<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//layersevensecurity.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://layersevensecurity.com/sap-security-blog/</loc>
		<lastmod>2012-01-19T00:23:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/the-hidden-danger-of-sap-grc-solutions/</loc>
		<lastmod>2012-02-05T04:14:38+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Logo-300x156.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ApprovaLogo-300x62.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/how-to-crack-sap-passwords-bypass-single-sign-on-and-install-rootkits-and-trojans-in-abap-programs/</loc>
		<lastmod>2012-02-05T15:15:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/why-did-it-take-sap-18-months-to-fix-a-session-hijacking-vulnerability-in-the-netweaver-portal/</loc>
		<lastmod>2012-02-14T18:53:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/netweaver-single-sign-on-is-it-worth-the-risk/</loc>
		<lastmod>2012-02-23T20:10:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/microsoft-hack-exposed-credit-card-details/</loc>
		<lastmod>2012-02-27T14:48:29+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Microsoft-India-300x190.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/mastercard-confirms-it-will-enforce-the-pci-dss-compliance-deadline-for-level-2-merchants/</loc>
		<lastmod>2012-03-01T13:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/PCIBigUmbrella.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/why-you-should-immediately-patch-the-recent-dos-vulnerability-in-aix/</loc>
		<lastmod>2012-04-11T12:35:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/when-do-default-passwords-become-a-configuration-error/</loc>
		<lastmod>2012-04-13T12:25:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-had-reservations-with-deloittes-blueprint-for-marin-county/</loc>
		<lastmod>2012-04-18T13:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/2019/05/BMW.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/a-ten-step-guide-to-implementing-saps-new-security-recommendations/</loc>
		<lastmod>2012-04-19T15:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/the-four-myths-of-erp-security/</loc>
		<lastmod>2012-05-03T02:39:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/the-top-5-security-notes-you-should-apply-to-patch-your-sap-systems/</loc>
		<lastmod>2012-05-24T17:16:41+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Advisory_SAP-Security-Notes_April-2012-300x201.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/white-hats-black-hats-and-skiddies-the-class-system-in-information-security/</loc>
		<lastmod>2012-06-01T02:55:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/ftc-takes-action-against-wyndham-worldwide-after-data-breach/</loc>
		<lastmod>2012-07-13T15:37:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/soap-opera-securing-sap-web-services/</loc>
		<lastmod>2012-07-20T02:15:25+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICM1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-july-2012/</loc>
		<lastmod>2012-08-08T12:44:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/download-the-ultimate-guide-to-auditing-and-securing-procure-to-pay-controls-in-sap/</loc>
		<lastmod>2012-08-17T12:16:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cybersecurity-disclosures-a-three-step-strategy-for-compliance-with-the-new-sec-guidance/</loc>
		<lastmod>2012-08-23T17:22:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-august-2012/</loc>
		<lastmod>2012-09-14T14:51:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-researchers-expose-a-dangerous-authentication-bypass-in-oracle-databases-2/</loc>
		<lastmod>2012-09-27T23:05:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-september-2012/</loc>
		<lastmod>2012-10-18T18:09:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-audit-guides-for-inventory-and-human-resources/</loc>
		<lastmod>2012-11-30T15:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/the-final-frontier-the-challenges-in-developing-secure-custom-abap-programs/</loc>
		<lastmod>2013-01-18T19:11:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/lessons-from-the-top-ten-data-breaches-of-2012-defense-in-depth-for-sap-systems/</loc>
		<lastmod>2013-02-06T18:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/international-corporate-espionage-annual-cost-of-intellectual-property-theft-estimated-at-250-billion-for-u-s-economy/</loc>
		<lastmod>2013-03-27T12:40:37+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Bridgestone.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Indivior-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/countering-the-threat-of-corporate-espionage/</loc>
		<lastmod>2013-04-04T13:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/verizon-data-breach-investigations-report-dbir-2013-this-isnt-a-threat-you-can-afford-to-ignore/</loc>
		<lastmod>2013-04-26T16:29:43+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Verizon-DBIR-2013_CCA-CSC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Verizon-DBIR-2013_CCA-and-Threat-Actions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-your-sap-systems-how-to-counter-every-current-and-emerging-threat/</loc>
		<lastmod>2013-05-31T13:25:37+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Sapphire-2013.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/exploring-the-sap-diag-protocol/</loc>
		<lastmod>2013-06-27T20:15:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/lloyds-2013-risk-index-cyber-risk-rated-as-the-third-most-significant-risk-by-board-executives/</loc>
		<lastmod>2013-07-17T15:50:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/a-dangerous-flaw-in-the-sap-user-information-system-suim/</loc>
		<lastmod>2013-08-13T15:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/introducing-the-abap-test-cockpit-a-new-level-of-abap-quality-assurance/</loc>
		<lastmod>2013-08-15T12:56:50+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ABAP-Test-Cockpit1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/organisations-are-not-effectively-addressing-it-security-and-compliance-risks-according-to-accounting-professionals/</loc>
		<lastmod>2013-08-27T14:05:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/layered-database-security-in-oracle-12c/</loc>
		<lastmod>2013-09-17T17:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-in-sap-hana-the-challenges-of-in-memory-computing-2/</loc>
		<lastmod>2013-10-31T16:05:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/new-malware-variant-suggests-cybercriminals-are-targeting-sap-systems/</loc>
		<lastmod>2013-11-07T15:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/monitoring-access-to-sensitive-data-using-sap-ral/</loc>
		<lastmod>2013-11-20T19:35:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/three-parallels-between-the-pos-breach-at-target-corp-and-vulnerabilities-in-erp-systems/</loc>
		<lastmod>2013-12-20T17:55:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/measuring-the-risks-of-cyber-attack/</loc>
		<lastmod>2014-01-23T20:45:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/a-first-look-at-the-u-s-data-security-and-breach-notification-act/</loc>
		<lastmod>2014-02-11T19:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/trustwave-survey-reveals-that-it-professionals-are-feeling-the-pressure-of-board-level-scrutiny-over-cyber-security/</loc>
		<lastmod>2014-03-25T14:45:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/m-trends-verizon-dbir-symantec-istr-detecting-and-responding-to-cyber-attacks-has-never-been-more-important/</loc>
		<lastmod>2014-04-28T16:20:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/five-reasons-you-do-not-require-third-party-security-solutions-for-sap-systems/</loc>
		<lastmod>2014-05-29T16:58:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cybersecurity-insurance-is-it-worth-the-cost/</loc>
		<lastmod>2014-06-26T14:16:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/three-more-reasons-for-using-solution-manager-to-secure-sap-systems-from-cyber-attack/</loc>
		<lastmod>2014-08-13T14:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/a-five-step-guide-to-securing-sap-systems-from-cyber-attack-without-breaking-the-bank/</loc>
		<lastmod>2014-09-30T15:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/fbi-director-james-comey-speaks-out-on-the-threat-of-cybercrime/</loc>
		<lastmod>2014-10-09T21:15:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/how-to-secure-sap-systems-from-password-attacks/</loc>
		<lastmod>2014-11-04T20:35:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/featured-in-sapinsider-how-to-build-security-using-sap-solution-manager-2/</loc>
		<lastmod>2014-11-18T19:27:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/new-sap-guidance-recommends-configuration-validation-for-security-monitoring/</loc>
		<lastmod>2014-12-02T18:26:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/three-steps-to-prevent-a-sony-scale-breach-of-your-sap-systems/</loc>
		<lastmod>2014-12-19T18:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cybersecurity-framework-2-0-whats-new/</loc>
		<lastmod>2015-01-14T12:20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/five-logs-that-could-reveal-a-data-breach-in-your-sap-systems/</loc>
		<lastmod>2015-02-11T02:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/discover-security-patches-for-your-sap-systems-using-system-recommendations/</loc>
		<lastmod>2015-03-05T03:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Note-888889-e1425525218895.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SysRec2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SysRec10-300x83.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SysRec4-300x247.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SysRec11-300x139.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SysRec12-212x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/turn-the-tide-against-cyber-attacks-with-sap-enterprise-threat-detection/</loc>
