Content

Strategic insights on blockchain, AI, and leadership in disruption.

Post-Quantum Cryptography: Why Your Encryption Walls Will Fail
January 30, 2026·6 min read
blockchain

Post-Quantum Cryptography: Why Your Encryption Walls Will Fail

Quantum computing will obsolete current encryption in hours, not centuries. Learn why enterprise security strategies must fundamentally shift now.

Recent Essays

All Content

562 posts

August 07, 2015

Security Longreads for August 7, 2015

Explore the latest in information security with Security Longreads, featuring highlights from Black Hat 2015, FBI's TrueCrypt decryption, and Tesla's quick security patch. Discover engaging reads beyond security too!

August 05, 2015

The Only Security Certifications You Actually Need

Discover which security certifications truly boost your job prospects. Focused on employer demand, this guide highlights the essential CISSP and CISA for security and audit roles.

August 03, 2015

On Hacking Guns, Toilets, Semis and More

Explore the sensationalized world of hacking at Blackhat, as we delve into vulnerabilities in smart guns, toilets, and truck tracking systems. Learn to focus on real security risks, not media hype.

July 29, 2015

An Argument for the Decentralization of Security

Explore why decentralizing security in corporate mergers can reduce risks. This blog delves into maintaining separate networks, security teams, and PCI environments to minimize vulnerabilities.

July 27, 2015

Online Backup

Discover how CrashPlan offers a secure online backup solution with its multi-layered security model, ensuring your data's safety and privacy. Learn to configure these features for optimal protection.

July 27, 2015

More Advice on Growing Women in Security

Explore strategies to boost female representation in information security by valuing diverse skills beyond technical expertise. Learn how fostering inclusion and early encouragement can bridge the gender gap.

July 24, 2015

Security Longreads for July 24, 2015

Dive into July 24, 2015's Security Longreads, featuring in-depth insights on cryptographic backdoors, Jeep hacking, overhyped cyber threats, and Twitter's security strategies, plus other intriguing topics.

July 22, 2015

3 InfoSec Women on Women in Security

Explore insights from three women in information security as they discuss challenges, the importance of diversity, and strategies to encourage more women to pursue careers in this dynamic field.

July 20, 2015

We Need More Women in Security

Explore the urgent need for more women in security, highlighting barriers and solutions like mentorship and structured learning. Discover how diversifying the field can strengthen the industry.

July 17, 2015

Security Longreads for July 17, 2015

Explore the latest in security with insights on stolen fingerprints, the rising role of Chief Security Architects, and the US government's hiring challenges, plus why productivity myths and gadgets might be overrated.

July 15, 2015

Know Thyself, Advice from CISO Dan Fitzgerald

Discover insightful career advice from CISO Dan Fitzgerald on navigating the highs and lows of a security role. Learn how self-awareness and adaptability can guide you to a fulfilling InfoSec journey.

July 13, 2015

More Inspiring Advice from InfoSec Pros

Discover essential advice from InfoSec pros on advancing your career. Learn how to blend learning, doing, and teaching, while embracing challenges and continuous growth in this dynamic field.

Jay Schulman - Blockchain & AI Strategy