The risks and strategies of using privacy as a differentiator - comment - ITPro, Dec 2021
Attackers Rely on 'Exotic' Languages for Malware Creation - comment - InfoRiskToday, July 2021
How To Kill The Password: Does the Mitre ATT&CK Framework Help or Hinder? - guest blog, Hypr, July 2021
Is China's 'Cyber Capacity' Really 10 Years Behind the US? - comment, DataBreach Today, July 2021
CIAM Success and Identity Fabrics - guest blog, KC Live Fabrics Conference, Feb 2021
Digital Identity for Modern Enterprise - guest blog, techUK Edge Campaign, May 2020
Will the new UK Data Protection Bill reduce Brexit uncertainty? - article - Information Age, August 2017
Why a Data Privacy Officer isn’t the solution for GDPR - article - IT Pro Portal, July 2017
Life-or-death decisions: How do we safeguard healthcare IoT? - article - IoT Agenda, July 2017
A closer look at IoT 2.0 security - comment - Tech Radar, May, 2017
Data breaches strip tens of millions off UK firms’ market value, study shows - comment - Computer Weekly, April, 2017
A truly strategic approach to security has never been more business critical - article - IT Pro Portal, April 2017
One Solution to Digital Retail Dilemmas - article - IoT Insights, April 2017
Data Privacy Day 2017 - comment - SC Magazine, January, 2017
Executive Viewpoint 2017 Prediction - Virtual Strategy Magazine, January, 2017
Mirai IoT botnet blamed for 'smashing Liberia off the internet' - comment - The Register, November 2016
GDPR's global reach to require at least 75,000 DPOs worldwide - comment - SC Magazine, November 2016omputer Weekly, October 2016
Interview: Are online passwords dead? - IT Pro Portal, October 2016
Dyn DDoS attack highlights vulnerability of global internet infrastructure - comment - Computer Weekly, October 2016
Record Rambler Breach Highlights Password Flaws - comment - Infosecurity Magazine, September 2016
Do IoT devices need a kill switch? - interview - Rethink-IOT Magazine, August 2016
Will the IoT kill off passwords? - interview - IoT Magazine, August 2016
BMW web portal vulns pose car hack risk – researchers - comment - The Register, July 2016
Mitsubishi Outlander hack: Industry reaction - IT Pro Portal, June 2016
Companies should NOT force customers to keep changing their passwords - GCHQ - comment - Information Age, May 2016
Is Identity Critical to Make Smart Cities Safe? - TechRadar Pro, April 2016
Interview with The Telegraph's Business Reporter on Digital Identity - Business Reporter, April 2016
Does IoT Security Still Have Further To Go? - IT Pro Portal, April 2016
Connected Car Security: why identity should be in the driving seat - Information Age, March 2016
Embracing the Digital Revolution - 5 Key Pillars of Transformation - BDaily, February 2016
5 tech reactions to the EU Data Protection Regulation - Computer Business Review, Dec 2015
Open Source: Security through transparency for IoT platforms - IoT Now Magazone, Dec 2015
Future smart things to be cooperative, emotional and lucrative - Wireless Magazine, Nov 2015
Securing the IoT is a big challenge... but how do we do it on a city scale - Information Age, Oct 2015
Back to the Future: The reality of the film's technical predictions in 2015 - Computer Business Review, Oct 2015
IoT Security Foundation aims to secure Internet of Things - SC Magazine, Sept 2015
Handling Privacy and Security Concerns in the IoT: The Importance of Identity - EDN Network Magazine, July 2015
Events That Defined the European Infosec Landscape - Help Net Security Magazine, Jan 2013
Do You Need a CISO? - Computer Weekly, Oct 2012
User Convenience versus Security - Microsoft Technet Medium Business Blog, Oct 2012