Sign in to view James’ full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
United Kingdom
Sign in to view James’ full profile
James can introduce you to 10+ people at Cloudflare
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
2K followers
500+ connections
Sign in to view James’ full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with James
James can introduce you to 10+ people at Cloudflare
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with James
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view James’ full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
2K followers
-
James Todd liked thisJames Todd liked thisDev GTM Diaries: Every enterprise I talk to right now is asking the same question. Not "should we build AI agents?" That debate is over. The question is: "Where do our agents run?" And the answer most teams give is... they don't know yet. Here's what I'm seeing in the field: Teams build an AI agent prototype on a laptop. It works. They demo it to leadership. Leadership says "ship it." And then reality hits: 🤖 Where does this agent authenticate? 🤖 How do you isolate per-customer agent execution? 🤖 What happens when 10,000 users hit it simultaneously? 🤖 Who's paying the inference bill? The infrastructure layer for AI agents is the biggest greenfield opportunity in enterprise tech right now. It's not about the model. It's about everything around the model; state management, execution isolation, model routing, async processing, and edge delivery. The companies that figure out their agent infrastructure stack in 2026 will have a 2-year head start on everyone else. #AIAgents #EdgeComputing #DevPlatform #Cloudflare
-
James Todd liked thisJames Todd liked thisDelivery Hero welcomes Nan Hao Maguire as new CISO to lead security across foodpanda, foodora and Yemeksepeti Wishing Ms. Nan Hao Maguire greater responsibilities and exciting challenges in this impressive new chapter! The appointment comes as the company strengthens its global security framework to support innovation while ensuring user trust across millions of daily transactions. . . Click here to read the full story: https://lnkd.in/dGjnqZbe Now follow our WhatsApp Channel, and never miss out on daily tech brew: https://lnkd.in/dYa9pvpx #TheMainstream #CyberSecurity #DeliveryHero #CISO #FoodTech #DataSecurity #LeadershipUpdate
-
James Todd reacted on thisJames Todd reacted on thisI’m excited to share that I’ve joined Delivery Hero as CISO to lead security across foodpanda , foodora and Yemeksepeti! Delivery Hero’s scale, ambition and role in powering everyday convenience for millions of users globally make this an incredibly compelling next chapter. I’m looking forward to building and strengthening security capabilities across these platforms, supporting innovation while ensuring trust remains at the core of everything we do. A sincere thank you to Benjamin Mann and Sebastian Rodriguez for the trust placed in me. I’m truly excited about the journey ahead and what we will build together. Grateful as well for my time at Cloudflare — great to work with such exceptional teams and to contribute to a mission I deeply believe in. Here’s to the new journey. 🐼💓 #DeliveryHero #foodpanda #foodora #Yemeksepeti #cybersecurity #leadership
-
James Todd reacted on thisJames Todd reacted on thisAfter an incredible career at BT, where I had the privilege of leading BT Security, I’m pleased to share that I’ve joined Bank of America as Managing Director, Information Security. I’m hugely grateful to the talented teams and colleagues I worked alongside at BT—together we built, strengthened, and evolved security at scale. Now, I’m looking forward to this next chapter, overseeing international security at Bank of America, and continuing to tackle some of the most important challenges in our field. #cybersecurity #leadership #newchapter
-
James Todd liked thisJames Todd liked thisMy first month at Mace Consult has absolutely flown by. It has been a really enjoyable and fast start, with so much going on across the business as we continue to grow as a standalone global consultancy. As part of that growth, we are expanding our excellent Legal team to support the business internationally. We currently have a number of Senior Lawyer roles live: 🔹 London - https://lnkd.in/eA6rZCBZ https://lnkd.in/eq-WvSih 🔹 Abu Dhabi or Riyadh - https://lnkd.in/eTaKsEbZ https://lnkd.in/eD2M5mqe If you are interested in joining a high‑quality, international legal team working on a varied and engaging portfolio of work, feel free to get in touch.
