Blog Full Width

Video production and the self-shoot producer

This is a slightly different post. Instead of listing upcoming commissions, I’ll be looking at the role of the video producer. Most readers will know that I work as a presenter and moderator as well as a journalist. But for video, I also take on shoot-edit shifts and assignments and commissions as a self-shoot producer. Read More

Read More »

Upcoming commission: Computer Weekly article on cloud backup

For Computer Weekly magazine, I am writing an article on Cloud-to-Cloud backup. This is aimed at a business to business audience. The main areas the piece will cover are: What is cloud-to-cloud backup? How has cloud-to-cloud backup evolved? What are the key features of cloud-to-cloud backup? What are the benefits of cloud-to-cloud backup? What are Read More

Read More »

Upcoming commission: WannaCry article

I am writing a news analysis on the WannaCry ransomware for Infosecurity Magazine. There has been an unprecedented amount of press around WannaCry already, so we want to dig a little deeper. In particular we want to cover: • How this attack happened (the technical details) • The fundamental issues that have come to light Read More

Read More »

Update on BVE content: last request for comment

Thanks to everyone who has provided comment for the articles I’m writing for BVE. The majority of the copy has now been filed. But I’m still looking or input or interviews on the last few pieces, below: You can contact me via this link in the first instance, but I need any contributions by 1700 Read More

Read More »

Upcoming work: articles for BVE broadcast show, Feb 2017

Over the next few weeks I am writing a series of articles for the BVE Show, which takes place at the end of February at Excel. The outlines are below, please feel free to submit comment to me directly (if commenting for more than one piece, please indicate the article(s) in your response.) You can Read More

Read More »

Speaking opportunity: Infosecurity Magazine webinar, 23 Feb 2017

I’m looking for one or two vendor-independent speakers to join this webinar, on Feb 23 at 1500 GMT: Hyper-Realistic Simulation – the New Approach to Cybersecurity Training The global cybersecurity market is short of one million people, which will grow to six million in three years. With threats growing in volume and sophistication, nearly every Read More

Read More »

Upcoming article: Buying a business to disrupt a market

For my series for Virgin Media Business, I’m doing one final piece this year on the theme of disruption. Buying a business to disrupt a market The feature will examine how acquiring disruptive businesses is one way established firms can themselves become disruptors, and indeed secure their survival. The focus is how acquiring a business Read More

Read More »

Updated: Speaking opportunities: Infosecurity Magazine, December 2016

Update: I have added two further sessions where we are looking for speakers. Audience is shown for each. Once again, speakers can be academics, consultants, analysts or CIOs and CISOs (but not, sadly, security technology vendors). 6 DEC 2016, 13:00 EST, 10:00 PST A Million Analysts Won’t Save Your SOC: The Future of Security Operations Read More

Read More »

Upcoming feature: Intrapreneurism – looking for expert input

For a microsite being developed by Virgin Media Business, I’m writing a feature on “intrapreneurism”. We’ll look at intrapreneurism and the roll it plays in shaping successful, disruptive companies that thrive in the dynamic world of modern business. We’ll set out to explain what intrapreneurism is and how it differs from entrepreneurism is, companies known Read More

Read More »

Infosecurity speaking opportunities, November 2016

I am moderating two webinars for Infosecurity Magazine in November 2016. The topics are below. Please contact me if you’re interested in speaking at either session. These sessions are open to academics, analysts and independent experts, but not IT security vendors.   17 NOV 2016, 15:00 GMT, 10:00 EST Network Encryption Made Easy: Utilizing Network Read More

Read More »