A tasty cake with security layers | 22 October 2024 |
This is not the WordPress you are looking for | 11 October 2024 |
"Pass the word, Honey", or how the NIST’s new guidelines are changing The Game of Passwords | 29 September 2024 |
A new dimension of AI revolution: protecting personal data with self-hosted AI | 25 March 2024 |
Deciphering 5G security (Part 3). The one about the security of the 5G telecommunication supply chain. | 22 November 2023 |
Deciphering 5G security (Part 2). The one not about the elephant but O-RANgutan in the room. | 16 November 2023 |
Deciphering 5G security (Part 1). Separating facts from fiction. | 14 November 2023 |
Draft 1 of MEF W131 released | 28 July 2022 |
Breaking the fear of tomorrow | 3 March 2022 |
Why Amazon is storing my private WiFi passwords? | 1 February 2021 |
Do not get hacked in troubled times | 16 March 2020 |
Penetration testing, kangaroos and tsunami | 12 December 2018 |
Never give up | 5 December 2018 |