-
James Todd liked thisJames Todd liked thisWith all the announcements re: Mythos, this is a good read: https://lnkd.in/g6se_FKu Anthropic’s Claude #Mythos is making headlines for autonomous zero-day discovery, but this analysis from AISLE™ reveals a critical strategic insight: the true defensive moat is the orchestration system, not the underlying model. Key takeaways for security leaders: The Capability is Accessible: Testing shows that smaller, open-weight models can successfully replicate many of Mythos's flagship vulnerability discoveries when given the right context. The Frontier is Jagged: #AI #cybersecurity capability does not scale uniformly with model size. Smaller, highly targeted models can often outperform massive frontier models on specific triage and detection tasks. #Architecture Outperforms Raw Power: A highly optimized system deploying cost-effective models continuously will out-discover a single expensive model deployed sparingly. The technology for autonomous AI defense is already broadly accessible. The mandate for security teams today is to stop waiting for the ultimate frontier model and start building the targeted pipelines, scaffolding, and validation workflows required to deploy AI defensively at scale. We Cloudflare can definitely help.AI Cybersecurity After Mythos: The Jagged FrontierAI Cybersecurity After Mythos: The Jagged Frontier
-
James Todd liked thisJames Todd liked thisA little ironic moment for me… A few years ago, I was probably one of the louder skeptics of how casually the term “AI” was being thrown around. It felt overused, underdefined, and often disconnected from real-world impact. Fast forward to today, and I’m honored to be recognized as a leader in AI here in the DC area. I guess that’s what happens when you go from questioning the hype to actually building something meaningful in it. Really proud of what we’re doing at Bricklayer AI and even more excited about where this is all heading. The shift from tools to coordinated, agentic systems is just getting started. Appreciate the recognition from the DCA Live team and congrats to the other leaders pushing this space forward.
-
James Todd liked thisJames Todd liked thisOur team just went through OpenCode School together and it was one of the best learning experiences we've had this year. Zeke Sikelianos built it as a free, open-source course that teaches you how to use OpenCode, the open-source AI coding agent. No account required, no data collected. The course adapts to your experience level and learning style -- people on our team with zero coding background were working through it alongside engineers. By the end, everyone was connecting MCP servers, querying internal data, and building things in the terminal that would have seemed impossible a few weeks ago. If you're curious about AI coding tools but don't know where to start, this is the on-ramp: https://opencode.school
Experience & Education
-
Cloudflare
***** ***
-
****** ********
***
-
****
******** * ***** ********** **************
View James’s full experience
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View James’ full profile
-
See who you know in common
-
Get introduced
-
Contact James directly
Explore more posts
-
Cortex by Palo Alto Networks
58K followers
🛠️ Traditional SIEMs weren’t built for today’s threats. Complexity, poor cloud integration, and high false positives are holding security teams back. It’s time to modernize. This guide gives security leaders a clear roadmap to transform their SIEM without disrupting operations. 🔍 Start your SIEM transformation with Cortex XSIAM. https://bit.ly/3JsfsEz
84
-
David Howorth
Rapid7 • 5K followers
It's been a busy few months Rapid7. We've launched Intelligence Hub to provide curated, high-fidelity data to enable organisations to focus on threats relevant to their sector or geo. We 've introduced new features within Remediation Hub, giving security teams a unified view of assets to prioritise and optimise risk mitigation. Additionally our AI teams has been busy leveraging agent AI and automation to scale detection and response, active remediation for MDR and extending AI alert triage for SIEM customers! If you interested to learn more, then dive in by clicking on this link or subscribe to the R7 blog at https://lnkd.in/etdj9-ck https://lnkd.in/etcnQypx
144
-
Ivan Ristić
Red Sift • 3K followers
After years of work, we have decent security standards, but we'll continue to struggle until we adopt security by default. Take the relationship between TLS 1.2 and 1.3, for example. Both protocols can provide reasonable security, but TLS 1.2 supports a kitchen sink of options, and you need to know what you're doing to configure it correctly. TLS 1.3, on the other hand, just works, no further work needed. This is just one example; there are dozens of standards and situations for everyone to consider when it comes to their network infrastructure. Until we get security by default, the only way to stay ahead is to have comprehensive configuration monitoring to catch problems and drift. I created Hardenize to solve exactly this problem. Our free test is still available at hardenize.com, and the commercial product has been rolled into Red Sift's. Now that Mail Check and Web Check are being retired, I am very happy that there is still a way for Hardenize to continue to serve.
