Content
Strategic insights on blockchain, AI, and leadership in disruption.

Post-Quantum Cryptography: Why Your Encryption Walls Will Fail
Quantum computing will obsolete current encryption in hours, not centuries. Learn why enterprise security strategies must fundamentally shift now.
Recent Essays

Market Access: Why Your Nephew Beats Hedge Funds
Institutional finance is losing the access game to retail traders with 24/7 market exposure. Explore how blockchain's permissionless design is reshaping market structure.

Quantum Computing Timeline: From Someday to 2028
Quantum computing arrives in 2-3 years, not 10. Leaders must act now on post-quantum cryptography or risk data breaches.

Should You Train AI to Replace Your Job?
Knowledge workers are voluntarily training AI to automate their roles for short-term pay. But the real cost of obsolescence is far higher than companies are offering.

Coach Your Team to Manage Less and Lead More
Leaders ask the wrong time-management question. Discover why coaching teams to solve problems independently, protecting learning time, and prioritizing health are strategic investments that compound success.
All Content
562 posts
How Can I Help You?
Explore insights from the "How Can I Help You?" survey, revealing trends in security careers and reader demographics. Discover how a revamped assessment now tailors learning paths for aspiring professionals.
How Uber Gave Me Faith in Humanity
Uber is a disruptive technology. Over the past few years, many taxi and limo drivers have been impacted by the ease of hailing a ride…
4 Ways to Evaluate Your Job
Discover four essential ways to evaluate your job, focusing on your boss, mobility, company pride, and skillset growth. Learn how to weigh these factors to make informed career decisions.
Jay’s Best of 2015
Explore Jay's top blog posts from 2015, featuring insights on security and DevOps, the CISO talent gap, and more. Discover engaging content and the stories behind each article.
How To Move From Development to Security
Discover how developers can transition into the thriving field of application security with this guide. Learn essential skills, explore the OWASP Top 10, and find resources to enhance your security mindset.
Why We Will Never Secure The Internet of Things
Explore why securing the Internet of Things (IoT) remains elusive, as most devices, made by unknown manufacturers, lack security measures. Discover the need for universal security standards.
Securing Amazon Web Services
Discover a comprehensive guide to securing your Amazon Web Services environment. This blog post compiles essential tips and resources to protect AWS accounts, EC2 instances, S3 buckets, and more.
Season 1: Masterclass
Dive into the Season 1 Masterclass podcast episode, featuring highlights and diverse perspectives from the past 12 weeks. Perfect for newcomers and a must-share with friends. Get ready for Season 2!
How To Finish 2015 Strong
Discover how to finish 2015 strong by setting clear goals for 2016. This post offers actionable steps to ensure you stay focused and prepared, even through the holiday distractions.
ISO 27017: A New Standard to Learn
Explore ISO 27017, a cloud-specific security standard that Amazon Web Services recently adopted. Learn how it complements existing ISO standards and its implications for cloud security practices.
InfoSec Does Time Management Wrong
Discover why traditional time management in IT and InfoSec falls short and learn how the "multiplier effect" can transform your workflow, boost productivity, and empower your team for long-term success.
Bonus: Thank You
Discover intriguing podcast stats in this week's bonus episode, and get ready for a special Masterclass recap of Season 1 highlights. Join us in expressing gratitude for your support!