		<lastmod>2015-04-09T16:59:11+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-ETD-Dashboard.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/are-95-percent-of-sap-systems-really-vulnerable-to-cyber-attack/</loc>
		<lastmod>2015-05-26T12:10:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/opm-data-breach-reveals-the-limitations-of-cybersecurity-solutions/</loc>
		<lastmod>2015-06-23T17:35:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/counting-the-costs-of-cyber-espionage/</loc>
		<lastmod>2015-07-03T19:03:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/can-you-trust-sap-with-your-system-security/</loc>
		<lastmod>2015-08-19T12:48:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/how-to-discover-missing-security-notes-for-your-sap-systems-using-conval/</loc>
		<lastmod>2015-10-20T20:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ConVal-SysRec-1A-300x87.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ConVal-SysRec-2A.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ConVal-SysRec-3A-300x94.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ConVal-SysRec-4A-300x79.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ConVal-SysRec-5A-300x231.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ConVal-SysRec-6A-300x133.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/seasons-greetings/</loc>
		<lastmod>2015-12-15T12:44:01+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/seasons-greetings-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cybersecurity-targets-in-chinas-new-five-year-plan/</loc>
		<lastmod>2016-02-19T18:41:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/how-to-block-rfc-callback-attacks-in-your-sap-systems/</loc>
		<lastmod>2016-03-23T18:58:22+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RFC-Callback-Attacks-Function-Builder.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RFC-Callback-Attacks-Connection-Test-Results.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RFC-Callback-Attacks-Security-Audit-Log-300x117.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RFC-Callback-Attacks-RFC-Callback-Rejected.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-august-2016/</loc>
		<lastmod>2016-09-02T19:31:33+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes_August-2016-300x146.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cybercrime-projected-to-reach-2-trillion-by-2019/</loc>
		<lastmod>2016-10-28T17:20:44+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Data-Breach-Costs-2015-2020-e1477674693448.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Projected-Volume-of-Data-Breaches-2015-2020-e1477674816997.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/highlights-of-the-2017-dbir-report/</loc>
		<lastmod>2017-05-10T20:30:24+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/DBIR-2017-1-e1494447873474.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/DBIR-2017-2-e1494447902187.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/webinar-threat-detection-with-sap-solution-manager-7-2/</loc>
		<lastmod>2018-02-26T22:02:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-may-2019/</loc>
		<lastmod>2019-06-07T17:13:34+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-May-2019-e1559927517785.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-april-2019/</loc>
		<lastmod>2019-06-21T22:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-April-2019-e1559919022855.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-march-2019/</loc>
		<lastmod>2019-06-21T22:38:53+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-March-2019-e1559918823285.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-february-2019/</loc>
		<lastmod>2019-06-21T22:39:13+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-February-2019-e1559918602449.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-january-2019/</loc>
		<lastmod>2019-06-21T22:39:31+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-January-2019-e1559918170590.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-february-2017/</loc>
		<lastmod>2019-06-29T18:51:57+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-February-2017-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-january-2017-2/</loc>
		<lastmod>2019-06-29T18:53:35+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-January-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-march-2017-2/</loc>
		<lastmod>2019-06-29T19:33:14+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-March-2017-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-April-2017-2/</loc>
		<lastmod>2019-06-29T19:55:55+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-April-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-May-2017-2/</loc>
		<lastmod>2019-06-29T20:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-May-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-June-2017-2/</loc>
		<lastmod>2019-06-29T20:21:01+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-June-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-August-2017-2/</loc>
		<lastmod>2019-06-29T21:11:08+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-August-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-September-2017-2/</loc>
		<lastmod>2019-06-29T21:29:38+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-September-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-July-2017-2/</loc>
		<lastmod>2019-06-29T21:33:14+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-July-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-October-2017-2/</loc>
		<lastmod>2019-07-01T12:39:41+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-October-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-November-2017-2/</loc>
		<lastmod>2019-07-01T12:44:12+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-November-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-December-2017-2/</loc>
		<lastmod>2019-07-01T12:53:08+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-December-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-January-2018-2/</loc>
		<lastmod>2019-07-01T13:01:55+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-January-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-February-2018-2/</loc>
		<lastmod>2019-07-01T13:08:47+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-February-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-March-2018-2/</loc>
		<lastmod>2019-07-01T13:24:21+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-March-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-April-2018-2/</loc>
		<lastmod>2019-07-01T13:32:56+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-April-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-August-2018-2/</loc>
		<lastmod>2019-07-04T01:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-August-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-September-2018-2/</loc>
		<lastmod>2019-07-04T01:19:41+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-September-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-May-2018-2/</loc>
		<lastmod>2019-07-04T01:22:05+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-May-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-june-2019/</loc>
		<lastmod>2019-07-05T19:09:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-October-2018-2/</loc>
		<lastmod>2019-07-07T21:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-October-2018-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-November-2018-2/</loc>
		<lastmod>2019-07-07T22:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-November-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-December-2018-2/</loc>
		<lastmod>2019-07-07T22:10:48+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-December-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-June-2018-2/</loc>
		<lastmod>2019-07-07T22:19:27+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-June-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-July-2018-2/</loc>
		<lastmod>2019-07-07T22:19:51+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Notes-July-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-july-2019/</loc>
		<lastmod>2019-08-14T23:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-august-2019/</loc>
		<lastmod>2019-09-05T20:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-september-2019/</loc>
		<lastmod>2019-10-05T20:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/survey-reveals-65-percent-of-sap-platforms-were-breached-between-2014-15/</loc>
		<lastmod>2019-10-28T22:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-october-2019/</loc>
		<lastmod>2019-11-04T19:34:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/64-of-erp-systems-have-experienced-security-breaches-between-2017-19/</loc>
		<lastmod>2019-11-04T22:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-november-2019</loc>
		<lastmod>2019-12-10T15:33:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/seasons-greetings-layer-seven-security/</loc>
		<lastmod>2019-12-17T22:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Christmas.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-december-2019</loc>
		<lastmod>2020-01-03T15:31:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-january-2020</loc>
		<lastmod>2020-02-18T22:49:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-february-2020</loc>
		<lastmod>2020-03-18T22:15:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-march-2020</loc>
		<lastmod>2020-04-03T17:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/dramatic-growth-in-cyber-attacks-increases-enterprise-risk/</loc>
		<lastmod>2020-04-07T22:17:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-the-saprouter-from-remote-attacks/</loc>
		<lastmod>2020-04-14T22:08:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-april-2020</loc>
		<lastmod>2020-05-07T17:30:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-discloses-security-gaps-in-cloud-solutions/</loc>
		<lastmod>2020-05-13T13:54:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-may-2020</loc>
		<lastmod>2020-06-04T14:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-discloses-critical-vulnerabilities-in-ase-databases</loc>
