<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 5, 2026 at 11:37 am by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.hardenstance.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>HardenStance</title>
		<link><![CDATA[https://www.hardenstance.com]]></link>
		<description><![CDATA[HardenStance]]></description>
		<lastBuildDate><![CDATA[Thu, 26 Mar 2026 08:46:33 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.hardenstance.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.hardenstance.com/upset-in-ai-telecom/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/upset-in-ai-telecom/]]></link>
			<title>Cited in a Light Reading article on AI risk in the telecom sector</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 08:46:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/briefing-mwc23-taking-stock-of-telco-security-3-3-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/briefing-mwc23-taking-stock-of-telco-security-3-3-2/]]></link>
			<title>Briefing: &#8220;MWC26: Taking Stock of Telco Security&#8221;</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 22:26:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-3-3-2-3-2-3/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-3-3-2-3-2-3/]]></link>
			<title>Fortinet&#8217;s &#8220;2025 Global Threat Landscape report&#8221;</title>
			<pubDate><![CDATA[Tue, 06 May 2025 06:43:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Thu, 05 Sep 2024 15:13:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-2-2-2-5-2-3/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-2-2-2-5-2-3/]]></link>
			<title>GSMA&#8217;s &#8220;Mobile Telecommunications Security Landscape 2026&#8221;</title>
			<pubDate><![CDATA[Tue, 24 Feb 2026 12:19:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-infoblox-2025-dns-threat-landscape-report-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-infoblox-2025-dns-threat-landscape-report-2-2/]]></link>
			<title>WEF&#8217;s &#8220;Global Cybersecurity Outlook 2026&#8221;</title>
			<pubDate><![CDATA[Tue, 13 Jan 2026 08:30:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-infoblox-2025-dns-threat-landscape-report-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-infoblox-2025-dns-threat-landscape-report-2/]]></link>
			<title>Recorded Future&#8217;s &#8220;New ransomware tactics in 2026&#8221;</title>
			<pubDate><![CDATA[Wed, 07 Jan 2026 08:13:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/nokias-take-on-telco-opportunity-and-risk-in-the-quantum-era-2-3-3-2-3/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/nokias-take-on-telco-opportunity-and-risk-in-the-quantum-era-2-3-3-2-3/]]></link>
			<title>20 Tbit/s DDoS attacks orchestrated by the Aisuru botnet</title>
			<pubDate><![CDATA[Tue, 06 Jan 2026 09:48:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/briefing-combining-inline-and-out-of-band-modes-for-ddos-defence/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/briefing-combining-inline-and-out-of-band-modes-for-ddos-defence/]]></link>
			<title>Briefing: &#8220;Allot Doubles Down on DDoS Defence&#8221;</title>
			<pubDate><![CDATA[Tue, 06 Jan 2026 09:29:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/nokias-take-on-telco-opportunity-and-risk-in-the-quantum-era-2-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/nokias-take-on-telco-opportunity-and-risk-in-the-quantum-era-2-2-2/]]></link>
			<title>Feature on consumer cybersecurity published by The Mobile Network</title>
			<pubDate><![CDATA[Thu, 27 Nov 2025 09:27:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-infoblox-2025-dns-threat-landscape-report-2-3/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-infoblox-2025-dns-threat-landscape-report-2-3/]]></link>
			<title>Recorded Future&#8217;s &#8220;2026 State of Security&#8221;</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 15:07:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/briefing-telco-strategies-for-consumer-security-3/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/briefing-telco-strategies-for-consumer-security-3/]]></link>
			<title>Briefing: &#8220;Telco Strategies for Consumer Security 2026&#8221;</title>
			<pubDate><![CDATA[Thu, 12 Feb 2026 14:59:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-infoblox-2025-dns-threat-landscape-report/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-infoblox-2025-dns-threat-landscape-report/]]></link>
			<title>The Infoblox 2025 DNS Threat Landscape Report</title>
			<pubDate><![CDATA[Thu, 06 Nov 2025 11:02:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-3-2-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-3-2-2-2/]]></link>
			<title>The Bitdefender and NETGEAR 2025 IoT Security Landscape Report</title>
			<pubDate><![CDATA[Thu, 06 Nov 2025 10:45:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/online-events/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/online-events/]]></link>
			<title>Hardenstance Events &#038; Webinars</title>
			<pubDate><![CDATA[Sat, 21 Feb 2026 20:36:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/cited-in-a-telecom-tv-article-on-cyber-insurance-services-from-vodafone-3-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/cited-in-a-telecom-tv-article-on-cyber-insurance-services-from-vodafone-3-2-2/]]></link>
