Cover Image

Technical publications

Published on LinkedIn

A tasty cake with security layers 22 October 2024
This is not the WordPress you are looking for 11 October 2024
"Pass the word, Honey", or how the NIST’s new guidelines are changing The Game of Passwords 29 September 2024
A new dimension of AI revolution: protecting personal data with self-hosted AI 25 March 2024
Deciphering 5G security (Part 3). The one about the security of the 5G telecommunication supply chain. 22 November 2023
Deciphering 5G security (Part 2). The one not about the elephant but O-RANgutan in the room. 16 November 2023
Deciphering 5G security (Part 1). Separating facts from fiction. 14 November 2023
Draft 1 of MEF W131 released 28 July 2022
Breaking the fear of tomorrow 3 March 2022
Why Amazon is storing my private WiFi passwords? 1 February 2021
Do not get hacked in troubled times 16 March 2020
Penetration testing, kangaroos and tsunami 12 December 2018
Never give up 5 December 2018

 

Archive

Securing the cloud. Watch and learn (@www.dtc.co.uk) 22 October 2019
Centre stage with Aleksander Gorkowienko (@dt-x.io) 22 October 2019
What is needed to make DevSecOps a reality? (@enterprisetimes.co.uk) 17 September 2019
IMSI catchers are here to stay (@www.digi.no) 29 July 2019
5 steps to reduce risk for critical infrastructure and industrial control systems (@www.americancityandcounty.com) 24 April 2019
ARU CSNRG, OWASP Cambridge, BCS Cybercrime “IoT & ICS/SCADA Forensics Workshop” 2018 (@Anglia Ruskin University, Cambridge) 10 January 2018
What is penetration testing? Meet the security pros breaking into your business for cash (@www.computerworlduk.com) 09 March 2017