Most security teams are busy. That's a given. There is always another project, audit or incident competing for attention. In that environment, it is dangerously easy to confuse activity with impact. Everyone is working hard, but it is not always clear whether the organisation is genuinely safer or simply more exhausted. A high‑impact security team … Continue reading From Firefighting to Forward‑Looking: Building a High‑Impact Security Team
Tag: Security
Why Representation Matters in STEM Careers
Let's talk about people. Much of the conversation around cyber security and STEM focuses on technical controls, tooling, frameworks and policies. These discussions are necessary, they form the backbone of effective security and innovation. But they are not the whole picture. For this post, I will be stepping away from technology and process and discussion … Continue reading Why Representation Matters in STEM Careers
When Shared Responsibility Means No Responsibility
Modern security environments are built on shared responsibility. Cloud providers, third-parties, internal teams, and business leaders all play a role in managing risk. In theory, this model enables scale and flexibility. In practice, it often creates gaps. Many security failures are not caused by a lack of controls or awareness, but by uncertainty over who … Continue reading When Shared Responsibility Means No Responsibility
Cloud Resilience Lessons from 2025 Outages
The events of 2025 have challenged long-held assumptions about cloud resilience. Many organisations have implemented widely accepted best practices, multi-availability zone architectures, multi-region deployments, and cloud-native backup solutions, yet still experienced prolonged disruption. In each case, the underlying issue was not a failure of compute or storage. Instead, failures occurred in control-plane services such as … Continue reading Cloud Resilience Lessons from 2025 Outages
Understanding Modern Threat Actors: Perspectives & Strategies
Threat actors are not a single, uniform group. They range from financially motivated gangs to state-linked operators and loosely structured criminal ecosystems, each with different objectives and levels of sophistication. Understanding a few prominent examples can assist teams in thinking more clearly about how attackers operate. This helps identify where defences are likely to be … Continue reading Understanding Modern Threat Actors: Perspectives & Strategies
Transforming Security: From Blocker to Business Enabler
Security teams are often seen as the function that slows work down, adds extra steps, or blocks ideas at the last minute. That perception does not just impact team relationships; it directly affect how early people involve security and how willing they are to act on advice. Shifting security from "blocker" to "business enabler" is … Continue reading Transforming Security: From Blocker to Business Enabler
Enhancing Incident Response Through Effective Communication
When a security incident occurs, technical response often becomes the immediate focus - isolating systems, analysing logs, restoring services. However, the effectiveness of an incident response also depends on how well teams communicate under time pressure and uncertainty. Clear, structured communication helps people understand priorities, coordinate activity, and avoidable delays. Communication will not remove risk … Continue reading Enhancing Incident Response Through Effective Communication
40M Voters Exposed: Security Lessons from a Major Breach
Over the next 12 days, this mini-series will share short, real-world security lessons from recent incidents, and industry trends. Each post will focus on a single topic, highlight what happened, and outline practical steps organisations can take to reduce risk. The aim is to provide short, accessible insights that reflect how security challenges are unfolding … Continue reading 40M Voters Exposed: Security Lessons from a Major Breach
JLR Cyberattack: Lessons from a Major Manufacturing Crisis
Jaguar Land Rover (JLR), one of the UK's most iconic car manufacturers, suffered a crippling cyber attack in late August 2025. This incident halted production, crippled its supply chain, and cost tens of millions of pounds per week. The attack highlights the vulnerability of modern manufacturing networks, especially as they become more digital and interconnected. … Continue reading JLR Cyberattack: Lessons from a Major Manufacturing Crisis
AI-Enhanced Phishing: New Challenges for Cybersecurity
With the rise of AI, phishing scams have evolved from obvious traps to highly sophisticated communications that blend seamlessly into inboxes. Attackers utilise large language models, voice cloning, and deepfakes, making phishing more difficult to detect. To combat these threats, companies must enhance technical controls, provide awareness training, and establish verification protocols.