		<lastmod>2020-06-04T16:32:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-june-2020</loc>
		<lastmod>2020-07-03T17:48:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-july-2020</loc>
		<lastmod>2020-08-05T00:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-august-2020</loc>
		<lastmod>2020-09-03T19:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-september-2020</loc>
		<lastmod>2020-10-09T17:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-october-2020</loc>
		<lastmod>2020-11-25T19:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-november-2020</loc>
		<lastmod>2020-12-04T16:57:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-december-2020</loc>
		<lastmod>2021-01-04T21:49:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-january-2021</loc>
		<lastmod>2021-02-19T19:08:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-february-2021</loc>
		<lastmod>2021-03-10T18:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-march-2021</loc>
		<lastmod>2021-04-09T15:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/protecting-sap-systems-from-ransomware/</loc>
		<lastmod>2021-05-14T16:09:36+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Protecting-SAP-from-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-april-2021</loc>
		<lastmod>2021-05-14T16:22:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-may-2021</loc>
		<lastmod>2021-06-08T19:23:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/secure-your-custom-code-with-sap-solution-manager/</loc>
		<lastmod>2021-06-10T13:29:59+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Code-Vulnerability-Detection-with-SAP-Solution-Manager-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Code-Vulnerability-Detection-with-SAP-Solution-Manager-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Code-Vulnerability-Detection-with-SAP-Solution-Manager-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Code-Vulnerability-Detection-with-SAP-Solution-Manager-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Code-Vulnerability-Detection-with-SAP-Solution-Manager-07.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/featured-in-sapinsider-unlocking-the-cyber-security-toolkit-in-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:28:03+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Security-Monitoring-using-SAP-Solution-Manager-300x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/how-to-protect-access-to-sensitive-data-in-your-sap-systems-using-read-access-logging/</loc>
		<lastmod>2023-01-20T09:28:04+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Administration-2-300x257.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Logging-Purpose-Creation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Log-Domains-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Recording-2-300x118.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Recording-Session-2-300x115.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Log-Results-Details-2-SSN-300x110.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Log-Results-Details-2-Bank-300x124.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Log-Results-Details-2-SALARY-300x140.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ST03-Table-Access-Log-by-Transaction-and-Table-300x163.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/monitoring-sap-security-metrics-with-solman-dashboards/</loc>
		<lastmod>2023-01-20T09:28:04+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboards-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboards-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboards-1A.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboards-2A.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboards-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboards-3A-300x63.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboards-9-300x118.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboards-11-300x282.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboards-12A-300x187.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboards-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/are-your-system-users-vulnerable-to-sap-hacks/</loc>
		<lastmod>2023-01-20T09:28:05+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/BAPI_USER_CHANGE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-RFC-Destination-Remote-Logon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RFCDES_TYPE_32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RFCDES_TYPE_3_CHECK2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/get-ready-for-sap-solution-manager-7-2-what-to-expect/</loc>
		<lastmod>2023-01-20T09:28:06+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Solution-Manager-7.2-on-SAP-HANA.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-7.2-UI-300x158.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-7.2-Screen-300x209.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-7.2-UI-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-7.2-Test-Mangement.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-7.2-Test-Mangement-Overview.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/whats-new-in-the-sap-cybersecurity-framework-3-0/</loc>
		<lastmod>2023-01-20T09:28:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/qa-sap-cybersecurity-monitoring-with-solution-manager/</loc>
		<lastmod>2023-01-20T09:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Monitoring-with-SAP-Solution-Manager-e1501415961999.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Threat-Detection-with-SAP-Solution-Manager-e1501416442217.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Comparison-Chart-e1501417846266.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/discover-vulnerable-system-connections-with-interface-monitoring/</loc>
		<lastmod>2023-01-20T09:28:08+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-e1503517932396.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-2-e1503518048418.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-3-e1503518104933.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-4-e1503518419843.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-7-e1503518448315.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-6-e1503518513219.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/a-first-look-at-support-pack-5-of-sap-solution-manager-7-2/</loc>
		<lastmod>2023-01-20T09:28:09+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Security-Relevant-Activities.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Usage-Logging-194x300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SysRec-Filter-SP05-e1498508092993.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SysRec-Filter-SP05-Actions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Guided-Procedure-Tiles-1-e1498508470542.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/discover-implement-and-test-security-notes-using-sap-solution-manager-7-2/</loc>
		<lastmod>2023-01-20T09:28:10+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/DBIR-2017-Patching-e1494546559374.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/System-Recommendations-2017-1-e1494548770258.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/System-Recommendations-2017-2-e1494548915843.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/System-Recommendations-2017-3-e1494549030512.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/System-Recommendations-2017-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/System-Recommendations-2017-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/System-Recommendations-2017-6-e1494550349160.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/System-Recommendations-2017-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/System-Recommendations-2017-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/System-Recommendations-2017-11-e1494550601378.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/System-Recommendations-2017-10-e1494550671473.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-kpi-monitoring-with-solman-dashboards/</loc>
		<lastmod>2023-01-20T09:28:11+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboard-Builder-e1490750439768.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-KPI-Catalog-e1490750687595.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/KPI-e1490750768352.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Dashboard-e1490750838753.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Details-e1490750878993.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/get-hands-on-with-sap-solution-manager-7-2-at-sapphire-now-asug-2017/</loc>
		<lastmod>2023-01-20T09:28:11+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Sapphire-2017-e1493152540708.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/explore-service-level-reporting-in-solman-7-2/</loc>
		<lastmod>2023-01-20T09:28:12+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SLR-1-e1488225021797.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SLR-2-e1488225140135.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SLR-4-e1488225205356.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/introducing-the-sap-cybersecurity-framework-4-0/</loc>
		<lastmod>2023-01-20T09:28:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/introducing-the-new-dashboard-framework-for-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:28:14+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Operational-Dashbaords-e1480458244576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Tactical-Dashboards-e1480458402794.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Tactical-Dashboard-Detail-300x117.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Strategic-Dashboards-300x52.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Security-Dashboards-e1480471490422.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/rfc-hacking-how-to-hack-an-sap-system-in-3-minutes/</loc>
		<lastmod>2023-01-20T09:28:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-your-business-security-at-sap/</loc>
