Category Archives: article

The Grant Delusion: Why Government Should Commission, Not Compete, in UK Innovation

David Richards MBE is right, the UK’s innovation economy has become addicted to grants, not growth. But the problem isn’t funding itself; it’s design. Innovate UK and its peers were meant to bridge the early-stage gap between research and market, but instead became destinations in their own right. Government now competes with, rather than commissions, the innovators it should empower. The fix is simple: commission outcomes, not applications; fund practitioners, not paperwork.

Continue reading

Winning Influence Without a Badge: Non-Traditional Routes Into UK Cyber Leadership

You don’t need a government role or a corporate title to shape the future of cybersecurity in the UK. In the UK cyber ecosystem, influence isn’t just about where you work, it’s about what you contribute, who you connect, and how you show up. While traditional routes like senior roles in government, Big Four consultancies, or defence primes still hold sway, an increasing number of leaders, convenors, and policy-shapers are rising through non-traditional paths. This article explores how founders, freelancers, academics, and community builders are gaining real influence without formal badges, and how you can do the same.

Continue reading

Cyber, Growth, and Regional Futures: A Comparative Synthesis of Six 2025 Reports: From Fragmentation to Framework

2025 has been a year of noise, policy papers, strategies, and growth plans, each declaring the next leap for UK cyber and regional innovation. But noise isn’t movement. Across six flagship reports, DSIT’s Cyber Growth Action Plan, WMCA’s Futures and Growth Plans, the Tech Nation 2025 report, the Midlands Engine Cyber & Defence report, and DSIT’s Cyber Skills 2025, the pattern repeats: good intent, weak execution, no continuity. Together, they map £77 billion in Gross Value Added (GVA), 143,000 cyber professionals, and £17 billion in projected uplift, but no coherent operating model. This paper builds one: treating cyber as economic infrastructure and the West Midlands as the proof-of-concept for a practitioner-led, resilient growth framework.

Continue reading

A History of Cowboy Psychedelia

Wide-brimmed dreams, desert reverb, and the strange saddle between country & mind-expansion… “A History of Cowboy Psychedelia” traces the strange, dust-blown intersection between country music and psychedelic experimentation. From the mythic melancholy of Gram Parsons to the surreal duets of Lee Hazlewood and Nancy Sinatra and onwards to the captivating urgency of Jeffrey Lee Pierce and The Gun Club, this long-form essay maps a hidden aesthetic that runs through outlaw country, cosmic Americana, and outsider folk. It’s not a genre you’ll find in the record bins, but it lingers like a mirage on the edge of American sound. This is music for the lonely, the altered, and the in-between.

Continue reading

The West Midlands Growth Plan 2025: Blueprint or Turning Point?

The West Midlands Growth Plan 2025 is the most detailed and credible regional strategy in a decade, a £17.4 billion growth blueprint built on data, pragmatism, and belief in place-based delivery. It models a region that can finally close its £5-per-hour productivity gap and turn polycentric geography into economic strength. Yet it still risks the same fate as its predecessors: ambition without execution. My critique goes beyond the press releases, exposing funding silos, institutional churn, and the absence of practitioner leadership, and proposes a hard-edged, engineer’s roadmap for delivery. Cyber must be treated as infrastructure; innovation must be systemic, not decorative; and governance must have teeth. The call is simple: stop admiring the plan and start engineering the outcome. Continuity, accountability, and practitioner leadership; the rest is noise.

Continue reading

Cyber Security Skills in the UK Labour Market 2025: A Critical Analysis

This article critically examines the Cyber Security Skills in the UK Labour Market 2025 report, highlighting strengths, weaknesses, and regional implications. It synthesises the findings into a practitioner-academic analysis, with recommendations for aligning graduate supply, employer demand, and future skills in areas such as AI and cyber resilience.

Continue reading

Unlocking the UK’s Growth Potential: A Critical and Constructive Review of the Tech Nation Report 2025

The Tech Nation Report 2025 reaffirms the UK’s position as Europe’s leading tech hub, valued at $1.2 trillion and home to 163 unicorns. Yet it also exposes structural barriers, capital bottlenecks, talent shortages, regional imbalances, and over-reliance on London and AI. This article critically reviews the report, adds practitioner-led insights, and proposes a roadmap for sustainable and regionally inclusive growth.

