top of page
All Posts


The European Digital Identity Framework: Future of Sovereign Identity
The EU's transition to the European Digital Identity (EUDI) Wallet, mandated by eIDAS 2.0 (Regulation (EU) 2024/1183), is a strategic response to fragmented national eID schemes and rising deepfake-powered identity fraud. The EUDI Wallet, which must be offered by all Member States by December 2026, aims for 80% citizen adoption by 2030, aligning with the Digital Decade objectives. The architecture is decentralized and user-centric, utilizing a Wallet Unit to store Person Iden
Andy Gravett
5 days ago3 min read


Domain-Driven Security: Designing Resilient Systems Through Business Alignment
Domain-Driven Design (DDD) offers a profound solution to modern cybersecurity vulnerabilities by shifting from perimeter-based, technology-driven defenses to an intrinsic "Secure by Design" approach. Historically, security was "bolted on" with firewalls, but the complexity of micro-services demands that security be structural. DDD, conceived by Eric Evans, aligns code with core business domain models, which naturally enforces rigorous security. This paradigm, called "Domain-D
Andy Gravett
Mar 246 min read


The Evolution of the Foldable Market: A Comprehensive Analysis of Apple's iPhone Fold
Introduction For years, competitors such as Samsung, Huawei, and Google have iterated through multiple generations of foldable devices, capturing early adopters while contending with technological compromises. Apple's entry in September 2026, synchronized with the debut of the iPhone 18 Pro and iPhone 18 Pro Max models, is engineered to capitalize on matured supply chains and a consumer base that has been normalized to the foldable paradigm. Strategic recalibrations within Ap
Andy Gravett
Mar 194 min read


Anyone can Threat Model Anything
Threat modeling is a foundational design time activity and good developmental practice, the key goal is to understand threats and risks to the systems and services as early in the lifecycle as possible before spending too much time, effort and money, to the uninitiated it can sometimes feel overwhelming or need specialist skills. In this basic introduction I will start with basic design time collaborative threat modelling, that anyone can do! By breaking down the early solu
Andy Gravett
Mar 184 min read


Advanced Methodologies for the Prevention and Mitigation of Large Language Model Prompt Injection Attacks
Introduction to the Semantic Threat Landscape The rapid integration of Large Language Models (LLMs) into enterprise infrastructure, autonomous systems, and critical workflows has precipitated a fundamental paradigm shift in application security. Because the underlying architecture of transformer-based generative models processes natural language prompts probabilistically, it inherently conflates trusted system instructions with untrusted user input or external data. This stru
Andy Gravett
Mar 177 min read


Operational Technology and ICS Security in 2026: Threat Landscape, Strategic Architectures, and Governance Frameworks
Introduction Operational Technology (OT) and Industrial Control Systems (ICS) have reached a critical and highly volatile inflection point. Historically, these systems were designed for physical reliability, operational longevity, and absolute closed-loop isolation. They governed the fundamental processes of modern civilization, from the purification of municipal water supplies and the generation of electrical power to the automation of heavy manufacturing and the routing of
Andy Gravett
Mar 173 min read


Project V - Building the Ultimate Offline AI Testing Rig with Kali 2025.4 & Ollama llama 3
Geek time, so unless you have been in a sandbox this week or not been paying attention the team at Kali Linux dropped 2025.4 , you know the landscape is shifting. With the complete transition to Wayland on GNOME 49 and the introduction of native AI-driven tools like hexstrike-ai, OffSec is clearly signaling that artificial intelligence is no longer just a gimmick—it is a core component of modern offensive security. But here is the candid reality: piping your sensitive red-te
Andy Gravett
Mar 138 min read


Overview of the Jiuzhang Photonic Quantum Computing Series and the Frontier of Gaussian Boson Sampling
The realization of quantum computational advantage represents a fundamental shift in the capabilities of information processing, marking the transition from theoretical quantum mechanics to the era of practical, large-scale quantum devices. At the forefront of this transition is the Jiuzhang series, a lineage of photonic quantum computers developed by the University of Science and Technology of China (USTC) under the leadership of Pan Jianwei and Lu Chao-Yang. Named after the
Andy Gravett
Mar 92 min read


Impacts & Effects of Social Media in 2026
Social media has transitioned from a networking tool to an omnipresent, algorithmic, and AI-driven environment, fundamentally rewiring human interaction and causing interconnected crises in cognitive, psychological, political, and economic domains. This hyper-connectivity paradoxically fuels a global loneliness epidemic and systemic erosion of trust. The extractive attention model of platforms has led to a population-level cognitive collapse, with the average digital attentio
Andy Gravett
Mar 62 min read


Secure-By-Design
SbD In the world of software and cybersecurity, we’ve spent decades playing "Whack-A-Mole"—trying to patch holes in software after hackers have already climbed through them. Secure by Design (SbD) is the industry's way of saying, "Maybe we should just build a house that doesn't have holes in the first place." It is a fundamental shift from treating security as a final "check-the-box" feature to making it a core requirement from the very first line of code. What is Secure by
Andy Gravett
Mar 52 min read


