Content
Strategic insights on blockchain, AI, and leadership in disruption.

AI Agents Are Breaking Vendor Lock-In Economics
AI agents are dismantling traditional SaaS pricing models by assembling best-of-breed solutions in milliseconds. Learn how usage-based billing replaces vendor lock-in.
Recent Essays

AI Agents Are Disrupting Enterprise Sales
AI purchasing agents evaluate vendors in seconds based on data, price, and speed—not relationships. Enterprise sales teams face extinction as loyalty becomes measured in milliseconds.

Why AI Makes Taste Your Most Valuable Skill
As AI automates execution, knowing what good looks like becomes your competitive edge. Learn how taste and decisiveness replace technical skills in the AI era.

AI Agents Are Your New Enterprise Buyers
Enterprise AI agents are making purchasing decisions based solely on data quality, price, and speed—rendering traditional sales relationships obsolete. Discover why your business model must evolve now.

Harvest Now, Decrypt Later: Your Data At Risk
Intelligence agencies are recording encrypted traffic today to decrypt when quantum computers arrive. Learn why your sensitive data needs post-quantum protection now, not later.
All Content
589 posts
Security Longreads — Issue #17
Explore the latest issue of Security Longreads, featuring in-depth articles on major data breaches, innovative tech solutions, and privacy concerns in education. Stay informed on key security insights!
Security Longreads — Issue #16
Dive into Security Longreads Issue #16, featuring in-depth analyses of recent security breaches, social engineering threats, and innovative exploits. Stay informed and ahead with these essential reads.
On 10 Weeks of Security Longreads
Discover the journey of creating the "Security Longreads" newsletter, exploring the challenges of curating in-depth security articles for both technical and mainstream audiences over the past 10 weeks.
Security Longreads — Issue
Dive into "Security Longreads," your weekly guide to must-read articles on information security and intriguing topics for security professionals. Explore digital vulnerabilities and offbeat insights today!
One Week with Dash App
Discover how the Dash App transforms driving with insightful data on your habits and costs. Explore its features, from tracking mileage to deciphering the check engine light, and rethink your driving experience.
Why To Do Apps Don't Work
Explore why most to-do apps miss the mark in aiding task collection, despite their features. Discover the author's journey through various apps and the unique challenges faced in the "collect phase.
Today We Fight Back
Join the fight against mass surveillance! On February 11th, unite in protest to protect internet freedom and honor Aaron Swartz's legacy. Stand up for privacy and democracy at thedaywefightback.org.
The FitBit Effect
Explore the evolving world of Bluetooth-enabled medical devices and the crucial need for robust data security. Learn how to safeguard sensitive health information in this new era of mobile connectivity.
Updated for 2014: Online Classes for the Information Security Professional
Explore the latest online courses for information security professionals, featuring 11 top picks across computer security, in-depth topics, and InfoSec-related areas to enhance your cybersecurity skills.
Are Airline Kiosks The Next Fraud Vector?
Explore how airline kiosks might become the next target for credit card fraud, drawing parallels to the infamous Target breach. Learn about potential vulnerabilities and the implications for travelers.
Securing Amazon Web Services - Jay Schulman
The complete guide to securing Amazon Web Services.
Running Ghost on Heroku
Learn how to effortlessly deploy Ghost on Heroku with a few simple tweaks in your config.js file. Follow our step-by-step guide to set up, test, and push your Ghost blog live in no time!