Rump steak can be deliciously tender when treated right. This guide covers how to prep, season, sear, and rest your steak for maximum flavour and minimal chew.
Continue reading
Rump steak can be deliciously tender when treated right. This guide covers how to prep, season, sear, and rest your steak for maximum flavour and minimal chew.
Continue reading
Blogging is often touted as a straightforward path to online fame, fortune, and influence. The internet is awash with advice claiming that with a few simple steps, anyone can turn their blog into a passive income machine or a platform for global recognition. But behind the polished success stories lies a lot of misinformation, unrealistic expectations, and outright bollocks.
Continue reading
While applying for a parking permit, I discovered an expired SSL certificate on a council website, highlighting how small oversights in public services can expose broader cybersecurity risks. This real-world example shows why organisations must take indirect supply chain risk seriously, particularly in regions critical to national security.
Continue reading
As organisations face increasingly complex and interconnected cybersecurity threats, the ability to measure and communicate risk effectively has become a cornerstone of risk management. Cyber Risk Quantification, the practice of assessing threats in measurable terms, has evolved alongside frameworks and scoring systems aimed at simplifying this process.
Continue reading
Dante’s Inferno presents the Seventh Circle of Hell as the realm of suicides and profligates, those who destroy the self, whether through despair or excess. This article explores the theological, philosophical, and symbolic dimensions of their punishment, revealing a moral economy where the will, once corrupted, leads to irreversible ruin, the ultimate truth: suicide is irredeemable.
Continue reading
As cyber threats continue to evolve in scale, sophistication, and impact, the cyber insurance industry faces increasing pressure to adapt. Traditional approaches to risk assessment, which often relied on qualitative judgments and broad assumptions, are no longer sufficient in the face of complex digital ecosystems. The rise of cyber risk quantification, scoring, and benchmarking has transformed how insurers evaluate risk, price policies, and manage claims.
Continue reading
This article compares my practitioner response, the IET’s institutional submission, and the final Cyber Governance Code of Practice published in April 2025. It shows where our ideas carried through (supply chain oversight, continuous process, assurance), where they were partly adopted (SME proportionality, professional recognition), and where they were ignored (incentives, legal duties). The conclusion: yes, we influenced the Code — but the hardest issues remain unresolved.
Continue reading
Influencer culture has taken over the digital landscape, promising fame, fortune, and free products for anyone with enough followers and a well-curated feed. From Instagram and TikTok to YouTube and beyond, the idea of becoming a full-time influencer is pitched as a dream lifestyle. But behind the filters, brand deals, and viral dances lies a world filled with exploitation, inflated promises, and, yes, bollocks.
Continue reading
Cyber insurance has become a vital component of organisational risk management, offering financial protection against cyber incidents such as data breaches, ransomware attacks, and business interruptions. As the frequency and impact of cyberattacks grow, insurance policies have evolved to address the unique challenges of digital risks.
Continue reading
The UK’s Cyber Governance Code of Practice, published in 2025, sets out five principles for boards: risk management, strategy, people, incident response, and assurance. It places cyber in the boardroom and makes directors personally accountable, but stops short of embedding duties in company law. While clear and structured, the Code lacks incentives, SME pathways, and professional recognition — making uptake uncertain.
Continue reading
Cyber Value at Risk (CVaR) is a powerful methodology adapted from financial Value at Risk (VaR) models, designed to estimate the maximum potential loss from cyber incidents within a given confidence interval. CVaR focuses on worst-case scenarios, helping organisations understand the potential financial consequences of cyber threats and guiding strategic decision-making.
Continue reading
“Digital transformation” is the corporate catchphrase of the decade, hailed as the key to unlocking innovation, agility, and competitiveness. From boardrooms to tech conferences, companies proudly proclaim their digital transformation journeys, often without a clear understanding of what the term actually means.
Continue reading
Romantic relationships between autistic and ADHD individuals are more common than many realise. Shared understanding, complementary traits, and the rise of neurodivergent communities all contribute to these increasingly visible partnerships. This article explores why these pairings work and what they can teach us about connection, communication, and neurodiversity.
Continue reading
The Common Vulnerability Scoring System (CVSS) is a widely used framework for evaluating and communicating the severity of software vulnerabilities. First introduced in 1999, CVSS has become the standard scoring method for organisations to prioritise security efforts and manage vulnerabilities systematically. By assigning numerical scores to vulnerabilities based on their characteristics, CVSS enables teams to assess risks and allocate resources effectively.
Continue reading
Linode has long been a reliable platform for hosting production infrastructure, but frequent changes to the linode-cli are repeatedly breaking SSL certificate renewals via Let’s Encrypt. This article outlines the operational impact, the frustration, and what Akamai/Linode could do to restore developer trust.
The Factor Analysis of Information Risk (FAIR) framework has emerged as a cornerstone in cyber risk quantification, enabling organisations to measure and communicate risk in financial terms. FAIR’s evolution represents a shift from traditional qualitative assessments to a structured, quantitative model that aligns cybersecurity strategies with business objectives. By breaking down risk into probability and impact components, FAIR provides decision-makers with actionable insights to prioritise investments and mitigate threats effectively.
Continue reading
What’s that you say? Thomas Pynchon announces a new book to be released in October 2025? No frigging way, Dude. Will it be multi-episodic, akin to Gravity’s Rainbow? Mason and Dixon, Against the Day? V even? Or more accessible, Inherent Vice, Vineland, or Bleeding Edge? Am I buying a copy? Of course I am.
Continue reading
For me, and for many neurodivergent people, the way we interact with technology isn’t just a matter of preference. It’s about accessibility, functionality, and ease-of-use in a world that too often ignores our needs. People like me who aren’t great at coordination or balance, and who have Autism, ADHD, Asperger’s, or Dyspraxia, struggle to use “simplified” products.
Continue reading
If you’ve followed cybersecurity headlines, you’ve probably heard about the “skills gap.” The narrative goes like this: organisations are under constant attack from cybercriminals, but there just aren’t enough qualified professionals to protect them. This shortage, we’re told, is a dire crisis threatening businesses and governments alike.
Continue reading
Plato famously (and controversially) argued that all democracies inevitably collapse into tyranny. For a modern reader, raised on ideals of popular sovereignty, civil rights, and universal suffrage, this sounds alarmist or even offensive. But to dismiss Plato’s warning outright would be to miss a deeper meditation on the fragility of political systems and human nature itself.
Continue reading