Category Archives: article

Major Cyber Vendors and Service Providers in the UK

The UK’s cybersecurity sector is home to thousands of providers, ranging from nimble startups and regional MSSPs to global consulting firms and homegrown risk intelligence platforms. While the National Cyber Security Centre (NCSC) sets the tone for policy and technical guidance, it’s these vendors that translate strategy into services: monitoring networks, managing risk, conducting audits, and responding to breaches in real time.

Continue reading

Trust, Labels, and the Path to Meaningful Security: Rethinking CRT Adoption in the UK

This article critically examines the UK’s Cyber Resilience Test (CRT) as a cybersecurity labelling initiative aimed at building consumer trust in connected devices. While affirming CRT’s importance, it highlights the need for clearer value propositions, stakeholder alignment, and behavioural insights to ensure meaningful adoption. Drawing on global examples like Singapore’s CLS and the EU’s CE mark, it argues that CRT must evolve from a technical standard to a culturally embedded trust signal. The piece advocates for a dynamic playbook that supports SMEs, educates consumers, aligns with procurement policy, and adapts over time — turning CRT into a living, ecosystem-wide standard.

Continue reading

Restructuring the West Midlands Growth Company: Reform or Rebrand?

The West Midlands Growth Company (WMGC) is being restructured into a new Economic Development Vehicle (EDV) by 2026 to focus on investment and strategic delivery. While WMGC claims credit for attracting big business, many local startups, mine included, received no meaningful support. The restructuring is a chance to fix that, but only if the new EDV backs early-stage innovators with funding access, partnerships, and scale-up support. Otherwise, it’s just a rebrand, not reform.

Continue reading

More Damien Hirst Bollocks: The Hype, the Diamonds, and the Dead Things

Damien Hirst, the enfant terrible of the art world, the man who turned dead animals into million-dollar spectacles and placed a skull encrusted with diamonds at the pinnacle of contemporary art. Critics call him a genius; others see him as the ultimate conman. But one thing’s for sure: Hirst has built an empire of bollocks as big and brash as his installations.

Continue reading

Cyber as a Cluster: A Critical Review of the Midlands Engine Cyber & Defence Report (April 2025)

Cyber in the West Midlands is no longer just a business activity, it’s a cluster. With the right action, it can become a strategic economic engine. This review critiques the Midlands Engine Cyber & Defence Report (April 2025) and sets out a ten-point plan to make that transformation real. The opportunity is clear. The data is in. Now we must deliver.

Continue reading

The Future of Cyber Resilience Testing: Reflections on a Scheme in Transition

This blog article offers a critical yet constructive reflection on the UK’s Cyber Resilience Testing (CRT) initiative. While CRT is conceptually sound and timely, significant questions remain around cost, demand, usability, policy intent, and delivery responsibility. The article explores whether CRT is positioned to become a meaningful standard or risks being sidelined as another voluntary layer. It advocates for clearer articulation of purpose, audience targeting, and strategic alignment to unlock CRT’s full potential.

Continue reading

Cyber Across Global Governments: International Cooperation and National Strategies

Cybersecurity has become a pillar of national security, digital economy growth, and global diplomacy. From ransomware attacks on hospitals to interference in democratic elections, governments worldwide now treat cyber threats as matters of statecraft, not just IT hygiene. While national strategies differ, a few shared patterns have emerged: defence of critical infrastructure, capacity building, and international coordination.

Continue reading

Mapping the Global Security Landscape: Where CRT Fits (and Where It Doesn’t)

This blog article critically examines the global landscape of consumer product cybersecurity standards and the proposed role of the UK’s Cyber Resilience Testing (CRT) initiative. It maps key frameworks (PSTI Act, CRA, ETSI EN 303645, IEC 62443, FCC labelling, etc.) and identifies opportunities for CRT to provide ‘above and beyond’ assurance through resilience testing and threat simulation. While acknowledging the challenges of market saturation and standard overlap, it argues that CRT can add unique value — especially in underregulated sectors and poorly enforced product classes — by validating real-world security outcomes rather than static compliance.

Continue reading

More Banksy Bollocks: The Hype, Mystique, and Overrated Spectacle of a Spray-Can Superstar

Banksy, the elusive artist-slash-provocateur whose street art inspires breathless headlines, Instagram pilgrimages, and auction house-feeding frenzies. The name alone conjures images of anti-establishment stencils, secretive installations, and shredded canvases that make the art world weak at the knees. But peel back the layers of mystique, and you’ll find an empire built as much on hype and clever PR as artistic merit.