13
1 Comment -
Alessandra Gwiss
Fortinet • 3K followers
How secure is the UK’s rail network as it transitions to Great British Railways? With legacy systems meeting new digital platforms, cyber risk is rising. This white paper explores practical ways to protect critical rail infrastructure, safeguard passengers, and support operational continuity. Read now: https://lnkd.in/dVDGtjW3 #ProtectCriticalInfrastructure
11
-
Tim McAllister
DigiCert • 16K followers
Huge win for the #UK #education and #research sector! 🎓 The procurement framework piece is critical here - removing procurement friction means institutions can focus on implementation rather than bureaucratic hurdles. For universities and research organizations dealing with sensitive data, distributed networks, and increasing cyber threats, having streamlined access to enterprise-grade PKI and certificate lifecycle management is essential. Educational institutions often operate with complex certificate environments (student access, research networks, #IoT devices, federated authentication) but limited security resources. Automated lifecycle management at scale prevents the certificate expiration issues that can bring down critical systems. This kind of foundational trust infrastructure enables secure collaboration across the research ecosystem. Well done DigiCert and Jisc! 🔐 #PKI #DigitalTrust #HigherEducation #CyberSecurity #Research #TLS #CertificateManagement #InfoSec #UKEducation
3
-
CovertSwarm
6K followers
CovertSwarm is accredited by CREST to deliver CBEST TLPT assessments, the UK’s financial-sector standard for threat intelligence-led security testing. Our red team uses an intelligence led approach to emulate advanced persistent threat actors across all attack vectors to assess cyber resilience under realistic conditions. Learn more about capabilities for financial services: https://hubs.li/Q03lM26Q0
29
-
Andrew Ginter
Waterfall Security Solutions • 17K followers
A new cybersecurity report for space-based power generation. The world needs more renewables and this is a new frontier. Good analysis. One concerning scenario I had not considered: adversaries taking control of a different spacecraft capable of reaching the orbit of the space-based solar platform and colliding with it. In future, do we need really good cybersecurity for all high-powered spacecraft no matter who sends them up, not only the solar station and ground stations themselves? See the full report here ➡️ https://lnkd.in/gHpRVj3C
7
-
Dudley J.
576 followers
Giltar Information Security Ltd are delighted to be supporting the early discovery and development work for the UK military's Digital Targeting Web. The DTW is a £1bn game changing capability which featured as a key recommendation in the recent Strategic Defence Review and it will transform the speed and precision of the sense/decide/effect chain leveraging AI along with a shift from network and application centricity to data centric operations. It will align with NATO standards enabling alliance interoperability and position the UK as the blue force leader in the digital targeting space. Giltar Information Security Ltd will lead the early security work developing guidance, principles and architecture that will lay the foundations for compliance with #SecureByDesign principles. We will also enable dynamic and proportionate security assurance of early minimum viable product demonstrations. #DigitalTransformation
28
2 Comments -
Omada
13K followers
Non-human identities - devices, service accounts, AIAgents - now shape both security risk and operational speed, yet most IdentityGovernance models weren’t built for them. In this article, Martin Kuppinger outlines a practical maturity-based approach to governing NHIs across their full lifecycle, from provisioning to decommissioning. Read the latest advisory from KuppingerCole Analysts to see how stronger NHI governance can improve security and efficiency: https://bit.ly/3NSP0G8 #NHIs #AIAgents #IdentityGovernance
2
-
Vimesh Avlani
Graftronics. • 5K followers
MDR sharpens visibility. Because resilient businesses need a clearer lens. In today’s cyber landscape, what you don’t see often matters more than what you do. Modern security teams face an overload of alerts. MDR steps in to give clarity where it matters most: - Filters noise so only real threats demand attention - Adds context to alerts for faster understanding - Guides action with expert-driven recommendations - Accelerates decisions when time is critical - Strengthens resilience by spotting what tools alone may miss MDR makes your defenses sharper, faster and more reliable. Graftronics is a Sophos MDR partner, transforming IT teams across organizations in multiple industries. Reach out to us for assessing MDR for your setup. - Vimesh Avlani Managed Detection & Response | Cyber Resilience | Trusted by Mid-Market CXOs
