Content
Strategic insights on blockchain, AI, and leadership in disruption.

AI Agent Skills: The Security Nightmare Nobody's Talking About
AI agents can access files, APIs, and move money—but we're downloading their capabilities from untrusted sources. Here's why agent skills pose a greater security risk than model jailbreaking.
Recent Essays

Why Prediction Markets Replace Traditional Polling
Prediction markets like Polymarket are displacing traditional pollsters by aligning incentives with accuracy. Financial services leaders should shift from polling reports to market-based sentiment data.

Tokenization: The Freight Train Disrupting Finance
Discover how tokenization and prediction markets are fundamentally reshaping financial services—and why traditional firms are building yesterday's solutions for tomorrow's world.

SMS Security Crisis: Why Crypto Scams Keep Working
Explore how blockchain technology and cryptographic signatures can solve SMS-based crypto scams—and why user behavior, not technology, remains the real barrier.

AI Won't Replace You—Being Average Will
Learn why execution skills are becoming obsolete and how to shift from following instructions to creating strategic value in the AI era.
All Content
519 posts
The 14 Best YouTube Videos to Grow Your Security Career
Discover the top 14 YouTube videos to enhance your information security career, covering foundational skills, security metrics, management, application security, and awareness in quick, engaging formats.
Why Security Needs DevOps
Explore why embracing DevOps is key for enhancing security, reducing human errors, and minimizing vulnerabilities in application deployment cycles by integrating development, infrastructure, and security.
Security Longreads for August 14, 2015
Dive into the latest Security Longreads, featuring thought-provoking insights on cybersecurity challenges, Oracle's CSO controversy, and a two-year-old automotive vulnerability. Plus, explore engaging reads on conflict aversion and productivity.
Building Great Security Metrics
Discover the power of effective security metrics to gauge progress and drive improvements. Learn how to measure key processes, avoid common pitfalls, and leverage metrics for career growth and risk reduction.
Get Engaged In Local Security Groups
Discover how to strengthen your local security network by engaging with organizations like OWASP, ISACA, ISSA, and more. Enhance your career through local meetups and conferences.
Security Longreads for August 7, 2015
Explore the latest in information security with Security Longreads, featuring highlights from Black Hat 2015, FBI's TrueCrypt decryption, and Tesla's quick security patch. Discover engaging reads beyond security too!
The Only Security Certifications You Actually Need
Discover which security certifications truly boost your job prospects. Focused on employer demand, this guide highlights the essential CISSP and CISA for security and audit roles.
On Hacking Guns, Toilets, Semis and More
Explore the sensationalized world of hacking at Blackhat, as we delve into vulnerabilities in smart guns, toilets, and truck tracking systems. Learn to focus on real security risks, not media hype.
An Argument for the Decentralization of Security
Explore why decentralizing security in corporate mergers can reduce risks. This blog delves into maintaining separate networks, security teams, and PCI environments to minimize vulnerabilities.
Online Backup
Discover how CrashPlan offers a secure online backup solution with its multi-layered security model, ensuring your data's safety and privacy. Learn to configure these features for optimal protection.
More Advice on Growing Women in Security
Explore strategies to boost female representation in information security by valuing diverse skills beyond technical expertise. Learn how fostering inclusion and early encouragement can bridge the gender gap.
Security Longreads for July 24, 2015
Dive into July 24, 2015's Security Longreads, featuring in-depth insights on cryptographic backdoors, Jeep hacking, overhyped cyber threats, and Twitter's security strategies, plus other intriguing topics.