| The Price of Neglect. The Big Questions Behind Jaguar Land Rover’s Government £1.5 B Cyber Bailout. |
4 October 2025 |
| Do Pixels Have Soul: Is AI‑Generated Art Just a Remixing or True Act of Creation? |
30 September 2025 |
| Your Router Is Watching You: The Dark Side of Wi-Fi Sensing Technology |
4 September 2025 |
| The AI Hiring Bot Has Millions of Sensitive Data Records Exposed |
10 July 2025 |
| Cyber Attacks Becoming a Nightmare for UK Businesses. Are CEOs And CISOs Playing a Cybersecurity Roulette? |
30 June 2025 |
| Cybersecurity: A Big Guide for Small Businesses |
20 June 2025 |
| From free will to wild algorithms: how AI is shaping our lives |
6 November 2024 |
| A tasty cake with security layers |
22 October 2024 |
| This is not the WordPress you are looking for |
11 October 2024 |
| "Pass the word, Honey", or how the NIST’s new guidelines are changing The Game of Passwords |
29 September 2024 |
| A new dimension of AI revolution: protecting personal data with self-hosted AI |
25 March 2024 |
| Deciphering 5G security (Part 3). The one about the security of the 5G telecommunication supply chain. |
22 November 2023 |
| Deciphering 5G security (Part 2). The one not about the elephant but O-RANgutan in the room. |
16 November 2023 |
| Deciphering 5G security (Part 1). Separating facts from fiction. |
14 November 2023 |
| Draft 1 of MEF W131 released |
28 July 2022 |
| Breaking the fear of tomorrow |
3 March 2022 |
| Why Amazon is storing my private WiFi passwords? |
1 February 2021 |
| Do not get hacked in troubled times |
16 March 2020 |
| Penetration testing, kangaroos and tsunami |
12 December 2018 |
| Never give up |
5 December 2018 |