Content
Strategic insights on blockchain, AI, and leadership in disruption.

Post-Quantum Cryptography: The Migration Already Started
Apple, Signal, and Chrome deployed NIST post-quantum standards in 2024. The canary didn't die—it migrated. Here's why leaders can't ignore this shift.
Recent Essays

AI Agents Are Breaking Vendor Lock-In Economics
AI agents are dismantling traditional SaaS pricing models by assembling best-of-breed solutions in milliseconds. Learn how usage-based billing replaces vendor lock-in.

AI Agents Are Disrupting Enterprise Sales
AI purchasing agents evaluate vendors in seconds based on data, price, and speed—not relationships. Enterprise sales teams face extinction as loyalty becomes measured in milliseconds.

Why AI Makes Taste Your Most Valuable Skill
As AI automates execution, knowing what good looks like becomes your competitive edge. Learn how taste and decisiveness replace technical skills in the AI era.

AI Agents Are Your New Enterprise Buyers
Enterprise AI agents are making purchasing decisions based solely on data quality, price, and speed—rendering traditional sales relationships obsolete. Discover why your business model must evolve now.
All Content
590 posts
Why Security Needs DevOps
Explore why embracing DevOps is key for enhancing security, reducing human errors, and minimizing vulnerabilities in application deployment cycles by integrating development, infrastructure, and security.
Security Longreads for August 14, 2015
Dive into the latest Security Longreads, featuring thought-provoking insights on cybersecurity challenges, Oracle's CSO controversy, and a two-year-old automotive vulnerability. Plus, explore engaging reads on conflict aversion and productivity.
Building Great Security Metrics
Discover the power of effective security metrics to gauge progress and drive improvements. Learn how to measure key processes, avoid common pitfalls, and leverage metrics for career growth and risk reduction.
Get Engaged In Local Security Groups
Discover how to strengthen your local security network by engaging with organizations like OWASP, ISACA, ISSA, and more. Enhance your career through local meetups and conferences.
Security Longreads for August 7, 2015
Explore the latest in information security with Security Longreads, featuring highlights from Black Hat 2015, FBI's TrueCrypt decryption, and Tesla's quick security patch. Discover engaging reads beyond security too!
The Only Security Certifications You Actually Need
Discover which security certifications truly boost your job prospects. Focused on employer demand, this guide highlights the essential CISSP and CISA for security and audit roles.
On Hacking Guns, Toilets, Semis and More
Explore the sensationalized world of hacking at Blackhat, as we delve into vulnerabilities in smart guns, toilets, and truck tracking systems. Learn to focus on real security risks, not media hype.
An Argument for the Decentralization of Security
Explore why decentralizing security in corporate mergers can reduce risks. This blog delves into maintaining separate networks, security teams, and PCI environments to minimize vulnerabilities.
Online Backup
Discover how CrashPlan offers a secure online backup solution with its multi-layered security model, ensuring your data's safety and privacy. Learn to configure these features for optimal protection.
More Advice on Growing Women in Security
Explore strategies to boost female representation in information security by valuing diverse skills beyond technical expertise. Learn how fostering inclusion and early encouragement can bridge the gender gap.
Security Longreads for July 24, 2015
Dive into July 24, 2015's Security Longreads, featuring in-depth insights on cryptographic backdoors, Jeep hacking, overhyped cyber threats, and Twitter's security strategies, plus other intriguing topics.
3 InfoSec Women on Women in Security
Explore insights from three women in information security as they discuss challenges, the importance of diversity, and strategies to encourage more women to pursue careers in this dynamic field.