Continue reading

Pre-Launch Reflections: The West Midlands Cyber Hub

The pre-launch of the West Midlands Cyber Hub at Enterprise Wharf brought together over 100 leaders from across the region’s cyber ecosystem, CISOs, CTOs, startups, universities, government, community partners, students, practitioners, and members of the interested public. What began as a vision to give the West Midlands a proper home for cyber has now become real, supported by DSIT, Innovate UK, Aston University, West Midlands Cyber Resilience Centre, Midlands Cyber, TechWM and the Innovation Alliance for the West Midlands.

Continue reading

Breaking Into the Defence & Critical Infrastructure Cyber Supply Chain

Security clearances. Procurement portals. Legacy gatekeepers. Here’s how cyber vendors and professionals gain access to the UK’s most protected sectors. Selling into the UK’s defence, energy, transport, and national infrastructure sectors is not like selling into commercial enterprises. The barriers to entry are higher, the procurement cycles are longer, but the opportunities are vast and durable. Whether you’re a startup with a novel capability or a professional looking to work in high-trust environments, this guide explains how to navigate the real routes into defence and critical national infrastructure (CNI) supply chains.

Continue reading

From Policy to Place: Aligning the UK Cyber Policy with the West Midlands Futures Growth Plan

The UK Cyber Policy 2025 and the West Midlands Futures Green Paper 2025 set bold agendas but risk gaps without practitioner-led delivery. The national policy offers ambition but lacks continuity, metrics, and practitioner voice. The regional plan lays strong scaffolding but underweights cyber, leaning too heavily on AI. A ten-point roadmap shows the way forward: formally recognise cyber as a standalone cluster, unify governance, foster community, attract investment, establish a hub, launch a festival, rebuild narrative, reform SME funding access, enhance talent strategy, and create a regional benchmarking index. Anchored in the West Midlands Cyber Hub, this approach can balance national ambition with regional delivery, making resilience a driver of inclusive growth.

Continue reading

The West Midlands Futures Green Paper (2025): Synopsis, Key Takeaways, Critique, and Recommendations

The West Midlands Futures Green Paper sets a bold agenda, but risks leaning too heavily on AI. Cyber must be treated as a foundational enabler across every sector, from advanced manufacturing to healthcare, and anchored in a practitioner-led West Midlands Cyber Hub. Such a hub can drive assurance, skills conversion, supply-chain uplift, and regional equity, ensuring growth is both resilient and inclusive.

Continue reading

UK Cyber at a Crossroads: Three Essays on Policy, Practice, and Growth, in Reaction to the 2025 Cyber Growth Action Plan

The UK’s cyber policy has made progress but suffers from churn, overlap, and regional imbalance. The 2025 Cyber Policy sets out ambition but lacks continuity and practitioner voice. This three-part series traces the history, critiques the new policy, and argues for a practitioner-led, regionally balanced ecosystem to stabilise the base finally.

Continue reading

Stabilising the Base: From Patchwork to Platform in the UK Cyber Ecosystem

This article argues that stabilisation must be the UK’s priority. Drawing together the lessons of history and the critique of the DSIT Cyber Growth Action Plan 2025, it calls for a practitioner-led ecosystem that ends programme churn, addresses regional imbalance, unlocks university IP, and resists government attempts to build commercial products. The vision is of hubs and networks rooted in delivery and credibility — a cyber base resilient enough to sustain long-term growth. Unless these foundations are secured, the UK will remain trapped in cycles of ambition without durability.

Continue reading

Reviewing the 2025 UK Cyber Growth Action Plan: Promise, Blind Spots, and the Challenge of Continuity

This article, written in reaction to the DSIT Cyber Growth Action Plan 2025, reviews and critiques the government’s new approach. It recognises what the policy gets right — framing resilience as growth, creating safe havens, and calling for a one-team response — but also highlights what is missing: metrics, continuity, practitioner voice, and regional balance. Without these, the new policy risks becoming rhetoric rather than a platform for real progress. Unless the UK moves decisively from aspiration to delivery, the 2025 Cyber Growth Action Plan will join its predecessors as another missed opportunity.

