| A tasty cake with security layers | 22 October 2024 |
| This is not the WordPress you are looking for | 11 October 2024 |
| "Pass the word, Honey", or how the NIST’s new guidelines are changing The Game of Passwords | 29 September 2024 |
| A new dimension of AI revolution: protecting personal data with self-hosted AI | 25 March 2024 |
| Deciphering 5G security (Part 3). The one about the security of the 5G telecommunication supply chain. | 22 November 2023 |
| Deciphering 5G security (Part 2). The one not about the elephant but O-RANgutan in the room. | 16 November 2023 |
| Deciphering 5G security (Part 1). Separating facts from fiction. | 14 November 2023 |
| Draft 1 of MEF W131 released | 28 July 2022 |
| Breaking the fear of tomorrow | 3 March 2022 |
| Why Amazon is storing my private WiFi passwords? | 1 February 2021 |
| Do not get hacked in troubled times | 16 March 2020 |
| Penetration testing, kangaroos and tsunami | 12 December 2018 |
| Never give up | 5 December 2018 |