Content

Strategic insights on blockchain, AI, and leadership in disruption.

Why Prediction Markets Replace Traditional Polling
October 27, 2025·2 min read
blockchain

Why Prediction Markets Replace Traditional Polling

Prediction markets like Polymarket are displacing traditional pollsters by aligning incentives with accuracy. Financial services leaders should shift from polling reports to market-based sentiment data.

Recent Essays

All Content

518 posts

August 17, 2015

Why Security Needs DevOps

Explore why embracing DevOps is key for enhancing security, reducing human errors, and minimizing vulnerabilities in application deployment cycles by integrating development, infrastructure, and security.

August 14, 2015

Security Longreads for August 14, 2015

Dive into the latest Security Longreads, featuring thought-provoking insights on cybersecurity challenges, Oracle's CSO controversy, and a two-year-old automotive vulnerability. Plus, explore engaging reads on conflict aversion and productivity.

August 12, 2015

Building Great Security Metrics

Discover the power of effective security metrics to gauge progress and drive improvements. Learn how to measure key processes, avoid common pitfalls, and leverage metrics for career growth and risk reduction.

August 10, 2015

Get Engaged In Local Security Groups

Discover how to strengthen your local security network by engaging with organizations like OWASP, ISACA, ISSA, and more. Enhance your career through local meetups and conferences.

August 07, 2015

Security Longreads for August 7, 2015

Explore the latest in information security with Security Longreads, featuring highlights from Black Hat 2015, FBI's TrueCrypt decryption, and Tesla's quick security patch. Discover engaging reads beyond security too!

August 05, 2015

The Only Security Certifications You Actually Need

Discover which security certifications truly boost your job prospects. Focused on employer demand, this guide highlights the essential CISSP and CISA for security and audit roles.

August 03, 2015

On Hacking Guns, Toilets, Semis and More

Explore the sensationalized world of hacking at Blackhat, as we delve into vulnerabilities in smart guns, toilets, and truck tracking systems. Learn to focus on real security risks, not media hype.

July 29, 2015

An Argument for the Decentralization of Security

Explore why decentralizing security in corporate mergers can reduce risks. This blog delves into maintaining separate networks, security teams, and PCI environments to minimize vulnerabilities.

July 27, 2015

Online Backup

Discover how CrashPlan offers a secure online backup solution with its multi-layered security model, ensuring your data's safety and privacy. Learn to configure these features for optimal protection.

July 27, 2015

More Advice on Growing Women in Security

Explore strategies to boost female representation in information security by valuing diverse skills beyond technical expertise. Learn how fostering inclusion and early encouragement can bridge the gender gap.

July 24, 2015

Security Longreads for July 24, 2015

Dive into July 24, 2015's Security Longreads, featuring in-depth insights on cryptographic backdoors, Jeep hacking, overhyped cyber threats, and Twitter's security strategies, plus other intriguing topics.

July 22, 2015

3 InfoSec Women on Women in Security

Explore insights from three women in information security as they discuss challenges, the importance of diversity, and strategies to encourage more women to pursue careers in this dynamic field.

Jay Schulman - Blockchain & AI Strategy