Media Articles & Comment

The risks and strategies of using privacy as a differentiator - comment - ITPro, Dec 2021

Attackers Rely on 'Exotic' Languages for Malware Creation - comment - InfoRiskToday, July 2021

How To Kill The Password: Does the Mitre ATT&CK Framework Help or Hinder? - guest blog, Hypr, July 2021

Is China's 'Cyber Capacity' Really 10 Years Behind the US? - comment, DataBreach Today, July 2021

CIAM Success and Identity Fabrics - guest blog, KC Live Fabrics Conference, Feb 2021

Digital Identity for Modern Enterprise - guest blog, techUK Edge Campaign, May 2020

Will the new UK Data Protection Bill reduce Brexit uncertainty? - article - Information Age, August 2017


Why a Data Privacy Officer isn’t the solution for GDPR - article - IT Pro Portal, July 2017 


Life-or-death decisions: How do we safeguard healthcare IoT? - article - IoT Agenda, July 2017


A closer look at IoT 2.0 security - comment - Tech Radar, May, 2017


Data breaches strip tens of millions off UK firms’ market value, study shows - comment - Computer Weekly, April, 2017


A truly strategic approach to security has never been more business critical - article - IT Pro Portal, April 2017


One Solution to Digital Retail Dilemmas - article - IoT Insights, April 2017


Data Privacy Day 2017 - comment - SC Magazine, January, 2017