Author Archives: Wayne Horkan

About Wayne Horkan

I’m a technologist and engineer, typically working in enterprise architecture and systems engineering.

A Brief History of the Terms: Risk Assessment, Risk Management, and GRC

This article explores the historical development and convergence of three foundational concepts in organisational security: risk assessment, risk management, governance, risk, and compliance (GRC). Tracing their origins in engineering, finance, and corporate governance, it charts their institutionalisation across the UK and their modern evolution into digital, real-time resilience frameworks that underpin enterprise cybersecurity and compliance today.

Continue reading

More Alan Turing Invented Computing Bollocks

Alan Turing is a bona fide genius whose contributions to computer science, cryptography, and artificial intelligence are undeniable. But in the pantheon of computing history, there’s a growing myth that Turing single-handedly “invented modern computing.” This oversimplified narrative does both Turing and the broader field of computing a disservice.

Continue reading

A Brief History of Penetration Testing: From Tiger Teams to PTaaS

This article traces the history of penetration testing from its military and intelligence roots in the 1960s to its formalisation through U.S. Tiger Teams and J.P. Anderson’s security frameworks. It follows the growth of pen testing into the commercial sector during the 1980s–90s, highlights key tooling milestones like SATAN, and explores its professionalisation in the 2000s via OWASP and PTaaS models. A dedicated UK section explains the roles of CESG, CHECK, CREST, and the NCSC in standardising and accrediting pen testing within British institutions. The article concludes with a reflection on how penetration testing continues to evolve in parallel with modern cyber threats.

Continue reading

The Rise of the CISO: A Brief History of the Chief Information Security Officer

A detailed history of the Chief Information Security Officer (CISO) role, tracing its origin to Citigroup in 1995 and exploring how it evolved from a technical IT role to a strategic business function. The article examines shifts across decades, global trends, modern challenges, and how the UK has uniquely adopted and adapted the CISO title, often slower and more varied than the US. It concludes that the role remains critical but inconsistently defined, particularly in public and hybrid sectors.

Continue reading

Top Cybersecurity Firms and Services Shaping Europe’s Digital Defence

Cybersecurity in Europe is evolving quickly, driven by growing regulation (NIS2, Cyber Resilience Act), state-sponsored threats, and accelerating digital transformation. The result is a dynamic and diverse vendor landscape: large integrators defending entire ministries, regional champions supporting SMEs, and specialised firms leading in OT, AI security, and cyber risk quantification.

Continue reading

Waste Management Today: The State of the UK Waste Management Industry in 2025

The UK waste management industry stands at a crossroads in 2025, shaped by landmark regulations, rising operational costs, and a surge in technological innovation. This article examines the evolving landscape, highlighting the impact of “Simpler Recycling,” Extended Producer Responsibility, and the emissions trading scheme. With recycling rates stagnating, AI driving change, and councils cutting services, we examine whether the sector can meet the UK’s ambitious sustainability goals or risk falling behind.

Continue reading

Virgil as Reason: The Noble Pagan and the Soul’s Journey Through Darkness

Virgil, Dante’s guide through Hell and Purgatory, represents natural reason, classical virtue, and the limits of human understanding. This article explores Virgil as a symbol of philosophical clarity, moral insight, and noble limitation, showing how Dante honours reason, even as he insists on the necessity of grace.

Continue reading

More “AI Damages the Creative Industries” Bollocks: Hysteria, Hype, and Half-Truths

The narrative that artificial intelligence is the Grim Reaper for the creative industries has become so common that you’d think every writer, artist, musician, and filmmaker is moments away from losing their livelihood. Headlines scream about AI-generated content, creative robots, and soulless machines taking over art, leaving human creators out in the cold. But does the hype match the reality? Spoiler: it doesn’t.

Continue reading

Major Cyber Vendors and Service Providers in the UK

The UK’s cybersecurity sector is home to thousands of providers, ranging from nimble startups and regional MSSPs to global consulting firms and homegrown risk intelligence platforms. While the National Cyber Security Centre (NCSC) sets the tone for policy and technical guidance, it’s these vendors that translate strategy into services: monitoring networks, managing risk, conducting audits, and responding to breaches in real time.

Continue reading

Beatrice as Beatitude: Divine Wisdom and the Soul’s Ascent in Dante’s Commedia

Beatrice is more than Dante’s muse; she is the embodiment of divine wisdom, guiding the soul beyond reason to beatific vision. This article examines Beatrice as a theological and philosophical symbol, drawing on Scripture, Thomism, and Marian typology to show how she enables Dante’s ascent toward God.