			<title>Thanked by the Prpl Foundation for a blog on its work</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 09:11:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/interview-with-cujo-ai/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/interview-with-cujo-ai/]]></link>
			<title>The FCC&#8217;s &#8216;Covered List&#8217; update &#8211; What&#8217;s in it for home router security?</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 15:37:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/white-paper-smart-home-security-at-scale-using-prpl/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/white-paper-smart-home-security-at-scale-using-prpl/]]></link>
			<title>White Paper: &#8220;Smart Home Security at Scale Using prpl&#8221;</title>
			<pubDate><![CDATA[Fri, 19 Dec 2025 11:56:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/interviewed-by-enea-on-malicious-cli-spoofing-2-3/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/interviewed-by-enea-on-malicious-cli-spoofing-2-3/]]></link>
			<title>Interview with the Head of ITU SG17 on Telecom TV</title>
			<pubDate><![CDATA[Mon, 24 Nov 2025 13:44:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/cited-in-a-telecom-tv-article-on-cyber-insurance-services-from-vodafone-3-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/cited-in-a-telecom-tv-article-on-cyber-insurance-services-from-vodafone-3-2/]]></link>
			<title>Blog on Security at the prpl Summit published by IoT Now</title>
			<pubDate><![CDATA[Thu, 23 Oct 2025 10:11:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/interviewed-by-enea-on-malicious-cli-spoofing-2-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/interviewed-by-enea-on-malicious-cli-spoofing-2-2-2/]]></link>
			<title>Cited by Nokia promoting a new White Paper</title>
			<pubDate><![CDATA[Wed, 08 Oct 2025 10:18:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-3-3-2-2-2-3-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-3-3-2-2-2-3-2/]]></link>
			<title>SSSCIP of Ukraine: &#8220;Russian Cyber Operations: Analytics for 1H 2025&#8221;</title>
			<pubDate><![CDATA[Thu, 16 Oct 2025 09:39:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/https-business-comcast-com-enterprise-resources-reports-2025-comcast-business-cybersecurity-threat-report-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/https-business-comcast-com-enterprise-resources-reports-2025-comcast-business-cybersecurity-threat-report-2/]]></link>
			<title>The Microsoft Digital Defense Report 2025</title>
			<pubDate><![CDATA[Mon, 20 Oct 2025 09:03:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/https-business-comcast-com-enterprise-resources-reports-2025-comcast-business-cybersecurity-threat-report/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/https-business-comcast-com-enterprise-resources-reports-2025-comcast-business-cybersecurity-threat-report/]]></link>
			<title>The 2025 Comcast Business Cybersecurity Threat Report</title>
			<pubDate><![CDATA[Mon, 20 Oct 2025 07:55:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/research-white-papers/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/research-white-papers/]]></link>
			<title>Reports &#038; Presentations</title>
			<pubDate><![CDATA[Fri, 24 Oct 2025 16:08:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/what-we-do/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/what-we-do/]]></link>
			<title>What We Do</title>
			<pubDate><![CDATA[Fri, 24 Oct 2025 07:38:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7-3-2-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7-3-2-2-2/]]></link>
			<title>HackerOne&#8217;s &#8220;Rise of the Bionic Hacker&#8221;</title>
			<pubDate><![CDATA[Sat, 11 Oct 2025 12:09:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/https-enisa-europa-eu-publications-enisa-threat-landscape-2025/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/https-enisa-europa-eu-publications-enisa-threat-landscape-2025/]]></link>
			<title>ENISA&#8217;s &#8220;Threat Landscape 2025&#8221;</title>
			<pubDate><![CDATA[Wed, 01 Oct 2025 11:25:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/https-en-gb-hiya-com-state-of-the-call/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/https-en-gb-hiya-com-state-of-the-call/]]></link>
			<title>Hiya’s &#8216;State of The Call 2025&#8217;</title>
			<pubDate><![CDATA[Wed, 01 Oct 2025 06:13:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/interviewed-by-enea-on-malicious-cli-spoofing-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/interviewed-by-enea-on-malicious-cli-spoofing-2-2/]]></link>
			<title>Great feedback from Ericsson USA</title>
			<pubDate><![CDATA[Sat, 27 Sep 2025 07:18:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7-3-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7-3-2-2/]]></link>
			<title>CISA&#8217;s Advisory on &#8220;Countering Chinese State-Sponsored Actors&#8221;</title>
			<pubDate><![CDATA[Mon, 22 Sep 2025 13:10:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/__trashed-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/__trashed-2-2/]]></link>
			<title>Interpol&#8217;s &#8220;Africa Cyber Threat Assessment Report 2025&#8221;</title>
			<pubDate><![CDATA[Mon, 22 Sep 2025 12:24:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7-3-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7-3-2/]]></link>
