Monthly Archives: July 2025

Cyber and Academia in the US: Ivy League Labs to Federal Research Programmes

In the United States, academic institutions are deeply embedded in the architecture of national cybersecurity. Universities and colleges serve as research engines, policy advisors, workforce pipelines, and launchpads for venture-backed startups. From federally funded research to deep partnerships with DARPA, NIST, and the Department of Defense, U.S. academia drives both innovation and influence in cybersecurity.

Continue reading

Two Sides of a Dying Blade: Yojimbo, Sanjuro and the End of the Samurai Age

This article explores Yojimbo and Sanjuro as two sides of the same coin, charting the decline of the samurai in feudal Japan. Yojimbo depicts the “why”: the collapse brought on by greed, corruption, and the rise of firearms, where mediocre men with guns en masse overpower disciplined swordsmen. Sanjuro shows the “how”, the aftermath, where the last true samurai are left to kill each other while naive reformers blunder around them. Together, the films reflect Kurosawa’s shifting mood and Japan’s uncertain transition into modernity.

Continue reading

Yearning for Roses: Dostoevsky, Miller, and Hope in the Despair

This article compares Dostoevsky’s reverent depiction of the human yearning for belief with Henry Miller’s scathing rejection of it. While Miller sees the search for meaning as self-deceiving, Dostoevsky honours it as a vital and dignified part of being human. The piece argues that, despite the pull of nihilism, the refusal to stop seeking meaning reveals something essential about the human spirit.

Continue reading

Cyber and Academia in Europe: Horizon Projects, Hubs, and Collaboration

Europe’s cybersecurity academic landscape is distributed, multi-lingual, and deeply integrated into public policy and industrial ecosystems. With powerful funding mechanisms like Horizon Europe, a strong regulatory backdrop (e.g. NIS2, Cyber Resilience Act), and a rising number of EU-funded collaborative hubs, academia in Europe isn’t just producing talent and research, it’s driving long-term cyber resilience at national and EU levels.

Continue reading

Databricks vs Snowflake: A Critical Comparison of Modern Data Platforms

This article provides a critical, side-by-side comparison of Databricks and Snowflake, drawing on real-world experience leading enterprise data platform teams. It covers their origins, architecture, programming language support, workload fit, operational complexity, governance, AI capabilities, and ecosystem maturity. The guide helps architects and data leaders understand the philosophical and technical trade-offs, whether prioritising AI-native flexibility and open-source alignment with Databricks or streamlined governance and SQL-first simplicity with Snowflake. Practical recommendations, strategic considerations, and guidance by team persona equip readers to choose or combine these platforms to align with their data strategy and talent strengths.

Continue reading

The Roger Penrose Reader: Shadows, Symmetries, and the Shape of Thought

A reflective exploration of Sir Roger Penrose’s intellectual contributions, spanning his three-worlds metaphysics, Gödelian critique of computational theories of mind, twistor geometry, and Orch-OR theory of consciousness. The piece situates Penrose as a singular figure whose work challenges reductionism and insists on the profound interconnection between mathematics, physics, and consciousness.

Continue reading

Cyber Collaboration in the West Midlands: Skills, Strategy, and a Shared Future

On 29 April 2025, the West Midlands Cyber Working Group met at Gowling WLG in Birmingham to explore how collaboration can drive cyber resilience, skills development, and strategic growth across the region. Speakers, including Andy Hague (TechWM), Dan Rodrigues (CyberFirst), Dave Walker (AWS), Sarah Gray and Louise Macdonald (Gowling WLG), and Wayne Horkan (WM CWG Chair) shared insights on scaling regional leadership, building inclusive talent pipelines, addressing AI security risks, and navigating evolving legal frameworks. The event underscored a shared ambition to position the West Midlands not just as a participant but as a leader in the UK’s cyber ecosystem.

Continue reading

Tech Nation Rising Stars Midlands Final 2025 – Notes from the Canopy

There’s a quiet satisfaction in sitting on the edge of things, absorbing detail, thinking clearly, watching structure unfold. Last April, at The Canopy at The Bond in Birmingham’s Digbeth district, I was glad to attend the Midlands Regional Final of Tech Nation Rising Stars 2025. This wasn’t just a pitch competition; it was a sharp snapshot of the region’s entrepreneurial promise, delivered without bluster but full of energy.

Continue reading

Beyond Masking: The Other Forms of Camouflaging in AuDHD Lives

This article explores the broader spectrum of camouflaging behaviours among neurodivergent people with AuDHD, extending beyond masking. It describes overcompensating, over-explaining, role-playing, disappearing, hyper-mirroring, caregiving, channelling intensity into acceptable pursuits, and intellectualising emotions. A comparison table shows how these strategies differ from masking while still leading to exhaustion, identity confusion, and misdiagnosis.

Continue reading

Cyber and Academia in the UK: Research Centres, Spinouts, and Influence

The UK’s academic institutions play a foundational role in shaping the country’s cybersecurity ecosystem. They don’t just educate the workforce, they produce world-class research, support government policy, commercialise IP into high-growth spinouts, and influence standards through international collaboration.

Continue reading

Cybersecurity Meets Health Innovation: Rethinking Risk at the OT Frontline

Cybersecurity in healthcare isn’t an IT sidebar; it’s now a core operational risk and a foundational element of patient safety and innovation. This write-up captures the highlights, insights, and next steps from our June 2025 event (last Monday), convening leaders across health, cyber, academia, and business.

Continue reading

Steve Jobs in 1983: The Future as He Saw It – And What He Got Right (and Not So Right)

A look back at Steve Jobs’ 1983 Aspen talk, where he foresaw computers becoming the main medium of communication, portable devices with wireless links, and software delivered electronically. The piece reviews what he predicted correctly, where he was too optimistic, and includes a personal story highlighting Apple’s flat management approach that preceeded Sun Microsystems’ sprawling virtual teams.

Continue reading

The Shahnameh in the Context of Persian Gulf Mythologies: Convergences, Divergences, and Cultural Resonance

This article explores the Shahnameh with other mythologies of the Persian Gulf, including Mesopotamian epics, Arabian folklore, and South Asian traditions. It examines shared narrative archetypes, hero-kings, monsters, and cosmic conflicts and highlights the Shahnameh’s distinctive Zoroastrian moral framework, linguistic refinement, and vision of unbroken national continuity. The piece situates Ferdowsi’s work as both a uniquely Persian creation and part of a wider regional mythopoetic tapestry.

Continue reading

Global Cyber Powerhouses: The Leading Vendors and What They Offer

Cybersecurity is a global industry, but it’s also a geopolitical one. The vendors featured in this guide are not just tech companies. They’re often strategic assets, embedded in national security frameworks, powering defence alliances, and influencing cyber norms across continents.

Continue reading

The Virtuous Triangle: Rethinking Risk at Scale

This article introduces the Virtuous Triangle as a strategic framework for understanding cyber risk through the combined lenses of vulnerability assessment, threat intelligence, and contextual risk analysis. It argues that meaningful risk assessment only emerges when these components are integrated and automated at scale. Drawing on decades of experience, the piece reflects on the limitations of standalone data and the necessity of systems thinking in cybersecurity.

Continue reading

The US Cyber Giants: Vendors, Solutions, and Federal Reach

The United States is home to the most powerful cybersecurity vendors on the planet. These companies don’t just sell products, they influence standards, embed themselves in national security supply chains, and shape global policy through their scale, threat intelligence, and lobbying power.

Continue reading