High time to fully appreciate the all-round value of Chris Woakes | Ali Martin | The Guardian

Often thought of as Mr Dependable, the Warwickshire player is invaluable to England with the red, as well as white, ballIt would be easy to paint Chris Woakes as an underrated England cricketer but the truth is, it rather depends where you look and who you listen to. And, perhaps, those days are in the rearview mirror now anyway.On the drive back from Manchester late on Saturday evening I passed Edgbaston and for a good few years now the side of the stadium has been adorned with a huge photo of the Brummie Botham/Sutton Coldfield Sobers (delete as per taste – both if you have any). Continue reading…

Often thought of as Mr Dependable, the Warwickshire player is invaluable to England with the red, as well as white, ball

It would be easy to paint Chris Woakes as an underrated England cricketer but the truth is, it rather depends where you look and who you listen to. And, perhaps, those days are in the rearview mirror now anyway.

On the drive back from Manchester late on Saturday evening I passed Edgbaston and for a good few years now the side of the stadium has been adorned with a huge photo of the Brummie Botham/Sutton Coldfield Sobers (delete as per taste – both if you have any).

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more