Content
Strategic insights on blockchain, AI, and leadership in disruption.

Post-Quantum Cryptography: The Migration Already Started
Apple, Signal, and Chrome deployed NIST post-quantum standards in 2024. The canary didn't die—it migrated. Here's why leaders can't ignore this shift.
Recent Essays

AI Agents Are Breaking Vendor Lock-In Economics
AI agents are dismantling traditional SaaS pricing models by assembling best-of-breed solutions in milliseconds. Learn how usage-based billing replaces vendor lock-in.

AI Agents Are Disrupting Enterprise Sales
AI purchasing agents evaluate vendors in seconds based on data, price, and speed—not relationships. Enterprise sales teams face extinction as loyalty becomes measured in milliseconds.

Why AI Makes Taste Your Most Valuable Skill
As AI automates execution, knowing what good looks like becomes your competitive edge. Learn how taste and decisiveness replace technical skills in the AI era.

AI Agents Are Your New Enterprise Buyers
Enterprise AI agents are making purchasing decisions based solely on data quality, price, and speed—rendering traditional sales relationships obsolete. Discover why your business model must evolve now.
All Content
590 posts
What Does China Want With…
Explore the hidden motivations behind major security breaches like Anthem and OPM. Discover how stolen personal data can be used for competitive advantage and marketing, and why it's crucial to protect all data.
Future Proof Your Security Job
Discover how to secure your future in the evolving information security field by adapting to technological advancements, understanding business processes, and embracing continuous learning.
Do You Still Want to be a Fireman?
Explore how shifting aspirations can keep your security career future-proof. Discover why continual learning and adaptability are key to thriving in an ever-evolving industry landscape.
Security Longreads for June 5, 2015
Dive into this week's Security Longreads, exploring the OPM breach linked to Anthem, Netflix's security in agile development, insights on the CISO's role, and a review of Google Photo's data-mining features.
All of My Old Jobs No Longer Exist
Explore how evolving technology is reshaping security roles that once thrived. Learn strategies to future-proof your career and adapt to the ever-changing landscape of information security.
14 Things and 12 Tools Every Security Organization Should Own
Explore the essential disciplines and tools every security organization needs. This guide broadens your security knowledge and helps you understand how various elements fit together for a cohesive strategy.
4 Old Books on Security You May Not Have Read
Discover four overlooked security books from the past that can enhance your career. Explore these hidden gems from the author's 1999-2003 collection and keep your security knowledge sharp.
Why I Turned Down A Security Job at Playboy
Discover why the author turned down a security job at Playboy, prioritizing career growth and company values over glamour. Learn insights on making pivotal career decisions in his new podcast.
Announcing the Building a Life and Career in Security Podcast
Discover inspiring career journeys in the "Building a Life and Career in Security Podcast." Each episode features interviews with security pros, exploring pivotal career decisions and lessons learned. Subscribe now!
Don’t Go to Hacker Cons
Unlock true career growth in security by broadening your skillset beyond hacker cons. Focus on management, communication, and strategic skills to elevate your career to the next level.
How to Broaden Your Knowledge
Discover strategies to expand your tech and business acumen beyond deep security expertise. Learn how to effectively grow your knowledge in your spare time with this insightful video guide.
Finding a Job in Information Security
Discover why aligning job priorities leads to success in information security. Learn from Chris's story and find out why sticking to your values can guide you to the right career path.