		<lastmod>2023-01-20T09:28:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cso-recommends-solution-manager-for-security-monitoring/</loc>
		<lastmod>2023-01-20T09:28:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/7-reasons-you-should-upgrade-to-solman-7-2/</loc>
		<lastmod>2023-01-20T09:28:17+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-7.2-Screen-1-300x215.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/1_SolMan-7.2-UI-2-300x188.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Decommissioning-Cockpit-300x180.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/BPCA-300x207.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Test-Case-Analysis-300x157.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/detecting-sap-cyber-attacks-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:28:17+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-Security-Alerts-1-e1473950820705.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-Security-Alerts-1A-e1473951503164.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-Security-Alerts-1B-e1473951543434.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-Security-Alerts-6-e1473952094553.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-Security-Alerts-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-Security-Alerts-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SolMan-Security-Alerts-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/three-reasons-you-should-budget-for-sap-breach-costs/</loc>
		<lastmod>2023-01-20T09:28:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-in-sap-hana/</loc>
		<lastmod>2023-01-20T09:28:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/us-cert-issues-alert-for-sap-invoker-servlet-vulnerability/</loc>
		<lastmod>2023-01-20T09:28:20+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Invoker-Servlet-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Invoker-Servlet-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Invoker-Servlet-5-300x126.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Invoker-Servlet-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/managing-security-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/how-to-visualize-cyber-security-risks-in-your-systems-with-sap-lumira/</loc>
		<lastmod>2023-01-20T09:28:21+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Lumira-1-300x129.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Lumira-2-300x127.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Lumira-3-300x129.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Lumira-4-300x120.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Lumira-5-300x133.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/top-five-tips-for-system-recommendations/</loc>
		<lastmod>2023-01-20T09:28:22+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SysRec-1-e1528852672350.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SysRec-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SysRec-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/coming-soon-security-reporting-with-sap-web-intelligence/</loc>
		<lastmod>2023-01-20T09:28:23+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Web-Intelligence-1-e1539728616322.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Web-Intelligence-2-e1539728720889.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Web-Intelligence-3-e1539728767978.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Web-Intelligence-3A-e1539728819244.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/secure-patch-respond-security-analytics-with-sap-web-intelligence/</loc>
		<lastmod>2023-01-20T09:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/webinar-security-analytics-with-sap-web-intelligence/</loc>
		<lastmod>2023-01-20T09:28:24+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Capture-e1543334148858.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/webinar-recording-security-analytics-with-sap-web-intelligence/</loc>
		<lastmod>2023-01-20T09:28:25+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Capture-e1543334148858.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/layer-seven-security-recognized-as-an-sap-cybersecurity-leader/</loc>
		<lastmod>2023-01-20T09:28:25+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Layer-Seven-Security-Roadmap-1-e1545073587764.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/database-security-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:28:26+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Database-Security-with-SAP-Solution-Manager-1-300x296.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Database-Security-with-SAP-Solution-Manager-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Database-Security-with-SAP-Solution-Manager-7-e1548879792351.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cyber-espionage-warning-30-growth-in-targeted-attacks/</loc>
		<lastmod>2023-01-20T09:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/solman-siem-integration-for-advanced-threat-detection/</loc>
		<lastmod>2023-01-20T09:28:28+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Monitoring-with-SAP-Solution-Manager-2.0-e1535282444442.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Splunk-1-e1535282556758.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Splunk-2-e1535282570631.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/code-vulnerability-management-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:28:28+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CVA-Integration-1-e1552002213428.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CVA-Integration-2-e1552002370708.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CVA-Integration-3-e1552002458433.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CVA-Integration-15.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CVA-Integration-12-e1552237211483.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CVA-Integration-16-e1552237258194.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CVA-Integration-17-e1552237490890.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CVA-Integration-7-e1552237535295.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CVA-Integration-8-e1552237587276.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/dhs-issues-warning-for-cyber-attacks-targeting-sap-applications/</loc>
		<lastmod>2023-01-20T09:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/u-s-treasury-sanctions-erpscan/</loc>
		<lastmod>2023-01-20T09:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/monitoring-the-saprouter-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:28:31+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAProuter-2-e1526663246480.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAProuter-3-e1526663164755.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAProuter-4-e1526663313792.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAProuter-9-e1526665243268.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAProuter-6-e1526663081686.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAProuter-7-e1526663425629.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAProuter-8-e1526663456309.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/how-to-comply-with-the-dhs-recommendations-for-securing-sap-systems-from-cyber-attacks/</loc>
		<lastmod>2023-01-20T09:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/gdpr-compliance-with-sap-solution-manager-7-2/</loc>
		<lastmod>2023-01-20T09:28:32+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/GDPR-Compliance-with-SAP-Solution-Manager.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/GDPR-7-300x263.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/GDPR-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/GDPR-8-300x131.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/GDPR-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/GDPR-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/GDPR-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/GDPR-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/GDPR-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/GDPR-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/monitor-dangerous-function-module-calls-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:28:33+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-Alerting-4-e1522195964476.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-Alerting-5-e1522192199937.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-Alerting-12.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-Alerting-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-Alerting-9.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-Alerting-1-e1522192318702.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-Alerting-2-e1522192428220.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-Alerting-6-e1522192713368.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-Alerting-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ICMon-Alerting-11.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/5-common-myths-for-security-monitoring-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-solution-manager-is-itil-certified-for-information-security-management/</loc>
		<lastmod>2023-01-20T09:28:34+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SERVIEW-150x150.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/ITIL-Information-Security-Management-300x175.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/featured-in-sapinsider-secure-your-sap-landscapes-with-sap-solution-manager-7-2/</loc>
