New articles are published here first, with summaries shared on LinkedIn. Topics span four categories:
- EUDI & Digital Identity — Wallet security analysis, eIDAS 2.0 implementation, and access control frameworks
- Standards — Guides and commentary on ISO/IEC 27560, CEN standards, and consent management
- ISMS & Compliance — Practical guides for ISO 27001 preparation, PDCA best practices, and audit readiness
- AI & Technology — Analysis of emerging technologies including AI for security, A2AS frameworks, and threat landscape evolution
Looking for conference talks and research papers? See Selected Publications.