Continue reading

Restructuring the West Midlands Growth Company: Reform or Rebrand?

The West Midlands Growth Company (WMGC) is being restructured into a new Economic Development Vehicle (EDV) by 2026 to focus on investment and strategic delivery. While WMGC claims credit for attracting big business, many local startups, mine included, received no meaningful support. The restructuring is a chance to fix that, but only if the new EDV backs early-stage innovators with funding access, partnerships, and scale-up support. Otherwise, it’s just a rebrand, not reform.

Continue reading

More Damien Hirst Bollocks: The Hype, the Diamonds, and the Dead Things

Damien Hirst, the enfant terrible of the art world, the man who turned dead animals into million-dollar spectacles and placed a skull encrusted with diamonds at the pinnacle of contemporary art. Critics call him a genius; others see him as the ultimate conman. But one thing’s for sure: Hirst has built an empire of bollocks as big and brash as his installations.

Continue reading

Cyber as a Cluster: A Critical Review of the Midlands Engine Cyber & Defence Report (April 2025)

Cyber in the West Midlands is no longer just a business activity, it’s a cluster. With the right action, it can become a strategic economic engine. This review critiques the Midlands Engine Cyber & Defence Report (April 2025) and sets out a ten-point plan to make that transformation real. The opportunity is clear. The data is in. Now we must deliver.

Continue reading

Cyber Across Global Governments: International Cooperation and National Strategies

Cybersecurity has become a pillar of national security, digital economy growth, and global diplomacy. From ransomware attacks on hospitals to interference in democratic elections, governments worldwide now treat cyber threats as matters of statecraft, not just IT hygiene. While national strategies differ, a few shared patterns have emerged: defence of critical infrastructure, capacity building, and international coordination.

Continue reading
"The Donation of Constantine" – Raphael's workshop

The Empire and the Cross: Dante’s Vision of Universal Rule in De Monarchia

This article explores Dante’s political treatise De Monarchia, in which he argues for a divinely ordained universal empire distinct from the Church. Combining Roman law, Aristotelian philosophy, and Thomistic theology, Dante envisions imperial rule as the necessary foundation for peace, justice, and the fulfilment of humanity’s earthly potential.

Continue reading

More Banksy Bollocks: The Hype, Mystique, and Overrated Spectacle of a Spray-Can Superstar

Banksy, the elusive artist-slash-provocateur whose street art inspires breathless headlines, Instagram pilgrimages, and auction house-feeding frenzies. The name alone conjures images of anti-establishment stencils, secretive installations, and shredded canvases that make the art world weak at the knees. But peel back the layers of mystique, and you’ll find an empire built as much on hype and clever PR as artistic merit.

Continue reading

Focus by Al Ries: Why Narrowing Your Scope Can Widen Your Success

Focus challenges the myth that growth comes from diversification. Al Ries argues that companies and individuals succeed not by expanding their offerings, but by narrowing their efforts to dominate a clearly defined niche. This article summarises the book’s key ideas, critiques its oversimplifications, and offers practical ways to apply focus in business and daily life.

Continue reading

The 22 Immutable Laws of Marketing – Timeless Truths or Strategic Myths?

In this punchy rulebook, Ries and Trout lay out 22 fundamental marketing principles, from the power of being first, to the dangers of brand extension. This article reviews each law’s strategic relevance, critiques the rigid tone of the book, and shows how to apply its timeless (if sometimes controversial) advice in a modern context.

Continue reading

The House Is Not the Walls: A Taoist Lesson on Absence, Emptiness, and Usefulness

This blog post explores Tao Te Ching Chapter 11 and its core idea that emptiness enables function, a house is useful not because of its walls, but because of the space they enclose. Drawing from Stephen Mitchell’s translation, it highlights how absence, not presence, often provides true utility. This Taoist insight is linked to earlier Zen koans I’ve written about, showing how clarity, usefulness, and forgiveness all emerge from what is deliberately left open or let go. The piece argues that value lies not just in what we build, but in the space we leave for things to work.

Continue reading

Cyber Across US Government: Agencies, Frameworks, and Innovation Pathways

The United States is arguably the most influential force in global cybersecurity, but its governance model is sprawling, federal, and often opaque to outsiders. Responsibility is distributed across military, civilian, and intelligence agencies, each with their own authorities, funding mechanisms, and strategic priorities.

Continue reading