Content
Strategic insights on blockchain, AI, and leadership in disruption.

Post-Quantum Cryptography: Why Your Encryption Walls Will Fail
Quantum computing will obsolete current encryption in hours, not centuries. Learn why enterprise security strategies must fundamentally shift now.
Recent Essays

Market Access: Why Your Nephew Beats Hedge Funds
Institutional finance is losing the access game to retail traders with 24/7 market exposure. Explore how blockchain's permissionless design is reshaping market structure.

Quantum Computing Timeline: From Someday to 2028
Quantum computing arrives in 2-3 years, not 10. Leaders must act now on post-quantum cryptography or risk data breaches.

Should You Train AI to Replace Your Job?
Knowledge workers are voluntarily training AI to automate their roles for short-term pay. But the real cost of obsolescence is far higher than companies are offering.

Coach Your Team to Manage Less and Lead More
Leaders ask the wrong time-management question. Discover why coaching teams to solve problems independently, protecting learning time, and prioritizing health are strategic investments that compound success.
All Content
562 posts
Security Longreads for August 7, 2015
Explore the latest in information security with Security Longreads, featuring highlights from Black Hat 2015, FBI's TrueCrypt decryption, and Tesla's quick security patch. Discover engaging reads beyond security too!
The Only Security Certifications You Actually Need
Discover which security certifications truly boost your job prospects. Focused on employer demand, this guide highlights the essential CISSP and CISA for security and audit roles.
On Hacking Guns, Toilets, Semis and More
Explore the sensationalized world of hacking at Blackhat, as we delve into vulnerabilities in smart guns, toilets, and truck tracking systems. Learn to focus on real security risks, not media hype.
An Argument for the Decentralization of Security
Explore why decentralizing security in corporate mergers can reduce risks. This blog delves into maintaining separate networks, security teams, and PCI environments to minimize vulnerabilities.
Online Backup
Discover how CrashPlan offers a secure online backup solution with its multi-layered security model, ensuring your data's safety and privacy. Learn to configure these features for optimal protection.
More Advice on Growing Women in Security
Explore strategies to boost female representation in information security by valuing diverse skills beyond technical expertise. Learn how fostering inclusion and early encouragement can bridge the gender gap.
Security Longreads for July 24, 2015
Dive into July 24, 2015's Security Longreads, featuring in-depth insights on cryptographic backdoors, Jeep hacking, overhyped cyber threats, and Twitter's security strategies, plus other intriguing topics.
3 InfoSec Women on Women in Security
Explore insights from three women in information security as they discuss challenges, the importance of diversity, and strategies to encourage more women to pursue careers in this dynamic field.
We Need More Women in Security
Explore the urgent need for more women in security, highlighting barriers and solutions like mentorship and structured learning. Discover how diversifying the field can strengthen the industry.
Security Longreads for July 17, 2015
Explore the latest in security with insights on stolen fingerprints, the rising role of Chief Security Architects, and the US government's hiring challenges, plus why productivity myths and gadgets might be overrated.
Know Thyself, Advice from CISO Dan Fitzgerald
Discover insightful career advice from CISO Dan Fitzgerald on navigating the highs and lows of a security role. Learn how self-awareness and adaptability can guide you to a fulfilling InfoSec journey.
More Inspiring Advice from InfoSec Pros
Discover essential advice from InfoSec pros on advancing your career. Learn how to blend learning, doing, and teaching, while embracing challenges and continuous growth in this dynamic field.