In the aftermath of a cybersecurity breach, technical recovery tends to dominate leadership attention. Containment is actioned. Systems are scanned. Logs are reviewed. But beyond the perimeter of operational response, a more subtle shift takes place—one that lingers in meetings, Slack threads, and hallway conversations. Narratives begin to form. These narratives—about who was responsible, what…
Month: March 2025
Post-Breach Psychology, Part 1: Access Aftermath
Understanding the subtle behavioural consequences of identity lockdown In the immediate aftermath of a cybersecurity breach, the organisational response tends to follow a well-rehearsed script. Incident response teams isolate the threat. Logs are analysed. Communications are drafted. And almost without fail, one area receives immediate tightening: access. Identity and Access Management (IAM) controls are reconfigured….
Cyber Calling: The Regional Momentum of UK Cyber & the Human Factor in Resilience
Cybersecurity Is No Longer Just a London Game. For years, London has dominated the UK cyber conversation, attracting investment, talent, and policy influence. But the momentum is shifting—and fast. The West Midlands is emerging as a major cyber powerhouse, with funding, policy backing, and industry engagement moving beyond the capital into the regions where cybersecurity…
Psyber Mondays: NCSC for Startups Ends, But Cyber Innovation Continues
Reflections from the very last #NCSCForStartups Alumni Showcase. Celebrating the Legacy of NCSC for Startups Two weeks ago, I had the privilege of attending the final #NCSCForStartups Alumni Showcase—a moment to celebrate the impact of an initiative that has shaped the UK’s cybersecurity startup ecosystem for years. NCSC for Startups has been a game-changer,…
Women in Cyber: The Strength You Don’t See Coming (Women’s Day Special)
Cybersecurity has always been seen as a battlefield of technical defences—firewalls, encryption, AI-driven threat detection. But what if the real strength in cybersecurity isn’t just in the technology, but in the people behind it? And what if some of the most impactful contributions are coming from a group that’s still widely underestimated? Women in cybersecurity…