		<lastmod>2023-01-20T09:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/monitor-table-access-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:28:36+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Table-Monitoring-6-300x288.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Table-Monitoring-7-300x291.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Table-Monitoring-8-e1509219381561.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Table-Monitoring-9-e1509219447701.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Table-Monitoring-10-300x130.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Table-Monitoring-11-e1509219544129.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Table-Monitoring-e1509220389656.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Table-Monitoring-A-e1509221793345.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Table-Monitoring-3-e1509220272948.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Table-Monitoring-B-e1509222271605.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/equifax-data-breach-attackers-exploited-an-unapplied-security-patch-not-a-zero-day-vulnerability/</loc>
		<lastmod>2023-01-20T09:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/webinar-playback-siem-integration-for-sap</loc>
		<lastmod>2023-01-20T09:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-forensics-with-sap-solution-manager</loc>
		<lastmod>2023-01-20T09:28:38+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Forensics-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Forensics-05-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Forensics-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Forensics-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Forensics-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Forensics-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Forensics-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Forensics-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Forensics-09A.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/webinar-10kblaze-secure-your-sap-systems-with-cva-and-solman/</loc>
		<lastmod>2023-01-20T09:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cybersecurity-extension-for-sap-identifies-signatures-of-active-sap-cyberattacks/</loc>
		<lastmod>2023-01-20T09:29:14+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Active-SAP-Cyberattacks-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-linux-platforms-for-sap-hana-and-s-4hana/</loc>
		<lastmod>2023-01-20T09:29:15+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/OS-Security-Monitoring-with-SAP-Solution-Manager-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-the-web-dispatcher-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:29:16+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitoring-Web-Dispatcher-with-SAP-Solution-Manager-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/layer-seven-securitys-cybersecurity-extension-for-sap-solutions-achieves-sap-certification-as-integrated-with-sap-netweaver/</loc>
		<lastmod>2023-01-20T09:29:16+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Certified.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/solarwinds-attack-lessons-learned-for-sap-cyber-security/</loc>
		<lastmod>2023-01-20T09:29:17+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SUNBURST.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/compliance-reporting-for-the-sap-security-baseline/</loc>
		<lastmod>2023-01-20T09:29:18+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Baseline-Compliance-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Baseline-Compliance-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Baseline-Compliance-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Baseline-Compliance-04-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Baseline-Compliance-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Baseline-Compliance-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Security-Baseline-Compliance-07.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/job-monitoring-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:29:18+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Job-Monitoring-with-SAP-Solution-Manager-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Job-Monitoring-with-SAP-Solution-Manager-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Job-Monitoring-with-SAP-Solution-Manager-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Job-Monitoring-with-SAP-Solution-Manager-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Job-Monitoring-with-SAP-Solution-Manager-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Job-Monitoring-with-SAP-Solution-Manager-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Job-Monitoring-with-SAP-Solution-Manager-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Job-Monitoring-with-SAP-Solution-Manager-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Job-Monitoring-with-SAP-Solution-Manager-19.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-operating-system-platforms-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:29:19+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/OS-Security-Monitoring-with-SAP-Solution-Manager-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/OS-Security-Monitoring-with-SAP-Solution-Manager-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/OS-Security-Monitoring-with-SAP-Solution-Manager-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/recon-secure-your-systems-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:29:20+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RECON-01-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RECON-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RECON-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RECON-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RECON-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/prevent-and-detect-ransomware-attacks-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:29:20+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Ransonware-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Ransonware-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/anomaly-detection-with-cybersecurity-extension-for-sap/</loc>
		<lastmod>2023-01-20T09:29:21+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Anomaly-Detection-with-SAP-Solution-Manager-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Anomaly-Detection-with-SAP-Solution-Manager-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Anomaly-Detection-with-SAP-Solution-Manager-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Anomaly-Detection-with-SAP-Solution-Manager-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Anomaly-Detection-with-SAP-Solution-Manager-07-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/layer-seven-security-recognized-as-top-25-cyber-security-company/</loc>
		<lastmod>2023-01-20T09:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/visualize-security-risks-for-sap-systems-with-threat-maps/</loc>
		<lastmod>2023-01-20T09:29:22+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Threat-Maps-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Threat-Maps-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Threat-Maps-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Threat-Maps-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Threat-Maps-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Threat-Maps-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Threat-Maps-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-administrative-access-in-sap-as-java/</loc>
		<lastmod>2023-01-20T09:29:23+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Java-User-Monitoring-2-e1556208704241.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Java-User-Monitoring-1-e1556209113475.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/10kblaze-secure-your-systems-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:29:24+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/10KBLAZE-SAP-Vulnerability-Report-01-e1557793542153.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/10KBLAZE-SAP-Vulnerability-Report-02-e1557793799196.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/10KBLAZE-SAP-Vulnerability-Report-03-e1557793856800.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/10KBLAZE-SAP-Vulnerability-Report-04-e1557793899411.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/10KBLAZE-SAP-Vulnerability-Report-08-e1557793951998.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/10KBLAZE-SAP-Vulnerability-Report-07-e1557793989677.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/10KBLAZE-SAP-Vulnerability-Report-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/10KBLAZE-SAP-Vulnerability-Report-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/recommended-settings-for-sap-logging-and-auditing/</loc>
		<lastmod>2023-01-20T09:29:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/webinar-playback-holistic-sap-cybersecurity-with-cva-solman/</loc>
		<lastmod>2023-01-20T09:29:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/monitoring-security-alerts-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:29:26+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Alert-Ticker.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-13-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitor-Systems-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/SAP-Vulnerability-Assessment-vs-Penetration-Testing</loc>
		<lastmod>2023-01-20T09:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/siem-integration-with-sap-solution-manager/</loc>
		<lastmod>2023-01-20T09:29:27+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SIEM-Integrator-for-SAP-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Splunk-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Splunk-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/whitepaper-siem-integration-for-sap/</loc>
		<lastmod>2023-01-20T09:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/prevent-configuration-drift-with-sap-solution-manager</loc>
		<lastmod>2023-01-20T09:29:29+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Change-Analysis-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Change-Analysis-7-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Change-Analysis-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Change-Analysis-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Change-Analysis-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Change-Analysis-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Change-Analysis-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Change-Analysis-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Change-Analysis-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Change-Analysis-4-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/automating-sap-audits-with-solution-manager/</loc>
