<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Asif Mithani</title><description>AI systems, cybersecurity strategy, infrastructure thinking, and operational governance.</description><link>https://example.com/</link><item><title>Why I Am Building a Personal AI Infrastructure</title><link>https://example.com/blog/post-1/</link><guid isPermaLink="true">https://example.com/blog/post-1/</guid><description>A practical argument for building a modular, governable personal AI operating model.</description><pubDate>Fri, 15 May 2026 00:00:00 GMT</pubDate></item><item><title>Cybersecurity Strategy Is Becoming an AI Systems Problem</title><link>https://example.com/blog/post-2/</link><guid isPermaLink="true">https://example.com/blog/post-2/</guid><description>Cybersecurity is increasingly shaped by AI architecture choices, not only by controls and compliance checklists.</description><pubDate>Fri, 15 May 2026 00:00:00 GMT</pubDate></item><item><title>Designing Human Approval Into AI Workflows</title><link>https://example.com/blog/post-3/</link><guid isPermaLink="true">https://example.com/blog/post-3/</guid><description>Human approval should be designed as a system capability, not a late-stage manual patch.</description><pubDate>Fri, 15 May 2026 00:00:00 GMT</pubDate></item></channel></rss>