Content
Strategic insights on blockchain, AI, and leadership in disruption.

Post-Quantum Cryptography: Why Your Encryption Walls Will Fail
Quantum computing will obsolete current encryption in hours, not centuries. Learn why enterprise security strategies must fundamentally shift now.
Recent Essays

Market Access: Why Your Nephew Beats Hedge Funds
Institutional finance is losing the access game to retail traders with 24/7 market exposure. Explore how blockchain's permissionless design is reshaping market structure.

Quantum Computing Timeline: From Someday to 2028
Quantum computing arrives in 2-3 years, not 10. Leaders must act now on post-quantum cryptography or risk data breaches.

Should You Train AI to Replace Your Job?
Knowledge workers are voluntarily training AI to automate their roles for short-term pay. But the real cost of obsolescence is far higher than companies are offering.

Coach Your Team to Manage Less and Lead More
Leaders ask the wrong time-management question. Discover why coaching teams to solve problems independently, protecting learning time, and prioritizing health are strategic investments that compound success.
All Content
562 posts
Security Longreads for July 10th, 2015
Explore the week's top security stories, including government encryption access issues and a hacking firm's breach. Dive into Symantec's insights on hacker motives and the Mob's tech use, plus a sales analysis.
Inspiring Advice from 5 InfoSec Pros
Unlock your InfoSec career potential with advice from five industry pros. Learn to balance tech skills with business acumen, improve communication, and master application security for a successful future.
15 Career Tips from Matt Konda
Discover 15 insightful career tips from Matt Konda, blending personal growth, networking, and strategic thinking to advance your information security career. Embrace change, learn from mistakes, and seek mentorship.
So Many Things Can Kill You, Don’t Let It Be Work
Discover key strategies for maintaining work-life balance and avoiding burnout in this insightful blog post. Learn how to manage stress, take meaningful breaks, and prioritize what truly matters.
The Ultimate Coursera Guide for the InfoSec Professional
Unlock your InfoSec potential with our comprehensive Coursera guide, featuring essential courses to boost your cybersecurity skills and expand your tech knowledge. Start learning today!
You Are A Salesperson
Unlock the secrets to selling your security ideas internally. Learn why thinking like a salesperson is crucial for security professionals to gain support and funding from their organizations.
My Summer Reading List
Dive into a curated summer reading list blending insightful blogs and captivating books. Explore tech trends, social media dynamics, and historical narratives, perfect for career growth and personal enrichment.
Information Security Career Path
Explore a dynamic guide to navigating the diverse paths in information security careers, uncovering unique journeys, evolving roles, and salary insights. Share your thoughts and help refine this essential roadmap!
What Does China Want With…
Explore the hidden motivations behind major security breaches like Anthem and OPM. Discover how stolen personal data can be used for competitive advantage and marketing, and why it's crucial to protect all data.
Future Proof Your Security Job
Discover how to secure your future in the evolving information security field by adapting to technological advancements, understanding business processes, and embracing continuous learning.
Do You Still Want to be a Fireman?
Explore how shifting aspirations can keep your security career future-proof. Discover why continual learning and adaptability are key to thriving in an ever-evolving industry landscape.
Security Longreads for June 5, 2015
Dive into this week's Security Longreads, exploring the OPM breach linked to Anthem, Netflix's security in agile development, insights on the CISO's role, and a review of Google Photo's data-mining features.