A simple update. That’s all it took. Michelle was locked out of every system — email, HR portal, even the virtual meeting rooms. While her phone buzzed as colleagues called in a panic, the same thing was happening across departments. Admins couldn’t access the cloud console. Engineers were denied login to critical infrastructure. Even customer […]| Jane Frankland
Are we prepared for a world where cyberattacks are fully automated? Where AI agents can identify vulnerabilities, write malicious code, and adapt their tactics in real time? This isn’t a scene from a science fiction movie but rather questions to ask yourself this Cybersecurity Awareness Month. The cybercrime industry, projected to cost the global economy nearly $15.6 trillion by 2029, is not just growing – it’s evolving at an unprecedented pace. | Jane Frankland
When Jaguar Land Rover (JLR) fell victim to their most recent cyber-attack last month, costing the company an estimated £50 million per week in disrupted operations, the UK government’s decision to underwrite a £1.5 billion loan facility may have seemed like pragmatic crisis management.| Jane Frankland
It was a quiet Friday afternoon when the CISO of a mid-sized manufacturing company received the call every security leader dreads. Their systems had been breached. The attackers had moved swiftly, exploiting a vulnerability that had gone unnoticed. Despite the company’s significant investment in “industry-leading” cybersecurity tools, the breach exposed sensitive customer data and left the organization scrambling to contain the fallout.| Jane Frankland
It was only a matter of time. When the phone call came, it felt like a simple misunderstanding. A trusted colleague asked about an urgent opportunity I’d called to discuss. My voice had convinced them, my cadence had reassured them, and my specific phrasing had sealed the deal. The only problem? I’d never made the […]| Jane Frankland
When you’re deeply entrenched in the world of thought leadership, your name, your voice, and your image spread across media interviews, conference stages, and every corner of the internet, the potential for your identity to be misused is more than a passing worry.| Jane Frankland
menu| jane-frankland.com
For years, the world’s largest corporations have outsourced their cybersecurity to the big brand consulting firms and system integrators, believing that bigger equals better. These massive providers promise global cybersecurity coverage, deep expertise, and cutting-edge technology, making them the default choice for enterprise cybersecurity solutions.| Jane Frankland
It started in a rugby box. There I was, watching the match from a VIP suite—surrounded by a handful of other cybersecurity leaders. The beers were cold, the banter flowing, but one comment cut through the noise: “Cybersecurity’s no longer about technology. It’s about sovereignty.” That stuck with me. That rugby-box insight wasn’t just banter—it […]| Jane Frankland
Most of us have heard the saying, “No pain, no gain.” For cybersecurity leaders navigating the high-stakes world of defending critical systems, this phrase takes on a whole new meaning. Pain, in this context, doesn’t have to mean the physical discomfort. Instead, it’s the uncomfortable reality of facing constant threats, adapting to a rapidly shifting […]| Jane Frankland
“Amusement will outcompete information, and spectacle will outcompete arguments.”| Jane Frankland
It’s the May Bank Holiday, and as I sit at my desk, working, unanswered questions continue to swirl around the recent cyberattacks on Marks & Spencer (M&S), the Co-op, and Harrods, leaving the full scope and implications of these breaches uncertain.| Jane Frankland
Music and sports have always had the power to unite us. They transcend differences, bring people together, and remind us of the beauty in being different. But if we switch our focus to the world of technology, we seei a starkly different picture—a landscape increasingly shaped by control, compliance, and automation.| Jane Frankland