Introduction, and the source of the uncomfortable truth This week, I have been revisiting the IBM Institute for Business Value research, Secure by design, smarter with AI. One finding should make every leadership team pause: 42 percent of executives rank their own operational shortcomings among their top cybersecurity threats, ahead of nation states and just... Continue Reading →
Europe’s Risk-Based Security Regulations: Strategic Implications for Critical Infrastructure
The regulatory landscape in Europe is shifting rapidly, particularly as it relates to the security of critical infrastructure. I have observed a marked evolution from prescriptive compliance towards risk-based frameworks, with the introduction of NIS2 and DORA setting new expectations for technology leaders and CISOs. Freddy Dezeure’s recent analysis highlights the strategic challenges facing organisations... Continue Reading →
Shadow AI, Soaring Costs, and the Governance Gap: What the 2025 Data Breach Report Tells Us
I’ve just finished reading the latest IBM Cost of a Data Breach Report for 2025, and I’ll be honest—it’s one of the most eye-opening editions I’ve seen in years. Not just because the global average cost of a breach has finally dipped (down to $4.44M), but because of what’s driving that change—and what’s threatening to... Continue Reading →
Understanding Zero Trust in the Microsoft Cloud: Part 1
Zero-Trust is a fascinating topic, and looking back at some of the statistics behind this blog and the related YouTube channel, it is not only me who is interested in this subject matter. However, I realised that most of the content I have created on this subject was aimed at people who, at a minimum, had a basic knowledge of what Zero Trust is and why it is an essential element in most organisations’ cyber security strategy. As a result, I decided to create a series of posts (and possibly a video) starting from the beginning, i.e., what zero trust is, its benefits, and some considerations.