Articles
I’ve written several technical articles since 1997 for various blogs, websites, and magazines, both in English and in Italian. Here you can find a list of the most recent ones:

Demystifying JOSE, the JWT Family: JWS, JWE, JWA, and JWK Explained
Break down the differences and relationships between JOSE, JWT, JWS, JWE, JWA, and JWK with clear explanations and examples.
2025-10-07

What a Developer Advocate Is Not
Let's define what a developer advocate is not by comparing this role to a few common assumptions.
2025-10-03

Secure a .NET RAG System with Auth0 FGA
This in-depth guide shows you how to secure your AI chatbot built with .NET Blazor using the RAG pattern, ensuring users can only access information from documents they have permission to view.
2025-10-01

Does Artificial Intelligence Threaten Critical Thinking?
What if AI could paradoxically turn out to be not the death of critical thinking but rather its unexpected training ground?
2025-09-22

Dealing With Non-Human Identities
Dive into the world of Non-Human Identities (NHIs). Learn how they differ from traditional machine identities, their role in AI, the top security challenges, and the best practices for securing your machine-to-machine interactions.
2025-09-09

Fine-Grained Authorization in ASP.NET Core with Auth0 FGA
Learn how to implement fine-grained, relationship-based authorization in an ASP.NET Core minimal API using Auth0 FGA.
2025-09-05

Being a Developer in the Vibe Coding Era
How is the work of developers changing in the age of AI and vibe coding? Will technical skills still be needed?
2025-08-26
Protect Your Access Tokens with DPoP
Learn what DPoP is and how it works under the hood to enhance your application security and mitigate the effects of access token theft.
2025-08-25

Five Myths About JWTs Debunked
Dive deep into the common myths surrounding JSON Web Tokens (JWTs), from their security to their role as access tokens, and why they aren't a one-size-fits-all solution for session management.
2025-08-07