The weekends news has been full of the doom-mongers gurning at the AI boom or should we call it a bubble? Which got me thinkng, we have been here before have we not? When inflated expectations, fuelled by investor FOMO (Fear of Missing Out), surge to irrational heights before the inevitable correction. Then comes the […]
September 26, 2025
In cybersecurity and technology governance, we spend endless hours dissecting frameworks, controls and certifications. We argue over Zero Trust architectures, resilience models and assurance seals. Yet there is a much deeper, more uncomfortable layer to the story, one that no encryption algorithm or multi-factor authentication or audit can patch or detect. Our digital trust is […]
September 24, 2025
“The future arrives not with a whisper, but with an echo of mistakes we chose not to imagine.“ A storm is gathering in the world’s supply chains. Its name is Agentic AI (Artificial Intelligence). These autonomous systems, tasked with sourcing, negotiating, routing and optimising without human pause, are being heralded as the next great leap […]
August 31, 2025
The trust theme in my last blog got me thinking about the pedestal Artificial Intelligence (AI) is being placed on. When Alan Turing proposed his famous Imitation Game in 1950, he asked a deceptively simple question, paraphrased as – “If a machine’s responses are indistinguishable from a human’s, should we call it intelligent?” For decades, […]
August 13, 2025
For a party that insists it is on the side of the people, the current UK Labour government shows an increasingly uncomfortable tendency to treat privacy and personal freedom as optional extras, privileges to be granted when convenient, rather than rights to be protected. Recent policy moves reveal a temperament that blends centralised control with […]
August 6, 2025
Not for the first time, I have finished reading a report and instead of remembering the message, I am left wondering which AI model wrote it. Fifteen minutes of polished nothing. Like being served a three-course meal made entirely of rice cakes, technically food, but utterly forgettable and lacking any nutritional value for the effort. […]
July 29, 2025
How to Lose a Generation (and Your Cyber Credibility) … In a move that truly showcases the digital finesse of a damp teabag, Parliament has blessed us with the UK Online Safety Act 2023, yet another stroke of cyber brilliance, mandatory age verification on adult websites. Because nothing screams ‘we understand the internet’ like a […]
July 26, 2025
Because who needs actuarial models when panic will do? In their paper Fear, Not Risk, Explains Asset Pricing (May 2025), Rob Arnott and Edward McQuarrie upend a core assumption of financial theory, that risk and reward are tightly linked. Their data shows otherwise, reward often correlates weakly, or not at all, with conventional measures like […]
June 27, 2025
For many organisations, investing in a new or upgraded Security Information and Event Management (SIEM) platform feels like a milestone, an architectural cornerstone in the cybersecurity journey. The logic is sound, greater visibility, faster incident detection and centralised control. But while SIEM solutions have matured significantly, too many implementations still fall short of expectations and […]
June 26, 2025
In this missive I’m addressing the digital economy’s elephant in the room, an idea sparked in conversation with a few esteemed colleagues (you know who you are 😉). It got me thinking, most of what’s being packaged as ‘cyber risk’ today is more traditional business risk with a flashy makeover. It’s fraud, theft, sabotage, espionage, […]
June 18, 2025
In a world saturated with phishing simulations and tired security awareness slideshows, is your cyber awareness program really up to muster? Let me walk you through a Red Team scenario that takes the human attack surface cyber threat to a whole new level by orchestrating a symphony of Artificial Intelligence (AI ) agents to perform […]
May 19, 2025
You meant to toggle the flag … really. It was right there in the config file, a simple true/false, just one switch between stability and potential disaster. It starts with just one. You meant to click it. You thought about it. But it was the end of a long day and your coffee had turned […]
March 8, 2025
In an era where cyber threats evolve faster than our ability to compute solutions, resilience, not perfection, is the key to effective cybersecurity and acceptance that computational complexity is growing beyond human and machine limits. Cyber threat prevention is often framed as a problem of optimization, one where defenders strive to impose control over chaotic […]
January 12, 2025
Some time ago I wrote about the challenges (AI Regulation – Like Platting Fog!) The West has with Artificial Intelligence (AI) development with its greater respect for privacy and more robust regulatory data governance versus China for example. AI Regulation – Like Platting Fog! | Nigel Gibbons ~ Welcomes you This should not be misinterpreted as […]
November 17, 2024
Cybersecurity maturity models like NIST CSF, ISO 27001, CIS Controls etc have become industry staples. These frameworks provide a valuable blueprint for control implementation, audit readiness, and benchmarking progress. But they’re also inherently static and checklist-driven, an approach that often lags behind the real-time, evolving and dynamic nature of today’s threat landscape. By contrast, the […]
October 12, 2025
2