			<title>CCDOE&#8217;s &#8220;Ukraine as the Frontline of European Cyber Defence&#8221; paper</title>
			<pubDate><![CDATA[Mon, 11 Aug 2025 09:30:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/events-where-hardenstance-is-speaking-or-attending/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/events-where-hardenstance-is-speaking-or-attending/]]></link>
			<title>2026 Events where HardenStance is Speaking or Attending</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 10:58:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/nokias-take-on-telco-opportunity-and-risk-in-the-quantum-era-2-3-3-2-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/nokias-take-on-telco-opportunity-and-risk-in-the-quantum-era-2-3-3-2-2-2/]]></link>
			<title>Central &#038; Eastern Europe: Cybersecurity Hub at the Heart of Europe</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 09:19:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-3-4/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-3-4/]]></link>
			<title>Nokia&#8217;s Threat Intelligence Report 2025</title>
			<pubDate><![CDATA[Wed, 08 Oct 2025 10:15:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/cited-in-a-telecom-tv-article-on-cyber-insurance-services-from-vodafone-3/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/cited-in-a-telecom-tv-article-on-cyber-insurance-services-from-vodafone-3/]]></link>
			<title>Blog on the SK Telecom Hack Published by Telecom TV</title>
			<pubDate><![CDATA[Wed, 14 May 2025 14:44:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/nokias-take-on-telco-opportunity-and-risk-in-the-quantum-era-2-3-3-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/nokias-take-on-telco-opportunity-and-risk-in-the-quantum-era-2-3-3-2-2/]]></link>
			<title>A new release of SandBox AQ&#8217;s AQtive Guard</title>
			<pubDate><![CDATA[Tue, 10 Jun 2025 08:02:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/interviewed-by-enea-on-malicious-cli-spoofing/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/interviewed-by-enea-on-malicious-cli-spoofing/]]></link>
			<title>Interviewed by Enea on Malicious CLI Spoofing</title>
			<pubDate><![CDATA[Tue, 10 Jun 2025 07:55:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7-3/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7-3/]]></link>
			<title>Centre for Countering Disinformation: Weapons of Information Warfare</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 11:41:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-2-2-3-2-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-2-2-3-2-2-2/]]></link>
			<title>Netscout&#8217;s 1H 2025 DDoS Threat Intelligence report</title>
			<pubDate><![CDATA[Thu, 28 Aug 2025 09:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/interviewed-by-enea-on-malicious-cli-spoofing-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/interviewed-by-enea-on-malicious-cli-spoofing-2/]]></link>
			<title>Interviewed by Bitdefender on Consumer Security Services for Telcos</title>
			<pubDate><![CDATA[Thu, 19 Jun 2025 06:39:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-3-2-2-2-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-3-2-2-2-2-2/]]></link>
			<title>ENISA&#8217;s &#8220;Telecom Security Incidents 2024&#8221;</title>
			<pubDate><![CDATA[Thu, 17 Jul 2025 12:29:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/__trashed/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/__trashed/]]></link>
			<title>ATIS: &#8220;Enhanced 5G and Zero Trust Cloud and Operational Security&#8221;</title>
			<pubDate><![CDATA[Thu, 07 Aug 2025 15:23:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-2-2-2-4-3-2-2-2-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-2-2-2-4-3-2-2-2-2/]]></link>
			<title>IBM&#8217;s &#8216;Cost of a Data Breach 2025&#8217;</title>
			<pubDate><![CDATA[Thu, 07 Aug 2025 10:55:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7/]]></link>
			<title>Recorded Future&#8217;s &#8220;Submarine Cables Face Increasing Threats&#8221;</title>
			<pubDate><![CDATA[Mon, 28 Jul 2025 10:05:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/white-paper-proven-ways-to-block-cli-spoofing-scams-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/white-paper-proven-ways-to-block-cli-spoofing-scams-2/]]></link>
			<title>White Paper: &#8220;Securing a Utility&#8217;s Private Wireless Network&#8221;</title>
			<pubDate><![CDATA[Mon, 18 Aug 2025 12:57:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-2-2-2-5-3/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-2-2-2-5-3/]]></link>
			<title>Quantum-safe Cryptography for 4G and 5G Roaming</title>
			<pubDate><![CDATA[Mon, 01 Sep 2025 16:02:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/__trashed-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/__trashed-2/]]></link>
			<title>5G Security Test Bed&#8217;s Assessment of 5G Network Resiliency against False Base Station Attacks</title>
			<pubDate><![CDATA[Fri, 05 Sep 2025 09:19:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7-2/]]></guid>
			<link><![CDATA[https://www.hardenstance.com/the-oran-alliance-security-working-group-wg-11-3-2-3-2-2-7-2/]]></link>
			<title>Telecom TV&#8217;s &#8220;Quantum Safe Networking&#8221; Market Perception Report</title>
			<pubDate><![CDATA[Fri, 01 Aug 2025 09:36:33 +0000]]></pubDate>
		</item>
				</channel>
</rss>