Continue reading

A Potted History of the UK’s Cyber Economy: From Secrecy to Sector

This article, written in reaction to the DSIT Cyber Growth Action Plan 2025, traces the uneven history of the UK’s cyber economy. From CESG’s secretive assurance role to NCSC’s public authority and DSIT’s contested remit, the story is one of incremental gains but persistent churn. Programmes such as Cyber Essentials, CyberFirst, CyberASAP, Cyber Runway, and Cyber Resilience Centres have delivered value but lacked continuity, scale, and coherence. Unless the government commits to stabilisation and long-term delivery, the UK will continue to recycle initiatives rather than build a durable cyber base.

Continue reading

How to Join a Government Working Group (Without Being a Civil Servant)

Yes, you can shape UK cyber policy, even from the outside. Here’s how people get in. Government working groups in the UK might seem closed-off, formal rooms filled with civil servants, consultants, and institutional insiders. But increasingly, government departments are seeking outside voices: founders, engineers, researchers, and community leaders who bring real-world experience. Whether you’re trying to influence cyber skills policy, secure-by-design standards, or public-sector procurement, joining the right working group can amplify your voice and build visibility for your organisation or sector. This article breaks down how non-civil servants are contributing to cyber and tech policy via working groups, what types exist, and how you can get involved.

Continue reading

Databricks vs Snowflake vs Microsoft Fabric: Positioning the Future of Enterprise Data Platforms

This article extends the Databricks vs Snowflake comparison to include Microsoft Fabric, exploring the platforms’ philosophical roots, architectural approaches, and strategic trade-offs. It positions Fabric not as a direct competitor but as a consolidation play for Microsoft-centric organisations, and introduces Microsoft Purview as the governance layer that unifies divergent estates. Drawing on real enterprise patterns where Databricks underpins engineering, Fabric drives BI adoption, and functional teams risk fragmentation, the piece outlines the “Build–Consume–Govern” model and a phased transition plan. The conclusion emphasises orchestration across platforms, not choosing a single winner, as the path to a governed, AI-ready data estate.

Continue reading

From Startups to Scaleups: The UK’s Cyber Commercialisation Ladder, Explained

How Britain takes a cyber idea from academic paper to procurement-ready product, and who’s involved at each step. The UK has quietly built one of the world’s most interconnected cyber innovation ecosystems, a ladder of support that helps researchers, entrepreneurs, and early-stage companies turn ideas into commercial products, funding rounds, and contracts. But it’s not always obvious how it works, who owns which stage, or what the unwritten rules are. This article breaks down the UK’s cyber commercialisation journey, from research spinouts to public sector procurement, and highlights the critical programmes, accelerators, and gatekeepers at each level.

Continue reading

Same As It Ever Was: Microsoft’s Office 365 Trap And Why Industrial Email Users Are Being Let Down

Microsoft is undermining Outlook’s role as the backbone of professional communication by forcing heavy users through the Office 365 funnel. Add-ins like MailMaestro, Copilot, and Boomerang are locked away, the product line is fragmented across multiple Outlook clients, and serious multi-inbox management is ignored. Rivals such as Spark, Canary, Mailbird, Superhuman, and even newer “hip” tools like Hey! show more imagination. The lost promise of Google Wave reminds us that integration, not fragmentation, is the real opportunity, while Microsoft’s current short-sighted strategy leaves it weaker than ever. Email remains the killer app of the internet, so why, after all this time, is it still so shite?

Continue reading

Cyber Clusters and Regional Powerbases: Influence Beyond London

From Cheltenham to Belfast, regional ecosystems are quietly shaping the future of UK cybersecurity. When people think of UK cybersecurity, they often picture Whitehall meetings or Canary Wharf boardrooms. But real influence increasingly lies outside London, in regional clusters, civic innovation groups, and place-based partnerships that combine skills, startups, and strategy into powerful local ecosystems. These clusters aren’t just delivering training or running meetups. They are shaping national policy, securing investment, and building sovereign capabilities in collaboration with local government, academia, and industry. This article maps out the regional powerbases transforming the UK’s cybersecurity landscape, and how to engage with them.

Continue reading