Browsing All posts tagged under »ai«

Is The AI Boom just the Birth of New Infrastructure?

October 12, 2025

2

The weekends news has been full of the doom-mongers gurning at the AI boom or should we call it a bubble? Which got me thinkng, we have been here before have we not? When inflated expectations, fuelled by investor FOMO (Fear of Missing Out), surge to irrational heights before the inevitable correction. Then comes the […]

Fragile by Design – How Social Paralysis Weakens Digital Trust

September 26, 2025

0

In cybersecurity and technology governance, we spend endless hours dissecting frameworks, controls and certifications. We argue over Zero Trust architectures, resilience models and assurance seals. Yet there is a much deeper, more uncomfortable layer to the story, one that no encryption algorithm or multi-factor authentication or audit can patch or detect. Our digital trust is […]

Is Agentic AI the sharpest of double-edged swords?

September 24, 2025

1

“The future arrives not with a whisper, but with an echo of mistakes we chose not to imagine.“ A storm is gathering in the world’s supply chains. Its name is Agentic AI (Artificial Intelligence). These autonomous systems, tasked with sourcing, negotiating, routing and optimising without human pause, are being heralded as the next great leap […]

From Imitation to Trust, A New Benchmark for AI

August 31, 2025

0

The trust theme in my last blog got me thinking about the pedestal Artificial Intelligence (AI) is being placed on. When Alan Turing proposed his famous Imitation Game in 1950, he asked a deceptively simple question, paraphrased as – “If a machine’s responses are indistinguishable from a human’s, should we call it intelligent?” For decades, […]

Facial Recognition, Because Freedom Looks Better in Handcuffs

August 13, 2025

0

For a party that insists it is on the side of the people, the current UK Labour government shows an increasingly uncomfortable tendency to treat privacy and personal freedom as optional extras, privileges to be granted when convenient, rather than rights to be protected. Recent policy moves reveal a temperament that blends centralised control with […]

The Journey Matters, AI Wouldn’t Know, It Doesn’t Travel

August 6, 2025

1

Not for the first time, I have finished reading a report and instead of remembering the message, I am left wondering which AI model wrote it. Fifteen minutes of polished nothing. Like being served a three-course meal made entirely of rice cakes, technically food, but utterly forgettable and lacking any nutritional value for the effort. […]

Age-Gate or Farce-Gate?

July 29, 2025

1

How to Lose a Generation (and Your Cyber Credibility) … In a move that truly showcases the digital finesse of a damp teabag, Parliament has blessed us with the UK Online Safety Act 2023, yet another stroke of cyber brilliance, mandatory age verification on adult websites. Because nothing screams ‘we understand the internet’ like a […]

Where Fear Trumps Firewalls & FOMO Writes Your Security Strategy

July 26, 2025

2

Because who needs actuarial models when panic will do? In their paper Fear, Not Risk, Explains Asset Pricing (May 2025), Rob Arnott and Edward McQuarrie upend a core assumption of financial theory, that risk and reward are tightly linked. Their data shows otherwise, reward often correlates weakly, or not at all, with conventional measures like […]

Why Good Planning Beats Shiny Tech Every Time

June 27, 2025

0

For many organisations, investing in a new or upgraded Security Information and Event Management (SIEM) platform feels like a milestone, an architectural cornerstone in the cybersecurity journey. The logic is sound,  greater visibility, faster incident detection and centralised control. But while SIEM solutions have matured significantly, too many implementations still fall short of expectations and […]

Is Cyber Just Old School Risk in a Fancy Hoodie?

June 26, 2025

0

In this missive I’m addressing the digital economy’s elephant in the room, an idea sparked in conversation with a few esteemed colleagues (you know who you are 😉). It got me thinking, most of what’s being packaged as ‘cyber risk’ today is more traditional business risk with a flashy makeover. It’s fraud, theft, sabotage, espionage,  […]

A Very Real Breach Symphony

June 18, 2025

1

In a world saturated with phishing simulations and tired security awareness slideshows, is your cyber awareness program really up to muster? Let me walk you through a Red Team scenario that takes the human attack surface cyber threat to a whole new level by orchestrating a symphony of Artificial Intelligence (AI ) agents to perform […]

How One Missed Config Can Cause Chaos

May 19, 2025

0

You meant to toggle the flag … really. It was right there in the config file, a simple true/false, just one switch between stability and potential disaster. It starts with just one. You meant to click it. You thought about it. But it was the end of a long day and your coffee had turned […]

Is Cybersecurity Complexity a win for Growth Agenda’s?

March 8, 2025

0

In an era where cyber threats evolve faster than our ability to compute solutions, resilience, not perfection, is the key to effective cybersecurity and acceptance that computational complexity is growing beyond human and machine limits. Cyber threat prevention is often framed as a problem of optimization, one where defenders strive to impose control over chaotic […]

The AI High Wire Act – Balancing Innovation, Data Access & Ethical Responsibility

January 12, 2025

0

Some time ago I wrote about the challenges (AI Regulation – Like Platting Fog!) The West has with Artificial Intelligence (AI) development with its greater respect for privacy and more robust regulatory data governance versus China for example. AI Regulation – Like Platting Fog! | Nigel Gibbons ~ Welcomes you This should not be misinterpreted as […]

Breaking Cybersecurity Bottlenecks

November 17, 2024

0

Cybersecurity maturity models like NIST CSF, ISO 27001, CIS Controls etc have become industry staples. These frameworks provide a valuable blueprint for control implementation, audit readiness, and benchmarking progress. But they’re also inherently static and checklist-driven, an approach that often lags behind the real-time, evolving and dynamic nature of today’s threat landscape. By contrast, the […]