Cover Image

Technical Publications

Published on LinkedIn

The Price of Neglect. The Big Questions Behind Jaguar Land Rover’s Government £1.5 B Cyber Bailout. 4 October 2025
Do Pixels Have Soul: Is AI‑Generated Art Just a Remixing or True Act of Creation? 30 September 2025
Your Router Is Watching You: The Dark Side of Wi-Fi Sensing Technology 4 September 2025
The AI Hiring Bot Has Millions of Sensitive Data Records Exposed 10 July 2025
Cyber Attacks Becoming a Nightmare for UK Businesses. Are CEOs And CISOs Playing a Cybersecurity Roulette? 30 June 2025
Cybersecurity: A Big Guide for Small Businesses 20 June 2025
From free will to wild algorithms: how AI is shaping our lives 6 November 2024
A tasty cake with security layers 22 October 2024
This is not the WordPress you are looking for 11 October 2024
"Pass the word, Honey", or how the NIST’s new guidelines are changing The Game of Passwords 29 September 2024
A new dimension of AI revolution: protecting personal data with self-hosted AI 25 March 2024
Deciphering 5G security (Part 3). The one about the security of the 5G telecommunication supply chain. 22 November 2023
Deciphering 5G security (Part 2). The one not about the elephant but O-RANgutan in the room. 16 November 2023
Deciphering 5G security (Part 1). Separating facts from fiction. 14 November 2023
Draft 1 of MEF W131 released 28 July 2022
Breaking the fear of tomorrow 3 March 2022
Why Amazon is storing my private WiFi passwords? 1 February 2021
Do not get hacked in troubled times 16 March 2020
Penetration testing, kangaroos and tsunami 12 December 2018
Never give up 5 December 2018

 

Archive

Securing the cloud. Watch and learn (@www.dtc.co.uk) 22 October 2019
Centre stage with Aleksander Gorkowienko (@dt-x.io) 22 October 2019
What is needed to make DevSecOps a reality? (@enterprisetimes.co.uk) 17 September 2019
IMSI catchers are here to stay (@www.digi.no) 29 July 2019
5 steps to reduce risk for critical infrastructure and industrial control systems (@www.americancityandcounty.com) 24 April 2019
ARU CSNRG, OWASP Cambridge, BCS Cybercrime “IoT & ICS/SCADA Forensics Workshop” 2018 (@Anglia Ruskin University, Cambridge) 10 January 2018
What is penetration testing? Meet the security pros breaking into your business for cash (@www.computerworlduk.com) 09 March 2017