Keeping my knowledge in cyber and technology up to date

Recently, someone asked me how I keep my skills and knowledge up to date in cyber security and technology. So I created this blog post for now.

Recently, someone asked me how I keep my skills and knowledge up to date in cyber security and technology. So I created this blog post for now.

This article originally appeared in the Computer Weekly: https://www.computerweekly.com/opinion/The-three-cyber-trends-that-will-define-2026
We are staring down the barrel of 2026. If you think the last twelve months were chaotic, strap in.
The "business as usual" model for security is dead. We are moving into an era where the CISO is either a financial risk broker or irrelevant, where AI doesn't just write emails but writes exploits, and where your right to privacy is being legislated out of existence.
Here is my take on the three trends that will define the next year.

This article originally appeared in the Computer Weekly https://www.computerweekly.com/opinion/In-cyber-security-basics-matter-even-in-2025
What a year 2025 has been: Rich in both cyber events and innovations alike. On the latter, not a week has passed without a mention of innovation in Artificial Intelligence (AI). I am excited about the innovative ways AI is going to be used to benefit our society; perhaps this is the 4th Industrial Revolution coming. The level of useful innovation in cyber security, despite some questionable claims by certain vendors, will increase in 2026 with new products and services.
To gain sufficient value from these innovations, however, we need to implement the basic controls well first. Whether we measure this against UK Cyber Essentials or CIS Critical Cyber Controls, the reality remains the same: cyber incidents are still mostly “enabled” by organisations neglecting these basics.
In my previous article The End of Active Directory: Why Your Cybersecurity Strategy Demands Entra ID Now I wrote about the inherent incompatibility of Active Directory with modern enterprise security architectures and cloud strategies.

Originally published on LinkedIn

A startling security vulnerability in a recruitment platform used by McDonald's has potentially exposed the personal data of up to 64 million job applicants. The incident serves as a powerful reminder of a risk that has plagued the technology sector for decades: the supply chain. I question whether McDonald's had even done a thorough cybersecurity due diligence when contracting with Paradox.
I also note, while the platform in question uses artificial intelligence, the critical error was deeply human and not a failure of AI at all.

On 24 May 2025, Owanate Bestman joined me for what turned out to be a really insightful conversation about the evolving CISO landscape in the UK.

In a historic shift for the digital economy, Apple is being forced by courts and regulators in both the United States and Europe to allow app developers to use any payment method for their apps and in-app purchases-without Apple’s customary commission or fees. While these rulings are set to unleash a wave of fintech innovation and competition, they also introduce new cybersecurity risks that could impact millions of users worldwide. This article explores the legal battles, the global regulatory landscape, the opportunities for fintech, and the security challenges that lie ahead.
Right, let's have a honest discussion about Microsoft Active Directory. For ages, it’s been the bedrock of how most businesses handle logins and access – the familiar, reliable workhorse humming away in the server room. It did its job, absolutely.
But here’s the rub: the world it was built for vanished years ago. Is it appropriate to keep clinging to legacy technology foundations as your main line of identity defence in today's world? Frankly, that’s looking increasingly like bringing a knife to a gunfight.

Date: 4 Apr 2025
I had an engaging discussion with David Gadd about the misunderstanding of the CISO role. (Be interested in your views whether you think the CISO role is fully understood and if it isn't, why not! Comment in the LinkedIn post below ⬇️)
![]()
Yesterday, 24th February 2025, I received the heartbreaking news that one of the cybersecurity vendors I had worked with since 2006, Skybox Security, has closed its doors.
The announcement came as a shock, first shared with employees on a call and later communicated to channel partners via email. Skybox Security was once a visionary company, yet it has now faced an unfortunate end.
My thoughts are with all the former employees whose lives have been suddenly disrupted. I sincerely wish them strength and resilience in navigating this transition and finding new opportunities that match their talents and expertise.
Let’s take a moment to reflect on Skybox Security’s journey and the lessons to be learned.