MITRE ATLAS
Data driven overview on MITRE's Adversarial threat Landscape for AI Systems, ATLAS. You can check out MITRE ATLAS here https://atlas.mitre.org/
Andy Gravett
Mar 41 min read


OWASP Top 10 for AI & LLM
The OWASP Top 10 for Large Language Model (LLM) Applications is the industry standard for securing AI systems. While the original list was released in 2023, the 2025/2026 updates reflect the shift toward "Agentic AI"—where models don't just chat, but actually take actions. Here are the top risks and the strategic mitigations for each: 1. Prompt Injection (LLM01) Attackers use crafted inputs to bypass safety filters or "hijack" the model’s instructions. Direct Injection: Us
Andy Gravett
Mar 23 min read


Global Mobile Technology and Connectivity Ecosystem: 2026–2027 Strategic Outlook
Executive Overview and Macroeconomic Paradigm Shift The global economic landscape of 2026 is characterized by a complex interplay of divergent forces, where persistent headwinds from fiscal tightening and shifting trade policies are actively offset by tailwinds generated through unprecedented capital investment in technological infrastructure. The prevailing macroeconomic environment dictates the trajectory of the mobile technology sector, shifting it from a consumer-driven c
Andy Gravett
Feb 2724 min read


The State of Artificial Intelligence in 2026: Breakthrough Innovations, Agentic Architectures, and Cross-Industry Deployment
Introduction to the 2026 Artificial Intelligence Landscape The year 2026 marks a definitive and irreversible inflection point in the trajectory of artificial intelligence (AI). The technological ecosystem has officially transitioned from a phase of localized experimentation, characterized by isolated generative outputs and speculative pilot programs, into an era defined by systemic integration, autonomous orchestration, and measurable enterprise value. The macroeconomic impli
Andy Gravett
Feb 254 min read


The Future of Healthcare Technology in 2026: Embracing AI, Nanomedicine, and Robotics
The healthcare industry is on the brink of a major transformation by 2026. The shift from basic digital tools to intelligent, interconnected systems will redefine how care is delivered. This change is driven by three key technologies: agentic artificial intelligence (AI), structural nanomedicine, and modular robotics. Together, they promise to improve patient outcomes, reduce strain on healthcare workers, and meet growing demands for personalized treatment. Beyond 2026 Digita
Andy Gravett
Feb 234 min read


2026 update on Technology in the Battlefield
In my 2024 post, on “Technology on the Battlefield” I highlighted the shift toward software-defined warfare, the integration of AI for decision-making, and the rising importance of drones. Fast-forward to 2026, and these trends have transitioned from experimental concepts to the primary drivers of frontline operations. Below is an update to those core themes, reflecting the technological landscape of today’s battlefield. 1. From "Drones as Tools" to "Autonomous Swarms" In 202
Andy Gravett
Feb 223 min read


Global Sustainable Technology and Engineering Report 2026: The Industrialization of Net Zero
From Hype to Hard Infrastructure 2026 represents a definitive inflection point in the trajectory of global sustainable engineering. Following a decade characterized by ambitious target-setting and venture capital-fueled experimentation, the sector has transitioned into a phase of industrial execution and hard infrastructure deployment . 1 The theme for 2026 is no longer the possibility of net-zero technologies, but their scalability , bankability , and integration into leg
Andy Gravett
Feb 205 min read


Security & Ethics in 2026
With more power comes more creative ways for things to go wrong. "The Post-Quantum Panic: Is Your Data Safe from the 2030 Crack?" Explain why companies are scrambling to implement Post-Quantum Cryptography (PQC) right now to protect against future "harvest now, decrypt later" attacks. "Personhood Credentials: How to Prove You’re Human in 2026" In a world of perfect deepfakes, explore the new tech (like Worldcoin or decentralized IDs) designed to verify "humanness" online. "
Andy Gravett
Feb 164 min read


The Architecture of Trust: Comprehensive Security Framework for the Model Context Protocol in the Enterprise Era (2026)
Introduction: The Agentic Paradigm Shift The integration of Large Language Models (LLMs) into the enterprise technology stack has precipitated a fundamental paradigm shift in software architecture. We are transitioning from a deterministic era, characterized by static API integrations and rigid distinct logic paths, into an agentic era defined by probabilistic execution, autonomous tool selection, and dynamic resource negotiation. At the center of this transformation lies the
Andy Gravett
Feb 132 min read


The Trajectory of Consumer Technology & What Come Next! (2004–2035)
The evolution of consumer technology over the past two decades represents a fundamental rewriting of the human experience. We have transitioned from an era of discrete, stationary interactions with the "read-only" web to a continuous, fluid engagement with a "read-write" digital fabric that permeates every aspect of daily life. This report provides an exhaustive analysis of this trajectory, tracing the arc from the dawn of Web 2.0 and the ubiquitous connectivity of the smartp
Andy Gravett
Feb 121 min read
bottom of page
