Tag Archives: cyber policy

The Quiet Power Players of UK Cybersecurity: Who Really Shapes the Agenda?

Behind the acronyms and front-facing roles lies a network of advisors, committees, and convenors quietly setting the pace for cyber strategy in Britain. When we talk about power in UK cybersecurity, we often mention the big institutions… NCSC, DSIT, UK Cyber Security Council, or heavyweight companies like BT, BAE Systems, and Microsoft. But step closer and a more nuanced picture emerges: one shaped less by job titles and more by trust, networks, and proximity to policy formation. This article explores the real power players… not always in the spotlight, but instrumental in influencing policy, procurement, public guidance, and funding flows. These are the advisors, secondments, committee members, and convenors who quietly shape the UK’s cyber agenda.

Continue reading

Cyber and Academia Worldwide: Where Research Meets Real-World Impact

From Singapore to São Paulo, academic institutions are becoming key players in the global cybersecurity landscape. While the US, UK, and EU often dominate discussions of academic cybersecurity, universities and research institutions across Asia, Africa, Latin America, and Oceania are rapidly gaining ground, shaping national policy, developing sovereign cyber capabilities, and launching novel technologies tailored to regional challenges. This article explores how academia across the world is influencing cybersecurity practice, producing talent, and collaborating across borders to tackle today’s most pressing digital threats.

Continue reading

Reviewing the 2025 DSIT Code of Practice for Enterprise Connected Device Security: A Critical and Constructive Analysis

This article provides a comprehensive analysis of the UK Government’s proposed 2025 Code of Practice for Enterprise Connected Device Security, published by the Department for Science, Innovation and Technology (DSIT). It unpacks the structure, rationale, and policy intent behind the Code, outlines its 11 lifecycle-aware security principles, and evaluates its strengths and limitations. Drawing on lessons from the earlier NCSC Cyber Resilience Testing (CRT) programme, it offers a set of practical, actionable recommendations to improve uptake, scalability, and long-term impact. This is a roadmap for policymakers, manufacturers, and enterprise buyers navigating the emerging landscape of connected device security in organisational settings.

Continue reading

Cyber and Academia in the US: Ivy League Labs to Federal Research Programmes

In the United States, academic institutions are deeply embedded in the architecture of national cybersecurity. Universities and colleges serve as research engines, policy advisors, workforce pipelines, and launchpads for venture-backed startups. From federally funded research to deep partnerships with DARPA, NIST, and the Department of Defense, U.S. academia drives both innovation and influence in cybersecurity.

Continue reading

Cyber and Academia in Europe: Horizon Projects, Hubs, and Collaboration

Europe’s cybersecurity academic landscape is distributed, multi-lingual, and deeply integrated into public policy and industrial ecosystems. With powerful funding mechanisms like Horizon Europe, a strong regulatory backdrop (e.g. NIS2, Cyber Resilience Act), and a rising number of EU-funded collaborative hubs, academia in Europe isn’t just producing talent and research, it’s driving long-term cyber resilience at national and EU levels.

Continue reading

Cyber and Academia in the UK: Research Centres, Spinouts, and Influence

The UK’s academic institutions play a foundational role in shaping the country’s cybersecurity ecosystem. They don’t just educate the workforce, they produce world-class research, support government policy, commercialise IP into high-growth spinouts, and influence standards through international collaboration.

Continue reading

Global Cyber Powerhouses: The Leading Vendors and What They Offer

Cybersecurity is a global industry, but it’s also a geopolitical one. The vendors featured in this guide are not just tech companies. They’re often strategic assets, embedded in national security frameworks, powering defence alliances, and influencing cyber norms across continents.

Continue reading

The US Cyber Giants: Vendors, Solutions, and Federal Reach

The United States is home to the most powerful cybersecurity vendors on the planet. These companies don’t just sell products, they influence standards, embed themselves in national security supply chains, and shape global policy through their scale, threat intelligence, and lobbying power.

Continue reading

A Brief History of the Term Cyber (Meaning Cybersecurity)

This article explores how the word cyber evolved from its academic roots in cybernetics to its current role as shorthand for cybersecurity. It traces the rise of cyberpunk fiction, the growing association with digital threats in the 1990s, and how UK policy frameworks adopted and institutionalised the term, culminating in the creation of the National Cyber Security Centre (NCSC). From Greek etymology to modern geopolitics, cyber has shifted from describing control to denoting risk.

