<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Josue Martins on Medium]]></title>
        <description><![CDATA[Stories by Josue Martins on Medium]]></description>
        <link>https://medium.com/@josue-martins?source=rss-3052ca503325------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*o2cqUdmTbwIIu6SG3H1iVg.jpeg</url>
            <title>Stories by Josue Martins on Medium</title>
            <link>https://medium.com/@josue-martins?source=rss-3052ca503325------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 10 May 2026 23:46:36 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@josue-martins/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Five Persistent Cybersecurity Gaps In Mobile Networks]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/josue-martins/five-persistent-cybersecurity-gaps-in-mobile-networks-bf04b7c3cc15?source=rss-3052ca503325------2"><img src="https://cdn-images-1.medium.com/max/2600/1*CXc6T_Ti939x4_tr7xx8CQ.jpeg" width="3722"></a></p><p class="medium-feed-snippet">Minimizing mobile network attack surfaces by closing security gaps</p><p class="medium-feed-link"><a href="https://medium.com/josue-martins/five-persistent-cybersecurity-gaps-in-mobile-networks-bf04b7c3cc15?source=rss-3052ca503325------2">Continue reading on Josue Martins In Cyber Security »</a></p></div>]]></description>
            <link>https://medium.com/josue-martins/five-persistent-cybersecurity-gaps-in-mobile-networks-bf04b7c3cc15?source=rss-3052ca503325------2</link>
            <guid isPermaLink="false">https://medium.com/p/bf04b7c3cc15</guid>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[education]]></category>
            <category><![CDATA[5g]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[internet-of-things]]></category>
            <dc:creator><![CDATA[Josue Martins]]></dc:creator>
            <pubDate>Sat, 04 Apr 2026 09:13:48 GMT</pubDate>
            <atom:updated>2026-04-05T08:04:49.775Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Prompt Injection by Example]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/josue-martins/prompt-injection-by-example-a3de8e0e687f?source=rss-3052ca503325------2"><img src="https://cdn-images-1.medium.com/max/1891/1*0dCxRG5uvG8b3MU_em0chA.png" width="1891"></a></p><p class="medium-feed-snippet">Hacking Gandalf with Prompt Injection</p><p class="medium-feed-link"><a href="https://medium.com/josue-martins/prompt-injection-by-example-a3de8e0e687f?source=rss-3052ca503325------2">Continue reading on Josue Martins In Cyber Security »</a></p></div>]]></description>
            <link>https://medium.com/josue-martins/prompt-injection-by-example-a3de8e0e687f?source=rss-3052ca503325------2</link>
            <guid isPermaLink="false">https://medium.com/p/a3de8e0e687f</guid>
            <category><![CDATA[internet]]></category>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[owasp-top-10]]></category>
            <category><![CDATA[genai]]></category>
            <dc:creator><![CDATA[Josue Martins]]></dc:creator>
            <pubDate>Tue, 03 Feb 2026 11:28:07 GMT</pubDate>
            <atom:updated>2026-02-03T11:46:44.004Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Five Security Items Unresolved By GSMA or 3GPP Security Group]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/josue-martins/five-security-items-unresolved-by-gsma-or-3gpp-security-group-7df3c25b8d40?source=rss-3052ca503325------2"><img src="https://cdn-images-1.medium.com/max/1372/1*SSOopxD4u3BmIgfbEPdrvA.png" width="1372"></a></p><p class="medium-feed-snippet">Future work streams for GSMA and 3GPP</p><p class="medium-feed-link"><a href="https://medium.com/josue-martins/five-security-items-unresolved-by-gsma-or-3gpp-security-group-7df3c25b8d40?source=rss-3052ca503325------2">Continue reading on Josue Martins In Cyber Security »</a></p></div>]]></description>
            <link>https://medium.com/josue-martins/five-security-items-unresolved-by-gsma-or-3gpp-security-group-7df3c25b8d40?source=rss-3052ca503325------2</link>
            <guid isPermaLink="false">https://medium.com/p/7df3c25b8d40</guid>
            <category><![CDATA[5g]]></category>
            <category><![CDATA[satellite-technology]]></category>
            <category><![CDATA[internet]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[6g]]></category>
            <dc:creator><![CDATA[Josue Martins]]></dc:creator>
            <pubDate>Sun, 21 Sep 2025 12:37:39 GMT</pubDate>
