Content
Strategic insights on blockchain, AI, and leadership in disruption.

Post-Quantum Cryptography: The Migration Already Started
Apple, Signal, and Chrome deployed NIST post-quantum standards in 2024. The canary didn't die—it migrated. Here's why leaders can't ignore this shift.
Recent Essays

AI Agents Are Breaking Vendor Lock-In Economics
AI agents are dismantling traditional SaaS pricing models by assembling best-of-breed solutions in milliseconds. Learn how usage-based billing replaces vendor lock-in.

AI Agents Are Disrupting Enterprise Sales
AI purchasing agents evaluate vendors in seconds based on data, price, and speed—not relationships. Enterprise sales teams face extinction as loyalty becomes measured in milliseconds.

Why AI Makes Taste Your Most Valuable Skill
As AI automates execution, knowing what good looks like becomes your competitive edge. Learn how taste and decisiveness replace technical skills in the AI era.

AI Agents Are Your New Enterprise Buyers
Enterprise AI agents are making purchasing decisions based solely on data quality, price, and speed—rendering traditional sales relationships obsolete. Discover why your business model must evolve now.
All Content
590 posts
Why Developers Don’t Know Security
Explore why developers often overlook security in coding and how education gaps contribute. Discover strategies to integrate security into development from the start and foster a culture of secure coding.
Security Pros Guide to Optimizing LinkedIn
Discover how to stand out in the security industry with an optimized LinkedIn profile. This guide covers crafting a unique summary, selecting impactful skills, and highlighting non-work activities.
7 Types of CISO
Explore the diverse landscape of CISO roles, from Executive to Buried CISOs, and learn how companies can avoid mismatches by aligning the right talent with specific security leadership needs.
RSA: Are We Talking About The Right Things?
RSA's focus misses the mark, overlooking key issues like nurturing security talent, expanding the workforce, and measuring program effectiveness. Let's reshape the conversation for next year's event.
Are We Running Out of CISOs?
Explore the growing demand and dwindling supply of CISOs as fear of breaches drives security leaders to avoid top roles. Discover why experience with breaches is becoming a valued asset.
My Morning Routine
Discover the intricacies of a balanced morning routine shaped by family dynamics, work demands, and personal habits. Learn how adaptability and planning create a seamless start to each day.
How I Work On The Road
Discover how to stay productive while traveling with essential tech tools and gadgets. Explore the featured gear from a recent Minneapolis trip and learn how to optimize your mobile workspace.
How We End Up With Too Many Security Policies
Explore the pitfalls of policy bloat in security management, as the article delves into redundant policies, misplaced guidelines, and tech-enforced rules, advocating for streamlined security measures.
You Have Too Many Security Policies
Explore the pitfalls of excessive security policies that prioritize compliance over true protection. Discover how simplifying and reducing policies can enhance your organization's security posture.
Security is Not A Special Snowflake
Explore how to integrate security seamlessly into technology processes, transforming it from a policing role to a collaborative partner, ensuring robust systems without hindering innovation.
How I Curate Security Longreads
Discover how Jay Schulman curates his Security Longreads newsletter in just 15 minutes a week. Learn his efficient process using tools like Feedly, Pocket, and Goodbits to stay informed and share insights.
Why Your Strategy Needs a Consultant
Discover why hiring a consultant can transform your strategy by providing fresh perspectives and overcoming internal limitations, much like FDR's need for a second medical opinion revealed critical insights.