Continue reading

Top Cybersecurity Firms and Services Shaping Europe’s Digital Defence

Cybersecurity in Europe is evolving quickly, driven by growing regulation (NIS2, Cyber Resilience Act), state-sponsored threats, and accelerating digital transformation. The result is a dynamic and diverse vendor landscape: large integrators defending entire ministries, regional champions supporting SMEs, and specialised firms leading in OT, AI security, and cyber risk quantification.

Continue reading

Cyber Resilience Testing and Facilities: Mapping, Critique, and the Path Forward

Between February and March 2025, I analysed the UK’s Cyber Resilience Testing (CRT) initiative and its associated Cyber Resilience Test Facilities (CRTFs). From that research, I developed three articles: one mapping the global standards landscape, one examining CRT’s practical challenges, and one exploring its role as a trust label. Together, they present CRT as a promising but evolving approach: not yet a standard, but under active NCSC development and consultation, with the potential to reshape product-based assurance if given clarity, support, and ecosystem alignment.

Continue reading

Major Cyber Vendors and Service Providers in the UK

The UK’s cybersecurity sector is home to thousands of providers, ranging from nimble startups and regional MSSPs to global consulting firms and homegrown risk intelligence platforms. While the National Cyber Security Centre (NCSC) sets the tone for policy and technical guidance, it’s these vendors that translate strategy into services: monitoring networks, managing risk, conducting audits, and responding to breaches in real time.

Continue reading

Trust, Labels, and the Path to Meaningful Security: Rethinking CRT Adoption in the UK

This article critically examines the UK’s Cyber Resilience Test (CRT) as a cybersecurity labelling initiative aimed at building consumer trust in connected devices. While affirming CRT’s importance, it highlights the need for clearer value propositions, stakeholder alignment, and behavioural insights to ensure meaningful adoption. Drawing on global examples like Singapore’s CLS and the EU’s CE mark, it argues that CRT must evolve from a technical standard to a culturally embedded trust signal. The piece advocates for a dynamic playbook that supports SMEs, educates consumers, aligns with procurement policy, and adapts over time — turning CRT into a living, ecosystem-wide standard.

Continue reading

The Future of Cyber Resilience Testing: Reflections on a Scheme in Transition

This blog article offers a critical yet constructive reflection on the UK’s Cyber Resilience Testing (CRT) initiative. While CRT is conceptually sound and timely, significant questions remain around cost, demand, usability, policy intent, and delivery responsibility. The article explores whether CRT is positioned to become a meaningful standard or risks being sidelined as another voluntary layer. It advocates for clearer articulation of purpose, audience targeting, and strategic alignment to unlock CRT’s full potential.

Continue reading

Cyber Across Global Governments: International Cooperation and National Strategies

Cybersecurity has become a pillar of national security, digital economy growth, and global diplomacy. From ransomware attacks on hospitals to interference in democratic elections, governments worldwide now treat cyber threats as matters of statecraft, not just IT hygiene. While national strategies differ, a few shared patterns have emerged: defence of critical infrastructure, capacity building, and international coordination.

Continue reading

Cyber Across US Government: Agencies, Frameworks, and Innovation Pathways

The United States is arguably the most influential force in global cybersecurity, but its governance model is sprawling, federal, and often opaque to outsiders. Responsibility is distributed across military, civilian, and intelligence agencies, each with their own authorities, funding mechanisms, and strategic priorities.

Continue reading

Cyber Across European Governments: Key Bodies, Funding, and Coordination

The European cybersecurity landscape is layered, fragmented, and fast-evolving. Unlike the centralised approaches of some governments, the EU’s model of collective sovereignty means cybersecurity is coordinated, rather than controlled by Brussels. National governments still manage their defence and digital sovereignty, but major funding, regulation, and cross-border frameworks increasingly come from the EU level.

Continue reading

Cyber Across UK Government: Departments, Programmes, and Policy Players

The definitive guide to who shapes cyber policy in Whitehall, and how to work with them.

Continue reading

Inside the UK Cyber Ecosystem: A Strategic Guide in 26 Parts

An extensive guide mapping the networks, policy engines, commercial power bases, and future-shapers of British cybersecurity.

Continue reading

The Insider’s Guide to Influencing Senior Tech and Cybersecurity Leaders in the UK

Influencing senior leaders in cybersecurity and technology is no small task, especially in the UK, where credibility, networks, and standards carry immense weight. Whether you’re a startup founder, a scale-up CISO, or a policy influencer, knowing where the key conversations happen (and who shapes them) can make the difference between being heard and being ignored.

Continue reading