            <atom:updated>2026-04-19T09:34:21.055Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Five Security Benefits Of Private 5G]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/josue-martins/five-security-benefits-of-private-5g-ae5cc7b5f03b?source=rss-3052ca503325------2"><img src="https://cdn-images-1.medium.com/max/1903/1*1UdGgJ9JiejWUmn8qQxb0g.jpeg" width="1903"></a></p><p class="medium-feed-snippet">Private 5G security benefits&#x200A;&#x2014;&#x200A;Part 2</p><p class="medium-feed-link"><a href="https://medium.com/josue-martins/five-security-benefits-of-private-5g-ae5cc7b5f03b?source=rss-3052ca503325------2">Continue reading on Josue Martins In Cyber Security »</a></p></div>]]></description>
            <link>https://medium.com/josue-martins/five-security-benefits-of-private-5g-ae5cc7b5f03b?source=rss-3052ca503325------2</link>
            <guid isPermaLink="false">https://medium.com/p/ae5cc7b5f03b</guid>
            <category><![CDATA[5g]]></category>
            <category><![CDATA[compliance]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[risk-management]]></category>
            <category><![CDATA[internet]]></category>
            <dc:creator><![CDATA[Josue Martins]]></dc:creator>
            <pubDate>Sat, 15 Mar 2025 13:53:11 GMT</pubDate>
            <atom:updated>2025-03-15T14:04:33.011Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Five Security Benefits Of Private 5G Versus Public 5G Networks]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/josue-martins/five-security-benefits-of-private-5g-versus-public-5g-networks-635d6b1bc07a?source=rss-3052ca503325------2"><img src="https://cdn-images-1.medium.com/max/1903/1*1UdGgJ9JiejWUmn8qQxb0g.jpeg" width="1903"></a></p><p class="medium-feed-snippet">Private 5G security benefits &#x2014; Part 1</p><p class="medium-feed-link"><a href="https://medium.com/josue-martins/five-security-benefits-of-private-5g-versus-public-5g-networks-635d6b1bc07a?source=rss-3052ca503325------2">Continue reading on Josue Martins In Cyber Security »</a></p></div>]]></description>
            <link>https://medium.com/josue-martins/five-security-benefits-of-private-5g-versus-public-5g-networks-635d6b1bc07a?source=rss-3052ca503325------2</link>
            <guid isPermaLink="false">https://medium.com/p/635d6b1bc07a</guid>
            <category><![CDATA[cyebrsecurity]]></category>
            <category><![CDATA[5g]]></category>
            <category><![CDATA[industry-4-0]]></category>
            <category><![CDATA[internet]]></category>
            <category><![CDATA[network]]></category>
            <dc:creator><![CDATA[Josue Martins]]></dc:creator>
            <pubDate>Sun, 09 Mar 2025 10:04:06 GMT</pubDate>
            <atom:updated>2025-03-10T10:18:12.822Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[How Does The Concept Of Federation In The(ISC2 CCSP) certification Works Within A 5G Network?]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/josue-martins/how-does-the-concept-of-federation-in-the-isc2-ccsp-certificationworks-within-a-5g-network-0b878471fd30?source=rss-3052ca503325------2"><img src="https://cdn-images-1.medium.com/max/1344/1*1xZHiR9davvS4tLSi1uZ6w.jpeg" width="1344"></a></p><p class="medium-feed-snippet">Bonus Article On The Federation Concept From The ISC2 CCSP</p><p class="medium-feed-link"><a href="https://medium.com/josue-martins/how-does-the-concept-of-federation-in-the-isc2-ccsp-certificationworks-within-a-5g-network-0b878471fd30?source=rss-3052ca503325------2">Continue reading on Josue Martins In Cyber Security »</a></p></div>]]></description>
            <link>https://medium.com/josue-martins/how-does-the-concept-of-federation-in-the-isc2-ccsp-certificationworks-within-a-5g-network-0b878471fd30?source=rss-3052ca503325------2</link>
            <guid isPermaLink="false">https://medium.com/p/0b878471fd30</guid>
            <category><![CDATA[ccsp]]></category>
            <category><![CDATA[isc2]]></category>
            <category><![CDATA[5g]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[cloud-security]]></category>
            <dc:creator><![CDATA[Josue Martins]]></dc:creator>
            <pubDate>Fri, 29 Nov 2024 09:08:05 GMT</pubDate>
            <atom:updated>2024-12-23T08:38:45.141Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Mapping Five ISC2 CCSP Concepts With 5G Security]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/josue-martins/mapping-five-isc2-ccsp-concepts-with-5g-security-1ebd355e0d35?source=rss-3052ca503325------2"><img src="https://cdn-images-1.medium.com/max/1408/1*jUpb-U29beg8XnNWxj_zmg.jpeg" width="1408"></a></p><p class="medium-feed-snippet">Top 5 ISC2 Certified Cloud Security Professional Concept in 5G security</p><p class="medium-feed-link"><a href="https://medium.com/josue-martins/mapping-five-isc2-ccsp-concepts-with-5g-security-1ebd355e0d35?source=rss-3052ca503325------2">Continue reading on Josue Martins In Cyber Security »</a></p></div>]]></description>
