Content
Strategic insights on blockchain, AI, and leadership in disruption.

Tokenization: The Freight Train Disrupting Finance
Discover how tokenization and prediction markets are fundamentally reshaping financial services—and why traditional firms are building yesterday's solutions for tomorrow's world.
Recent Essays

SMS Security Crisis: Why Crypto Scams Keep Working
Explore how blockchain technology and cryptographic signatures can solve SMS-based crypto scams—and why user behavior, not technology, remains the real barrier.

AI Won't Replace You—Being Average Will
Learn why execution skills are becoming obsolete and how to shift from following instructions to creating strategic value in the AI era.

AI Is Coming for Tasks, Not Jobs—Yet
AI will displace 50% of knowledge workers by targeting tasks, not roles. Learn why top performers are safe and how to future-proof your career in the next 1-5 years.

AI Systems Beat Models: Why Integration Wins
Discover why AI system integration matters more than raw model intelligence. Learn how connected capabilities create real competitive advantage.
All Content
517 posts
Security Pros Guide to Optimizing LinkedIn
Discover how to stand out in the security industry with an optimized LinkedIn profile. This guide covers crafting a unique summary, selecting impactful skills, and highlighting non-work activities.
7 Types of CISO
Explore the diverse landscape of CISO roles, from Executive to Buried CISOs, and learn how companies can avoid mismatches by aligning the right talent with specific security leadership needs.
RSA: Are We Talking About The Right Things?
RSA's focus misses the mark, overlooking key issues like nurturing security talent, expanding the workforce, and measuring program effectiveness. Let's reshape the conversation for next year's event.
Are We Running Out of CISOs?
Explore the growing demand and dwindling supply of CISOs as fear of breaches drives security leaders to avoid top roles. Discover why experience with breaches is becoming a valued asset.
My Morning Routine
Discover the intricacies of a balanced morning routine shaped by family dynamics, work demands, and personal habits. Learn how adaptability and planning create a seamless start to each day.
How I Work On The Road
Discover how to stay productive while traveling with essential tech tools and gadgets. Explore the featured gear from a recent Minneapolis trip and learn how to optimize your mobile workspace.
How We End Up With Too Many Security Policies
Explore the pitfalls of policy bloat in security management, as the article delves into redundant policies, misplaced guidelines, and tech-enforced rules, advocating for streamlined security measures.
You Have Too Many Security Policies
Explore the pitfalls of excessive security policies that prioritize compliance over true protection. Discover how simplifying and reducing policies can enhance your organization's security posture.
Security is Not A Special Snowflake
Explore how to integrate security seamlessly into technology processes, transforming it from a policing role to a collaborative partner, ensuring robust systems without hindering innovation.
How I Curate Security Longreads
Discover how Jay Schulman curates his Security Longreads newsletter in just 15 minutes a week. Learn his efficient process using tools like Feedly, Pocket, and Goodbits to stay informed and share insights.
Why Your Strategy Needs a Consultant
Discover why hiring a consultant can transform your strategy by providing fresh perspectives and overcoming internal limitations, much like FDR's need for a second medical opinion revealed critical insights.
Responding to Every E-mail: Two Months In
Discover the journey and challenges of responding to every e-mail for two months. Explore the surprising reactions and insights gained, and why some e-mails may no longer warrant a reply.