20
4 Comments -
Ronald Hulme
CM Security • 1K followers
I welcome the UK’s new Cyber Security and Resilience policy presented to Parliament by the Secretary of State for Science, Innovation and Technology by Command of His Majesty because it will bring managed service providers under regulatory oversight for the first time. This is a wake-up call for our industry, and a huge opportunity for those of us who take cyber seriously. Compliance won’t be optional. Trust won’t be assumed. Now’s the time to level up. #CyberSecurity #MSP #Regulation #NIS
10
-
Dan Goodfellow
TrendAI • 2K followers
Join us for our latest episode of Tea & Trend Sessions, as Jeremy Wimble, Senior Programme Manager, Defence at techUK, explores the UK’s evolving defence technology landscape. From the Strategic Defence Review to the Ministry of Defence’s role in shaping cyber policy, Jeremy shares key insights into how national strategy is influencing cyber resilience, and why accelerating innovation is critical to keeping the UK’s defence sector cyber secure. Tune in as we discuss: - The rise of Secure by Design - Balancing digital sovereignty with access to AI and cloud - The operational risks and opportunities of integrating AI into defence systems - Highlights from the NCSC’s 2025 Annual Review. 👉 Register now! https://bit.ly/47JgjJq 👉 Missed an episode? Catch them all on-demand here https://bit.ly/4gyDgmA #TeaAndTrend #CyberResilience #CyberSecurity #DefenceTech #TrendMicro #techUK #SecureByDesign #AIinDefence #DigitalSovereignty
3
-
CACI Network Services
792 followers
Our whitepaper "Optimising Networks with F5 Solutions," explores how we help clients across various industries streamline their application delivery estates. Key topics within the whitepaper include: ◾ Network automation ◾ Benefits of the NetDevOps approach ◾ CACI’s approach ...Plus use cases and how CACI and our partners F5 can support your organisation! Discover how our 20+ years of expertise and advanced tooling can transform your network operations. Download our whitepaper here: https://lnkd.in/ei2BcbPB #NetworkAutomation #NetDevOps #Networking #F5 #NetworkServices
11
-
Jude McCorry
7K followers
National Cyber Security Centre issued this advice a few weeks ago - we have seen an increase in activity aimed at Scottish Public Sector organisation's and all relevant agencies are monitoring this activity. - We are reaching out proactively around any intelligence we receive, but can you all add another layer of "healthy paranoia" to your Cyber resilience, and ensure any partners you are working with are aware also. https://lnkd.in/ee7-8gMJ
34
1 Comment -
Dan Quirke
3K followers
There’s something quietly powerful about revisiting the places that shaped you. I did this MSc part-time in 2006; back when it was one of the first programmes of its kind. And, like all good education, its value only really compounds in hindsight. If you’re an alumnus, it’s worth a couple of minutes. Not because surveys change the world… but occasionally, they nudge it in a better direction. Long may it continue to evolve.
5
-
Richard Gadd
Commvault • 7K followers
These are wise words from Richard Horne - cyber crime is undoubtedly the biggest risk to global business. In fact, the World Economic Forum identified cyber crime as one of the biggest risks to the global economy. The reality is that businesses are unprepared.
33
2 Comments -
The Cyber Security Hub™
2M followers
Many deepfake attacks succeed because people don't know what to look for. CloudGuard have published a practical guide breaking down 10 visual and audio deepfake warning signs, plus a short interactive walkthrough you can share internally. If your team can spot the signs, they can help stop the attack. 👉 Read it here: https://lnkd.in/eKem5xGe
53
5 Comments -
Simon Fieldhouse
Serbus • 4K followers
Today marks an exciting milestone as we officially launch Serbus! As the UK faces an evolving and escalating threat landscape, resilience depends on protecting multiple layers of operational and communications infrastructure throughout the design, installation, management, and maintenance of critical services. By bringing Bates IT, ITM Communications, and Serbus together as Serbus, we come together as one organisation, embedded across sovereign data, secure facilities, ICT infrastructure, and mobile communications to deliver resilient, efficient, and secure operations - well positioned to deliver best-in-class services. Discover how we connect and protect UK critical national infrastructure: https://lnkd.in/eVFzZvgf
13
1 Comment
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More