            <link>https://medium.com/josue-martins/mapping-five-isc2-ccsp-concepts-with-5g-security-1ebd355e0d35?source=rss-3052ca503325------2</link>
            <guid isPermaLink="false">https://medium.com/p/1ebd355e0d35</guid>
            <category><![CDATA[cloud-security]]></category>
            <category><![CDATA[cloud]]></category>
            <category><![CDATA[5g]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[ccsp]]></category>
            <dc:creator><![CDATA[Josue Martins]]></dc:creator>
            <pubDate>Sat, 23 Nov 2024 15:29:20 GMT</pubDate>
            <atom:updated>2024-11-24T15:35:36.099Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Four Potential Cyber Security Attacks On Tesla Cybercabs]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-snippet">The Tesla Cybercab, a fully autonomous electric vehicle, which represents a significant advancement in transportation technology and&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/josue-martins/four-potential-cyber-security-attacks-on-tesla-cybercabs-9c63f597aa35?source=rss-3052ca503325------2">Continue reading on Josue Martins In Cyber Security »</a></p></div>]]></description>
            <link>https://medium.com/josue-martins/four-potential-cyber-security-attacks-on-tesla-cybercabs-9c63f597aa35?source=rss-3052ca503325------2</link>
            <guid isPermaLink="false">https://medium.com/p/9c63f597aa35</guid>
            <category><![CDATA[threat-intelligence]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[internet]]></category>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[tesla]]></category>
            <dc:creator><![CDATA[Josue Martins]]></dc:creator>
            <pubDate>Sat, 12 Oct 2024 15:13:02 GMT</pubDate>
            <atom:updated>2024-10-12T15:13:02.680Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Overcoming the Cybersecurity Professional’s Five Fatal Flaws]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/josue-martins/overcoming-the-cybersecurity-professionals-five-fatal-flaws-352b0aa39402?source=rss-3052ca503325------2"><img src="https://cdn-images-1.medium.com/max/1024/1*FRk3eB3vE4P-F39t1vGzUQ.jpeg" width="1024"></a></p><p class="medium-feed-snippet">Growing and Learning in Cybersecurity</p><p class="medium-feed-link"><a href="https://medium.com/josue-martins/overcoming-the-cybersecurity-professionals-five-fatal-flaws-352b0aa39402?source=rss-3052ca503325------2">Continue reading on Josue Martins In Cyber Security »</a></p></div>]]></description>
            <link>https://medium.com/josue-martins/overcoming-the-cybersecurity-professionals-five-fatal-flaws-352b0aa39402?source=rss-3052ca503325------2</link>
            <guid isPermaLink="false">https://medium.com/p/352b0aa39402</guid>
            <category><![CDATA[computer-security]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[leadership]]></category>
            <category><![CDATA[internet]]></category>
            <category><![CDATA[information-technology]]></category>
            <dc:creator><![CDATA[Josue Martins]]></dc:creator>
            <pubDate>Mon, 16 Sep 2024 04:16:53 GMT</pubDate>
            <atom:updated>2024-09-17T12:16:09.784Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Did CrowdStrike Customers Implement Business Continuity & Disaster Recovery?]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/josue-martins/did-crowdstrike-customers-implement-business-continuity-disaster-recovery-d1647ed8df8a?source=rss-3052ca503325------2"><img src="https://cdn-images-1.medium.com/max/1024/1*smFy8n-U95YoFoE_kfvn1A.jpeg" width="1024"></a></p><p class="medium-feed-snippet">Failing at Business continuity(BC) and Disaster recovery(DR) program</p><p class="medium-feed-link"><a href="https://medium.com/josue-martins/did-crowdstrike-customers-implement-business-continuity-disaster-recovery-d1647ed8df8a?source=rss-3052ca503325------2">Continue reading on Josue Martins In Cyber Security »</a></p></div>]]></description>
            <link>https://medium.com/josue-martins/did-crowdstrike-customers-implement-business-continuity-disaster-recovery-d1647ed8df8a?source=rss-3052ca503325------2</link>
            <guid isPermaLink="false">https://medium.com/p/d1647ed8df8a</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[disaster-response]]></category>
            <category><![CDATA[crowdstrike]]></category>
            <category><![CDATA[business]]></category>
            <category><![CDATA[internet]]></category>
            <dc:creator><![CDATA[Josue Martins]]></dc:creator>
            <pubDate>Tue, 23 Jul 2024 14:27:54 GMT</pubDate>
            <atom:updated>2024-07-25T06:59:29.261Z</atom:updated>
        </item>
    </channel>
</rss>