		<lastmod>2023-01-20T09:29:29+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Compliance-Reporting-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Compliance-Reporting-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Compliance-Reporting-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Compliance-Reporting-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Compliance-Reporting-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Compliance-Reporting-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/webinar-playback-protecting-sap-systems-from-ransomware-attacks/</loc>
		<lastmod>2023-01-20T09:29:30+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Layer7_Protecting-SAP-Systems-from-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/is-sap-ase-the-most-vulnerable-point-in-your-sap-landscape/</loc>
		<lastmod>2023-06-23T12:54:01+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-ASE-Database-Security-06-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-ASE-Database-Security-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-ASE-Database-Security-08-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-ASE-Database-Security-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-ASE-Database-Security-07-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-ASE-Database-Security-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-ASE-Database-Security-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-ASE-Database-Security-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-ASE-Database-Security-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-april-2023</loc>
		<lastmod>2023-06-23T12:54:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-march-2023</loc>
		<lastmod>2023-06-23T12:54:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/whats-new-in-the-cybersecurity-extension-for-sap/</loc>
		<lastmod>2023-06-23T12:54:02+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v4.4-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v4.4-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/configuration-and-security-analytics-with-sap-focused-run/</loc>
		<lastmod>2023-06-23T12:54:03+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/image-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/analyzing-security-notes-with-sap-maintenance-planner/</loc>
		<lastmod>2023-06-23T12:54:03+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Analyzing-Security-Notes-with-SAP-Maintenance-Planner-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Analyzing-Security-Notes-with-SAP-Maintenance-Planner-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Analyzing-Security-Notes-with-SAP-Maintenance-Planner-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Analyzing-Security-Notes-with-SAP-Maintenance-Planner-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Analyzing-Security-Notes-with-SAP-Maintenance-Planner-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-february-2023</loc>
		<lastmod>2023-06-23T12:54:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cva-transition-guide-to-sap-cybersecurity-competitors-alternatives-9</loc>
		<lastmod>2023-06-23T12:54:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cva-transition-guide-to-sap-cybersecurity-competitors-alternatives-10</loc>
		<lastmod>2023-06-23T12:54:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-january-2023</loc>
		<lastmod>2023-06-23T12:54:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-alerting-with-sap-focused-run/</loc>
		<lastmod>2023-06-23T12:54:04+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Security-Alerts-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Security-Alerts-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Security-Alerts-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Security-Alerts-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Security-Alerts-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Security-Alerts-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Security-Alerts-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Security-Alerts-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Security-Alerts-09.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cva-transition-guide-to-sap-cybersecurity-competitors-alternatives-7</loc>
		<lastmod>2023-06-23T12:54:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cva-transition-guide-to-sap-cybersecurity-competitors-alternatives-8</loc>
		<lastmod>2023-06-23T12:54:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cva-transition-guide-to-sap-cybersecurity-competitors-alternatives-6</loc>
		<lastmod>2023-06-23T12:54:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cva-transition-guide-to-sap-cybersecurity-competitors-alternatives-3</loc>
		<lastmod>2023-06-23T12:54:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cva-transition-guide-to-sap-cybersecurity-competitors-alternatives-4</loc>
		<lastmod>2023-06-23T12:54:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cva-transition-guide-to-sap-cybersecurity-competitors-alternatives-5</loc>
		<lastmod>2023-06-23T12:54:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-etd-transition-guide-to-sap-cybersecurity-competitors-alternatives-9</loc>
		<lastmod>2023-06-23T12:54:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-etd-transition-guide-to-sap-cybersecurity-competitors-alternatives-10</loc>
		<lastmod>2023-06-23T12:54:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cva-transition-guide-to-sap-cybersecurity-competitors-alternatives-2</loc>
		<lastmod>2023-06-23T12:54:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-etd-transition-guide-to-sap-cybersecurity-competitors-alternatives-8</loc>
		<lastmod>2023-06-23T12:54:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-etd-transition-guide-to-sap-cybersecurity-competitors-alternatives-7</loc>
		<lastmod>2023-06-23T12:54:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-etd-transition-guide-to-sap-cybersecurity-competitors-alternatives-6</loc>
		<lastmod>2023-06-23T12:54:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-etd-transition-guide-to-sap-cybersecurity-competitors-alternatives-5</loc>
		<lastmod>2023-06-23T12:54:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-etd-transition-guide-to-sap-cybersecurity-competitors-alternatives-4</loc>
		<lastmod>2023-06-23T12:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-etd-transition-guide-to-sap-cybersecurity-competitors-alternatives-2</loc>
		<lastmod>2023-06-23T12:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-etd-transition-guide-to-sap-cybersecurity-competitors-alternatives-3</loc>
		<lastmod>2023-06-23T12:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-bridge-transition-guide-to-sap-cybersecurity-competitors-alternatives-10</loc>
		<lastmod>2023-06-23T12:54:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-bridge-transition-guide-to-sap-cybersecurity-competitors-alternatives-8</loc>
		<lastmod>2023-06-23T12:54:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-bridge-transition-guide-to-sap-cybersecurity-competitors-alternatives-9</loc>
		<lastmod>2023-06-23T12:54:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-bridge-transition-guide-to-sap-cybersecurity-competitors-alternatives-6</loc>
		<lastmod>2023-06-23T12:54:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-bridge-transition-guide-to-sap-cybersecurity-competitors-alternatives-7</loc>
		<lastmod>2023-06-23T12:54:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-bridge-transition-guide-to-sap-cybersecurity-competitors-alternatives-5</loc>
		<lastmod>2023-06-23T12:54:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-bridge-transition-guide-to-sap-cybersecurity-competitors-alternatives-4</loc>
		<lastmod>2023-06-23T12:54:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/onapsis-transition-guide-to-sap-cybersecurity-competitors-alternatives-10</loc>
		<lastmod>2023-06-23T12:54:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-bridge-transition-guide-to-sap-cybersecurity-competitors-alternatives-2</loc>
		<lastmod>2023-06-23T12:54:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-bridge-transition-guide-to-sap-cybersecurity-competitors-alternatives-3</loc>
		<lastmod>2023-06-23T12:54:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/onapsis-transition-guide-to-sap-cybersecurity-competitors-alternatives-9</loc>
		<lastmod>2023-06-23T12:54:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/onapsis-transition-guide-to-sap-cybersecurity-competitors-alternatives-8</loc>
		<lastmod>2023-06-23T12:54:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/onapsis-transition-guide-to-sap-cybersecurity-competitors-alternatives-6</loc>
		<lastmod>2023-06-23T12:54:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/onapsis-transition-guide-to-sap-cybersecurity-competitors-alternatives-7</loc>
		<lastmod>2023-06-23T12:54:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/onapsis-transition-guide-to-sap-cybersecurity-competitors-alternatives-4</loc>
		<lastmod>2023-06-23T12:54:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/onapsis-transition-guide-to-sap-cybersecurity-competitors-alternatives-5</loc>
		<lastmod>2023-06-23T12:54:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/onapsis-transition-guide-to-sap-cybersecurity-competitors-alternatives-3</loc>
		<lastmod>2023-06-23T12:54:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-december-2022</loc>
		<lastmod>2023-06-23T12:54:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/onapsis-transition-guide-to-sap-cybersecurity-competitors-alternatives-2</loc>
		<lastmod>2023-06-23T12:54:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-the-journey-to-sap-s-4hana/</loc>
