Skip to content

My expertise fields

Home
Reactive Security has limitations. We must learn to design secure systems from the ground up. With the increased penetration of software in our lives, comes adiitional incentives for malicious entities to take advantage of software for malicious purposes. This cannot be ignored or postponed any more.

Security Engineering

Reactive Security has limitations. We must learn to design secure systems from the ground up. With the increased penetration of software in our lives, comes adiitional incentives for malicious entities to take advantage of software for malicious purposes. This cannot be ignored or postponed any more.
Home
Software is used in almost every aspect of our lives. Every industry, every business, almost every dayly activity depends to some extent (frequently very much) on software. Software engineering is therefore crucial because we all depend on the quality and transparency of the software behind all these processes.

Software Engineering

Software is used in almost every aspect of our lives. Every industry, every business, almost every dayly activity depends to some extent (frequently very much) on software. Software engineering is therefore crucial because we all depend on the quality and transparency of the software behind all these processes.
Home
Securing the digital world is a prerequisite for securing the real world. Cyberwars with different motivations are taking place as you read this. Cybersecurity is not just about technology, but about an ecosystem where humans, digital assets and information interact in ways that are often unpredictable at design time.

Cybersecurity

Securing the digital world is a prerequisite for securing the real world. Cyberwars with different motivations are taking place as you read this. Cybersecurity is not just about technology, but about an ecosystem where humans, digital assets and information interact in ways that are often unpredictable at design time.
Home
Securing the future cloud-based computing ecosystems (including IoT, Edge, etc.) requires rethinking the security from the ground up with new tools and approaches. I have been involved in cloud security projects since 2006 and have gained an insight on the real issues that define cloud security.

Cloud and IoT Security

Securing the future cloud-based computing ecosystems (including IoT, Edge, etc.) requires rethinking the security from the ground up with new tools and approaches. I have been involved in cloud security projects since 2006 and have gained an insight on the real issues that define cloud security.
Home
Expert reporting for the court is crucial in many cases. I have expertise in IT forensic investigation and was the general chair of the SADFE 2015 Conference in Málaga. Count on my experience and ask for a free consultation on your case.

Forensic Investigation and Reporting

Expert reporting for the court is crucial in many cases. I have expertise in IT forensic investigation and was the general chair of the SADFE 2015 Conference in Málaga. Count on my experience and ask for a free consultation on your case.
Home
IT Systems pose enormous threats to our rights and lifestyle, but IT Systems can also be the tool to protect our society from current and future threats and abuses. I coined the term Socially-benneficial Systems, which has since then received several other denominations.

Safe Society and Socially-benneficial Systems

IT Systems pose enormous threats to our rights and lifestyle, but IT Systems can also be the tool to protect our society from current and future threats and abuses. I coined the term Socially-benneficial Systems, which has since then received several other denominations.
Home

Next sections are still “Work in progress”

Latest Blog Articles

Selected Publications