Regular contributor to: The Guardian, The Observer, The Times, Forbes, SC UK Magazine, Infosecurity Magazine, Wired UK, Mobile Europe.
Other information: My work has appeared in national, consumer and b2b titles including The Times, The Guardian, The Observer, The Economist, TechRadar, IT Pro, Wired UK, Total Telecom, Internet of Business, Broadcast TECH, VanillaPlus, The Inquirer, CIO Magazine, SC UK Magazine, Mobile Europe, Popular Science UK, Wireless Magazine, Mobile Magazine, Land Mobile, Coin Rivet, FSTech, IBS Intelligence, Government IT and Local Government News.
I specialise in PR, marketing and website copywriting, as well as news, reviews, analysis and feature writing, covering b2b technology including: cyber security, telecoms, financial sector technology, and public sector IT.
Regular commissions include national, b2b and consumer publications as well as corporate clients, PR agencies and marketing firms.
I am also a contributing analyst at Global Data. http://www.currentanalysis.com/common/analysts/bio_289.html
Links to my work:
Taiwan’s revolutionary hackers are forking the government
YouTube keeps deleting evidence of Syrian chemical weapon attacks
The 17-Year-Old Who Once Tweeted For Anonymous But Is Now Running His Own Cyber Security Company
Five Final Checks To Ensure GDPR Compliance
Cyber Warfare: The Threat From Nation States
Fighting fake news: societies using technology to search for truth
AI developers think smart to boost cyber security
How safe is our public data in the internet of things?
Should companies make the most of blackhats and reformed hackers?
Data protection: What next after Brexit?
The Investigatory Powers Act's wide-reaching implications
Log on to smarter healthcare
Just the job for IT starters
Raspberry Pi: the hidden business benefits
Turning to Linux: A guide for SMBs
Collecting your data - then giving it back to you
Are biometrics the future for mobile authentication
How secure is cloud really
The growing risk
How to use machine learning and AI in cyber security
Skills in security: Fighting the shortage - closing the gap
Covert warfare: How likely are attacks on the UK's critical infrastructure?
Plugging the gap: Why are fewer women getting into cybersecurity?
Two-way radio for retailers
Seven trends to expect at Mobile World Congress 2018
In harm's way: Assessing Russia's cyber-arsenal
10 steps to IoT GDPR compliance | Expert panel
IoT Security: How to fight attacks on health, energy, and transport
How to secure 5G to prevent IoT disasters: expert panel