		<lastmod>2023-06-23T12:54:15+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/s4hana-praxiserfahrung.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-microsoft-platforms-with-the-cybersecurity-extension-for-sap/</loc>
		<lastmod>2023-06-23T12:54:16+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Microsoft-Security-Monitoring-with-the-Cybersecurity-Extension-for-SAP-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Microsoft-Security-Monitoring-with-the-Cybersecurity-Extension-for-SAP-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Securing-Microsoft-Platforms-with-the-Cybersecurity-Extension-for-SAP-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Microsoft-Security-Monitoring-with-the-Cybersecurity-Extension-for-SAP-06.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-november-2022</loc>
		<lastmod>2023-06-23T12:54:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-october-2022</loc>
		<lastmod>2023-06-23T12:54:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-custom-sapui5-applications-using-the-cybersecurity-extension-for-sap/</loc>
		<lastmod>2023-06-23T12:54:17+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/UI5-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/UI5-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-september-2022</loc>
		<lastmod>2023-06-23T12:54:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/maintaining-system-inventories-with-sap-solution-manager/</loc>
		<lastmod>2023-06-23T12:54:17+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LMDB-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LMDB-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LMDB-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LMDB-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LMDB-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LMDB-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LMDB-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LMDB-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LMDB-09.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-oracle-databases-for-sap/</loc>
		<lastmod>2023-06-23T12:54:18+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Securing-Oracle-Databases-for-SAP-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Securing-Oracle-Databases-for-SAP-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-june-2022</loc>
		<lastmod>2023-06-23T12:54:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-july-2022</loc>
		<lastmod>2023-06-23T12:54:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-august-2022</loc>
		<lastmod>2023-06-23T12:54:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-may-2022</loc>
		<lastmod>2023-06-23T12:54:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-analytics-with-sap-focused-run/</loc>
		<lastmod>2023-06-23T12:54:19+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Focused-Run-Configuration-and-Security-Analytics-19.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/30-percent-of-security-notes-in-system-recommendations-are-false-positives/</loc>
		<lastmod>2023-06-23T12:54:19+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SYSREC-STATUS-CHANGE-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SYSREC-CVE-CVSS-VECTOR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-march-2022</loc>
		<lastmod>2023-06-23T12:54:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/patch-your-sap-systems-with-sap-solution-manager/</loc>
		<lastmod>2023-06-23T12:54:20+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-System-Landscape-Directory.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-System-Recommendations-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-System-Recommendations-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-april-2022</loc>
		<lastmod>2023-06-23T12:54:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-february-2022</loc>
		<lastmod>2023-06-23T12:54:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-advisory-for-critical-sap-icmad-vulnerabilities/</loc>
		<lastmod>2023-06-23T12:54:21+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/dhs-cisa-1024x294-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cisa-fbi-warn-organizations-to-protect-against-state-sponsored-malware</loc>
		<lastmod>2023-06-23T12:54:21+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CISA-Shields-Up.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/monitoring-successfactors-with-sap-solution-manager/</loc>
		<lastmod>2023-06-23T12:54:21+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitoring-SuccessFactors-with-SAP-Solution-Manager-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitoring-SuccessFactors-with-SAP-Solution-Manager-02-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitoring-SuccessFactors-with-SAP-Solution-Manager-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Monitoring-SuccessFactors-with-SAP-Solution-Manager-04-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-december-2021</loc>
		<lastmod>2023-06-23T12:54:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-january-2022</loc>
		<lastmod>2023-06-23T12:54:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-sap-solutions-from-log4shell/</loc>
		<lastmod>2023-06-23T12:54:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cisa-issues-directive-for-actively-exploited-sap-vulnerabilities/</loc>
		<lastmod>2023-06-23T12:54:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-november-2021</loc>
		<lastmod>2023-06-23T12:54:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-sap-systems-from-log4j-exploits/</loc>
		<lastmod>2023-06-23T12:54:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-september-2021</loc>
		<lastmod>2023-06-23T12:54:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-monitoring-with-focused-insights-for-sap-solution-manager/</loc>
		<lastmod>2023-06-23T12:54:24+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Security-Monitoring-with-Focused-Insights-for-SAP-Solution-Manager-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Security-Monitoring-with-Focused-Insights-for-SAP-Solution-Manager-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Security-Monitoring-with-Focused-Insights-for-SAP-Solution-Manager-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Security-Monitoring-with-Focused-Insights-for-SAP-Solution-Manager-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-august-2021</loc>
		<lastmod>2023-06-23T12:54:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-october-2021</loc>
		<lastmod>2023-06-23T12:54:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-june-2021</loc>
		<lastmod>2023-06-23T12:54:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-software-supply-chains-for-sap-systems/</loc>
		<lastmod>2023-06-23T12:54:25+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/shutterstock_680078968-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-the-system-user-in-sap-hana/</loc>
		<lastmod>2023-06-23T12:54:25+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/HANA-SYSTEM-USER-ALERT-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/license-auditing-with-sap-solution-manager/</loc>
		<lastmod>2023-06-23T12:54:25+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LAW-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LAW-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-LAW-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-july-2021</loc>
		<lastmod>2023-06-23T12:54:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-may-2023</loc>
		<lastmod>2023-06-26T06:49:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cybersecurity-threats-to-sap-systems-report/</loc>
		<lastmod>2023-06-26T06:49:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-patching-for-sap-solutions/</loc>
		<lastmod>2023-06-26T16:17:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-june-2023</loc>
		<lastmod>2023-07-10T23:05:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/how-to-discover-actively-exploited-vulnerabilities-in-your-sap-systems/</loc>
		<lastmod>2023-07-26T16:44:05+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-Vulnerability-Management-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-Vulnerability-Management-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-Vulnerability-Management-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-Vulnerability-Management-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-Vulnerability-Management-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-Vulnerability-Management-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-Vulnerability-Management-07.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-july-2023</loc>
		<lastmod>2023-08-04T16:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-august-2023</loc>
		<lastmod>2023-08-31T23:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/what-to-expect-in-the-cybersecurity-extension-for-sap-version-5-0/</loc>
		<lastmod>2023-09-10T03:46:58+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v5.0-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v5.0-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v5.0-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v5.0-04-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v5.0-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v5.0-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v5.0-06-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v5.0-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v5.0-08.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/layer-seven-security-release-updated-ransomware-guide-for-sap/</loc>
		<lastmod>2023-09-19T18:29:49+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Ransomware-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-september-2023</loc>
		<lastmod>2023-10-03T17:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/maximize-your-sap-security-budget-how-to-cut-costs-without-downgrading-cybersecurity/</loc>
		<lastmod>2023-10-13T19:25:18+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/cutting-costs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-october-2023</loc>
