2/</loc>
		<lastmod>2026-01-28T13:44:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/11/boolebox_img_news_2c.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/it/nuovi-corsi-di-certificazione-online/</loc>
		<lastmod>2026-01-28T13:44:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2021/04/CorsiAcademyBig-980x551-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/it/boolebox-su-il-sole-24-ore-la-cyber-sicurezza-prima-di-tutto/</loc>
		<lastmod>2026-01-28T13:44:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2021/03/Rassegna-stampa-sole-24-ore-3-980x685-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/it/boolebox-al-waic-in-cina/</loc>
		<lastmod>2026-01-28T13:44:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/11/boolebox_img_news_2c.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/it/webinar-nuovo-portfolio-boolebox-2/</loc>
		<lastmod>2026-01-28T13:44:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2020/07/pipitone-webinar-preview-400x250-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/dropbox-acquires-boxcryptor-the-ensuing-changes-for-european-customers-boolebox/</loc>
		<lastmod>2026-01-28T13:54:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/04/Dropbox-boxcryptor-boolebox.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/what-are-virtual-data-rooms/</loc>
		<lastmod>2026-01-29T14:48:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2023/02/virtual-data-room-e1769698081626.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2024/02/VDR-tramite-Secure-File-Manager-1024x1007.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/shadow-it-risks-solutions/</loc>
		<lastmod>2026-03-19T18:35:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2025/10/boolebox_img_news_6a.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/nis2-in-practice-an-operational-checklist-to-comply-without-slowing-down-the-business/</loc>
		<lastmod>2026-04-13T12:32:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2026/02/close-up-human-hand-against-blue-background-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.boolebox.com/nis2-in-practice-an-operational-checklist-to-comply-without-slowing-down-the-business/</loc>
		<lastmod>2026-04-13T13:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.boolebox.com/wp-content/uploads/2026/02/close-up-human-hand-against-blue-background-scaled.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->