Continue reading

Focus by Al Ries: Why Narrowing Your Scope Can Widen Your Success

Focus challenges the myth that growth comes from diversification. Al Ries argues that companies and individuals succeed not by expanding their offerings, but by narrowing their efforts to dominate a clearly defined niche. This article summarises the book’s key ideas, critiques its oversimplifications, and offers practical ways to apply focus in business and daily life.

Continue reading

The 22 Immutable Laws of Marketing – Timeless Truths or Strategic Myths?

In this punchy rulebook, Ries and Trout lay out 22 fundamental marketing principles, from the power of being first, to the dangers of brand extension. This article reviews each law’s strategic relevance, critiques the rigid tone of the book, and shows how to apply its timeless (if sometimes controversial) advice in a modern context.

Continue reading

The House Is Not the Walls: A Taoist Lesson on Absence, Emptiness, and Usefulness

This blog post explores Tao Te Ching Chapter 11 and its core idea that emptiness enables function, a house is useful not because of its walls, but because of the space they enclose. Drawing from Stephen Mitchell’s translation, it highlights how absence, not presence, often provides true utility. This Taoist insight is linked to earlier Zen koans I’ve written about, showing how clarity, usefulness, and forgiveness all emerge from what is deliberately left open or let go. The piece argues that value lies not just in what we build, but in the space we leave for things to work.

Continue reading

Cyber Across US Government: Agencies, Frameworks, and Innovation Pathways

The United States is arguably the most influential force in global cybersecurity, but its governance model is sprawling, federal, and often opaque to outsiders. Responsibility is distributed across military, civilian, and intelligence agencies, each with their own authorities, funding mechanisms, and strategic priorities.

Continue reading

Stakeholder Grid Example 3: WM CWG & West Midlands Cyber Ecosystem

The West Midlands Cyber Working Group (WM CWG) plays a pivotal role in uniting industry, academia, government, and grassroots cyber communities across the region. This article outlines how WM CWG applies stakeholder mapping to guide its coordination efforts, balancing the interests of funders, civic authorities, partners, and community actors.

Continue reading

Positioning: The Battle for Your Mind – A Classic Reframed for the Modern World

A landmark in marketing literature, Positioning reframes the idea of competition. It’s not about having the best product, it’s about owning a distinct place in the customer’s mind. This article explores the book’s key insights, including category creation, mental perception, and naming strategy. It provides actionable advice for professionals seeking clarity in how they present themselves or their brand.

Continue reading

More “Birmingham It’s Not Shit” Bollocks: A Satirical Take on the Former Website’s Optimism

Birmingham: the sprawling metropolis of Spaghetti Junction fame, Brutalist architecture, and canals that definitely outnumber Venice. Once, there was a website called Birmingham It’s Not Shit, a valiant effort to defend the UK’s second city from its critics. With lists of quirky reasons why Birmingham wasn’t as bad as people thought, it tried to elevate the city’s reputation above the perpetual slagging it receives from Londoners, northerners, and basically everyone else.

Continue reading

Innovation Canvas Example 3 – West Midlands Cyber Working Group (WM CWG)

The West Midlands Cyber Working Group (WM CWG) is a collaborative, region-wide forum uniting cyber leaders from business, academia, government, and civil society. It facilitates quarterly convenings, shared strategy development, and joint funding bids to strengthen the regional cyber ecosystem. Operating as an open, grassroots-led group, WM CWG is aligned with DSIT goals, WMCA priorities, and the UK Cyber Strategy. It seeks to drive investment, skills, and coordination through regional initiatives. Here’s an example “innovation Canvas” for the WM CWG.

Continue reading

Stakeholder Grid Example 2: Psyber Inc.

Navigating influence in a new and emerging field like cyber psychology requires clarity, confidence, and strategic alignment. As a startup working at the intersection of AI ethics, human factors, and cybersecurity resilience, Psyber Inc. operates in a diverse and sometimes opaque stakeholder landscape.

Continue reading

Cyber Across European Governments: Key Bodies, Funding, and Coordination

The European cybersecurity landscape is layered, fragmented, and fast-evolving. Unlike the centralised approaches of some governments, the EU’s model of collective sovereignty means cybersecurity is coordinated, rather than controlled by Brussels. National governments still manage their defence and digital sovereignty, but major funding, regulation, and cross-border frameworks increasingly come from the EU level.

Continue reading

Stakeholder Grid Example 1: Cyber Tzar

Understanding your stakeholder landscape is key to scaling effectively, especially in cybersecurity, where trust, standards, and adoption often hinge on who’s in the room. This article explores how Cyber Tzar, a cybersecurity scale-up specialising in supply chain risk and cyber risk scoring, applies the Stakeholder Mapping Grid to guide its strategic engagement.

Continue reading