		<lastmod>2023-11-03T21:02:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-with-sap-rise-a-shared-model-of-responsibility/</loc>
		<lastmod>2023-11-29T17:25:06+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-RISE-Security-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-RISE-Security-02-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-november-2023</loc>
		<lastmod>2023-12-01T22:26:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-december-2023</loc>
		<lastmod>2023-12-14T01:31:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-january-2024</loc>
		<lastmod>2024-01-12T01:02:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-cybersecurity-buyers-guide-from-sapinsider/</loc>
		<lastmod>2024-01-24T23:29:10+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Buyers-Guide-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-solution-manager-private-cloud-edition-for-sap-rise-customers/</loc>
		<lastmod>2024-01-25T21:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-february-2024</loc>
		<lastmod>2024-02-16T03:27:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-compliance-for-sap-rise-solutions/</loc>
		<lastmod>2024-02-19T23:07:57+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-RISE-Security-Compliance-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-RISE-Security-Compliance-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-RISE-Security-Compliance-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-RISE-Security-Compliance-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-RISE-Security-Compliance-06-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-RISE-Security-Compliance-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-RISE-Security-Compliance-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-RISE-Security-Compliance-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-march-2024</loc>
		<lastmod>2024-03-13T23:38:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/fbi-and-cisa-issue-alert-for-threat-actors-actively-exploiting-sql-injection-vulnerabilities/</loc>
		<lastmod>2024-03-27T15:02:11+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP_SQL-Injection-Detection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-april-2024</loc>
		<lastmod>2024-04-09T23:28:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/artificial-intelligence-exploits-vulnerabilities-in-systems-with-a-87-percent-success-rate/</loc>
		<lastmod>2024-04-18T22:51:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-may-2024</loc>
		<lastmod>2024-05-14T23:06:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cybersecurity-extension-for-sap-version-5-1/</loc>
		<lastmod>2024-05-16T14:51:21+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-v5.1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-june-2024</loc>
		<lastmod>2024-06-11T23:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cybersecurity-extension-for-sap-with-sap-focused-run/</loc>
		<lastmod>2024-06-19T22:41:58+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-Focused-Run-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-Focused-Run-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-july-2024</loc>
		<lastmod>2024-07-09T22:48:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/crowdstrike-outage-lessons-learned-for-sap-solutions/</loc>
		<lastmod>2024-07-23T19:34:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/new-whitepaper-nis2-compliance-for-sap-solutions/</loc>
		<lastmod>2024-08-20T16:20:07+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/NIS2-Compliance-for-SAP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-august-2024</loc>
		<lastmod>2024-08-20T16:54:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-september-2024</loc>
		<lastmod>2024-09-11T01:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/security-logging-and-alerting-for-sap-btp/</loc>
		<lastmod>2024-09-26T04:38:44+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-BTP-Logging-and-Alerting-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-BTP-Logging-and-Alerting-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-october-2024</loc>
		<lastmod>2024-10-09T01:27:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cybersecurity-extension-for-sap-version-5-2/</loc>
		<lastmod>2024-10-22T18:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-november-2024</loc>
		<lastmod>2024-11-15T03:35:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/buyers-guide-to-sap-enterprise-threat-detection/</loc>
		<lastmod>2024-11-27T15:36:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-december-2024</loc>
		<lastmod>2024-12-12T22:43:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/the-most-critical-sap-security-notes-of-2024/</loc>
		<lastmod>2024-12-16T20:24:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-january-2025</loc>
		<lastmod>2025-01-15T18:42:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/erp-disruption-leads-stoli-to-file-for-bankruptcy/</loc>
		<lastmod>2025-01-28T18:29:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-february-2025</loc>
		<lastmod>2025-02-14T14:50:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/securing-the-sap-cloud-connector/</loc>
		<lastmod>2025-02-26T20:55:19+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Cloud-Connector-Security-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-Cloud-Connector-Security-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-march-2025</loc>
		<lastmod>2025-03-11T15:44:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/proposed-changes-to-the-security-rule-for-hipaa-compliance/</loc>
		<lastmod>2025-03-26T20:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-april-2025</loc>
		<lastmod>2025-04-09T21:26:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/the-24-month-rule-for-sap-security-patching/</loc>
		<lastmod>2025-04-24T20:41:01+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-24-Month-Rule-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/SAP-24-Month-Rule-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-may-2025</loc>
		<lastmod>2025-05-23T20:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-zero-day-vulnerability-cve-2025-31324-security-note-3594142</loc>
		<lastmod>2025-05-28T19:20:04+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CVE-2025-31324-Alert-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CVE-2025-31324-Alert-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-vulnerability-actively-exploited-cve-2025-31324</loc>
		<lastmod>2025-05-28T19:24:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-june-2025</loc>
		<lastmod>2025-06-10T21:21:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/whats-new-in-the-cybersecurity-extension-for-sap-version-5-3/</loc>
		<lastmod>2025-06-25T17:41:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-july-2025</loc>
		<lastmod>2025-07-08T14:33:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/new-sec-rules-for-cybersecurity-incident-and-risk-management-disclosures/</loc>
		<lastmod>2025-07-29T14:04:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/cybersecurity-extension-for-sap-netweaver-edition/</loc>
		<lastmod>2025-07-29T15:25:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-august-2025</loc>
		<lastmod>2025-08-20T18:42:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/top-sap-cybersecurity-protection-solution-2025/</loc>
		<lastmod>2025-08-26T23:17:39+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Top-SAP-Cybersecurity-Protection-Solution-2025.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-september-2025</loc>
		<lastmod>2025-09-12T00:33:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/workarounds-for-sap-security-notes/</loc>
		<lastmod>2025-09-24T19:37:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-october-2025</loc>
		<lastmod>2025-10-15T00:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/penetration-testing-for-sap-rise-sap-cloud-erp/</loc>
		<lastmod>2025-10-29T22:57:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-november-2025</loc>
		<lastmod>2025-11-12T00:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/whats-new-in-the-cybersecurity-extension-for-sap-version-2-0/</loc>
		<lastmod>2025-11-26T21:51:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-december-2025</loc>
		<lastmod>2025-12-12T17:04:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/key-security-findings-from-the-rise-with-sap-2025-benchmark-report/</loc>
		<lastmod>2025-12-17T19:54:43+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/RISE-with-SAP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-january-2026</loc>
		<lastmod>2026-01-14T20:52:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/digital-operational-resilience-act-dora-compliance-for-sap-solutions/</loc>
		<lastmod>2026-01-28T20:40:55+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/DORA-Compliance-for-SAP.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-february-2026</loc>
		<lastmod>2026-02-11T23:09:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/state-sponsored-cyber-attacks-an-increasing-threat-to-sap-solutions/</loc>
		<lastmod>2026-02-25T17:54:47+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/State-Sponsored-Cyber-Attacks-An-Increasing-Threat-to-SAP-Solutions.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/layer-seven-security-achieves-cybersecure-certification/</loc>
		<lastmod>2026-03-16T19:05:54+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/CyberSecure-Canada.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://layersevensecurity.com/sap-security-notes-march-2026</loc>
		<lastmod>2026-03-25T21:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://layersevensecurity.com/now-on-sap-btp-access-the-cybersecurity-extension-for-sap-on-sap-build-work-zone/</loc>
		<lastmod>2026-04-10T14:08:36+00:00</lastmod>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-on-SAP-BTP-01-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://layersevensecurity.com/wp-content/uploads/Cybersecurity-Extension-for-SAP-on-SAP-BTP-02-1.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->