Homepage
Open in app
Sign in
Get started
Josue Martins In Cyber Security
All about cybersecurity
About Us
Articles
Follow
Overcoming the Cybersecurity Professional’s Five Fatal Flaws
Overcoming the Cybersecurity Professional’s Five Fatal Flaws
Growing and Learning in Cybersecurity
Josue Martins
Sep 15
Did CrowdStrike Customers Implement Business Continuity & Disaster Recovery?
Did CrowdStrike Customers Implement Business Continuity & Disaster Recovery?
Failing at Business continuity(BC) and Disaster recovery(DR) program
Josue Martins
Jul 23
2G To 5G Core Networks, The Legacy Signaling Protocols That Should be Avoided
2G To 5G Core Networks, The Legacy Signaling Protocols That Should be Avoided
Signaling security by design and reducing the attack surface
Josue Martins
Jul 19
5G SA Roaming Without OAuth 2.0 Equals Insecurity By Design.
5G SA Roaming Without OAuth 2.0 Equals Insecurity By Design.
Insecurity By Design Or Insecurity By Ignorance?
Josue Martins
Apr 9
Por que o 3GPP não usou o RFC 8705 para tokens OAuth2 do NRF no 5G Core?
Por que o 3GPP não usou o RFC 8705 para tokens OAuth2 do NRF no 5G Core?
Autenticação TLS mútua do cliente OAuth 2.0 e tokens de acesso vinculados a certificados no 5G Core!
Josue Martins
Dec 18, 2023
Top 5 Pitfalls In 5G Security
Top 5 Pitfalls In 5G Security
2023 5G Core security wrap up
Josue Martins
Dec 11, 2023
5G Core Network Functions That Should Never Be Deployed In A Public Cloud — Lawful Interception…
5G Core Network Functions That Should Never Be Deployed In A Public Cloud — Lawful Interception…
What Mobile Operators Should Consider Before Deploying a Lawful Interception Solution for 5G SA in a Public Cloud — Part 2
Josue Martins
Sep 9, 2023
About Josue Martins In Cyber Security
Latest Stories
Archive
About Medium
Terms
Privacy
Teams