Premiership restart: club-by-club guide to rugby union’s return | Michael Aylwin | The Guardian

The season will resume on Friday and, with nine rounds left and two play-off weekends to follow, there is plenty to play for Position 6thSlap in the middle of the table, the play-offs are five points one way and Leicester (or relegation any other year) 10 points the other. The arrival of Ben Spencer is the most notable boost since the suspension of play, the retirement of Francois Louw the most significant loss. But Taulupe Faletau has signed a long-term contract and – with Sam Underhill, Zac Mercer et al chomping at the bit – back-row is not an obvious problem area. Continue reading…

The season will resume on Friday and, with nine rounds left and two play-off weekends to follow, there is plenty to play for

Position 6th
Slap in the middle of the table, the play-offs are five points one way and Leicester (or relegation any other year) 10 points the other. The arrival of Ben Spencer is the most notable boost since the suspension of play, the retirement of Francois Louw the most significant loss. But Taulupe Faletau has signed a long-term contract and – with Sam Underhill, Zac Mercer et al chomping at the bit – back-row is not an obvious problem area.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more