UK Cyber Skills Landscape: The Real Gatekeepers of Talent and Training

Beyond bootcamps and degrees, who actually shapes how the UK finds, trains, and qualifies its cyber workforce? The UK cyber skills gap is well known, but less discussed is who actually defines what “skilled” means, who sets the standards, and who controls the flow of talent into real jobs. From formal certifying bodies to regional academies, neurodivergent networks to employer-led bootcamps, this article maps out the real gatekeepers of UK cyber skills and training, the organisations, programmes, and influencers that determine who gets hired, funded, or fast-tracked.

Continue reading
De’Longhi Magnifica S brewing coffee into a colourful mug

Quick Start Guide to the De’Longhi Magnifica S

A simple, step-by-step quick start guide to making great coffee with the De’Longhi Magnifica S (for instance model ECAM22.110.B). Covers setup, beans vs pre-ground, brewing, milk drinks, cleaning, troubleshooting, and pro tips for perfect coffee every time.

Continue reading

Gartner’s 2025 Hype Cycle for Enterprise Architecture: A Critical Review

Gartner’s 2025 Hype Cycle for Enterprise Architecture catalogues trends and buzzwords but fails to grapple with core challenges. It overstates AI as the answer to everything, recycles old concepts under new names, and sidesteps long-standing fundamentals like bi-modal IT, plumbing vs business enablement, and the EA reputation problem. A better hype cycle would cut the noise, confront EA’s accountability gap, and ground guidance in practical playbooks, cost discipline, and measurable business outcomes.

Continue reading

Therapist Fight Club: Carl Rogers’ Person-Centred Psychology for the Neurodiverse Mind

This article reinterprets Carl Rogers’ person-centred psychology through the lens of Asperger’s and systems thinking. Stripping away sentimental language, it presents Rogers’ model as a structured feedback loop, a “Therapist Fight Club” where both therapist and client co-train, honing coherence and self-consistency. Written as an interest piece for the neurodiverse, it reframes therapy not as emotional fixing, but as optimising a system to run with fewer contradictions.

Continue reading

From Policy to Procurement: How Standards Bodies Influence UK Cyber Buying Cycles

It’s not just what’s secure, it’s what’s accepted, assured, and approved. Here’s how standards quietly determine what gets bought in cybersecurity. In cybersecurity, buying decisions are rarely made on features alone. Especially in the UK public sector and regulated industries, procurement is often shaped by frameworks, certifications, and official guidance issued (or heavily influenced) by standards bodies. These organisations, from NCSC and NIST to IASME, ISO, and CIISec, may not sell products, but they define the guardrails within which procurement happens. They help determine what “good” looks like, what qualifies as “secure enough,” and what’s required to win a bid. This article breaks down how standards bodies and frameworks influence what UK organisations actually buy, adopt, and fund when it comes to cybersecurity.

Continue reading

The Shadow Ecosystem: Alumni Networks, Closed Groups, and Whisper Influence in Cyber

Beyond public policy and LinkedIn posts lies a quiet web of influence, trusted groups, off-book referrals, and unseen signals that shape who gets funded, hired, or heard in UK cybersecurity. Cybersecurity in the UK has a formal face: policy frameworks, standards bodies, public panels, and professional networks. But beneath that, there exists a shadow ecosystem, informal, invitation-only, and often more influential than any official organisation. This is where reputations are made (or unmade), where partnerships are brokered before anyone sees a press release, and where quiet nods matter more than job titles. This article explores the informal infrastructure of UK cyber influence, the alumni groups, private chat channels, Slack collectives, and backchannel referrals that quietly shape decisions in hiring, procurement, investment, and policy.

Continue reading

What CISOs Really Read: Reports, Forums, and Signals That Shape Decisions

Forget the vendor hype. Here’s what makes it to the top table when security leaders plan, buy, and act. Chief Information Security Officers (CISOs) are drowning in noise. Every week brings new whitepapers, vendor webinars, analyst reports, and threat briefings, but only a handful cut through and shape decisions at the enterprise level. So, what do CISOs trust? What do they read, bookmark, cite, and share internally when building strategy or justifying spend? This article examines the forums, publications, briefings, and individuals that significantly influence CISO thinking in the UK, beyond vendor brochures.

Continue reading

Brothers Against the Day: Dostoevsky, Derrida, Pynchon and Baudrillard at the End of the Sign

This article weaves together the philosophical contours of Derridean deconstruction, Baudrillardian hyperreality, and semiotic theory to interrogate the literary universes of Fyodor Dostoevsky and Thomas Pynchon. A Semiotic Descent into Hyperreality, Paranoia, and the Collapse of Meaning

Continue reading

The Quiet Power Players of UK Cybersecurity: Who Really Shapes the Agenda?

Behind the acronyms and front-facing roles lies a network of advisors, committees, and convenors quietly setting the pace for cyber strategy in Britain. When we talk about power in UK cybersecurity, we often mention the big institutions… NCSC, DSIT, UK Cyber Security Council, or heavyweight companies like BT, BAE Systems, and Microsoft. But step closer and a more nuanced picture emerges: one shaped less by job titles and more by trust, networks, and proximity to policy formation. This article explores the real power players… not always in the spotlight, but instrumental in influencing policy, procurement, public guidance, and funding flows. These are the advisors, secondments, committee members, and convenors who quietly shape the UK’s cyber agenda.

Continue reading

Entropy and the Implosion of Meaning: Pynchon in the Age of Baudrillard’s Hyperreality

This essay explores the work of Thomas Pynchon through the critical apparatus of Jean Baudrillard, with particular focus on the concepts of simulation, hyperreality, and the implosion of the real. Rather than offering a totalising reading, this essay stages a dialogue between two elusive figures, Pynchon, the postmodern novelist of paranoia and systems, and Baudrillard, the post-Marxist theorist of simulacra and the symbolic collapse of the real.

Continue reading

Cyber and Academia Worldwide: Where Research Meets Real-World Impact

From Singapore to São Paulo, academic institutions are becoming key players in the global cybersecurity landscape. While the US, UK, and EU often dominate discussions of academic cybersecurity, universities and research institutions across Asia, Africa, Latin America, and Oceania are rapidly gaining ground, shaping national policy, developing sovereign cyber capabilities, and launching novel technologies tailored to regional challenges. This article explores how academia across the world is influencing cybersecurity practice, producing talent, and collaborating across borders to tackle today’s most pressing digital threats.

Continue reading

Unravelling the Double: Dostoevsky Through the Lens of Derrida

This article explores Fyodor Dostoevsky’s literary and philosophical contributions through a deconstructive lens, guided by the thought of Jacques Derrida. The aim is not to superimpose Derrida upon Dostoevsky as if one were merely a tool to decode the other, but rather to explore the dialogic potential of their proximity, where the one haunts, and is haunted by, the other.

Continue reading

R.I.P. Ozzy Osbourne

A personal tribute to Ozzy Osbourne following his death on 22 July 2025. Reflecting on Black Sabbath’s industrial roots in Birmingham, the article explores Ozzy’s influence, my tenuous, familial connections to the band, first albums bought, chaotic live shows, and the emotional weight of Ozzy’s final hometown performance. A farewell to a legend from someone who grew up with his music echoing through the smog and steel of the West Midlands.

Continue reading

Cyber and Academia in the US: Ivy League Labs to Federal Research Programmes

In the United States, academic institutions are deeply embedded in the architecture of national cybersecurity. Universities and colleges serve as research engines, policy advisors, workforce pipelines, and launchpads for venture-backed startups. From federally funded research to deep partnerships with DARPA, NIST, and the Department of Defense, U.S. academia drives both innovation and influence in cybersecurity.

Continue reading

Two Sides of a Dying Blade: Yojimbo, Sanjuro and the End of the Samurai Age

This article explores Yojimbo and Sanjuro as two sides of the same coin, charting the decline of the samurai in feudal Japan. Yojimbo depicts the “why”: the collapse brought on by greed, corruption, and the rise of firearms, where mediocre men with guns en masse overpower disciplined swordsmen. Sanjuro shows the “how”, the aftermath, where the last true samurai are left to kill each other while naive reformers blunder around them. Together, the films reflect Kurosawa’s shifting mood and Japan’s uncertain transition into modernity.

Continue reading

Yearning for Roses: Dostoevsky, Miller, and Hope in the Despair

This article compares Dostoevsky’s reverent depiction of the human yearning for belief with Henry Miller’s scathing rejection of it. While Miller sees the search for meaning as self-deceiving, Dostoevsky honours it as a vital and dignified part of being human. The piece argues that, despite the pull of nihilism, the refusal to stop seeking meaning reveals something essential about the human spirit.

Continue reading

Cyber and Academia in Europe: Horizon Projects, Hubs, and Collaboration

Europe’s cybersecurity academic landscape is distributed, multi-lingual, and deeply integrated into public policy and industrial ecosystems. With powerful funding mechanisms like Horizon Europe, a strong regulatory backdrop (e.g. NIS2, Cyber Resilience Act), and a rising number of EU-funded collaborative hubs, academia in Europe isn’t just producing talent and research, it’s driving long-term cyber resilience at national and EU levels.

Continue reading

Databricks vs Snowflake: A Critical Comparison of Modern Data Platforms

This article provides a critical, side-by-side comparison of Databricks and Snowflake, drawing on real-world experience leading enterprise data platform teams. It covers their origins, architecture, programming language support, workload fit, operational complexity, governance, AI capabilities, and ecosystem maturity. The guide helps architects and data leaders understand the philosophical and technical trade-offs, whether prioritising AI-native flexibility and open-source alignment with Databricks or streamlined governance and SQL-first simplicity with Snowflake. Practical recommendations, strategic considerations, and guidance by team persona equip readers to choose or combine these platforms to align with their data strategy and talent strengths.

Continue reading

The Roger Penrose Reader: Shadows, Symmetries, and the Shape of Thought

A reflective exploration of Sir Roger Penrose’s intellectual contributions, spanning his three-worlds metaphysics, Gödelian critique of computational theories of mind, twistor geometry, and Orch-OR theory of consciousness. The piece situates Penrose as a singular figure whose work challenges reductionism and insists on the profound interconnection between mathematics, physics, and consciousness.

Continue reading

Cyber Collaboration in the West Midlands: Skills, Strategy, and a Shared Future

On 29 April 2025, the West Midlands Cyber Working Group met at Gowling WLG in Birmingham to explore how collaboration can drive cyber resilience, skills development, and strategic growth across the region. Speakers, including Andy Hague (TechWM), Dan Rodrigues (CyberFirst), Dave Walker (ex-AWS), Sarah Gray and Louise Macdonald (Gowling WLG), and Wayne Horkan (WM CWG Chair) shared insights on scaling regional leadership, building inclusive talent pipelines, addressing AI security risks, and navigating evolving legal frameworks. The event underscored a shared ambition to position the West Midlands not just as a participant but as a leader in the UK’s cyber ecosystem.

Continue reading