Content

Strategic insights on blockchain, AI, and leadership in disruption.

One Question That Reveals Your Quantum Readiness
April 03, 2026·6 min read
Leadership

One Question That Reveals Your Quantum Readiness

Ask your CISO this single question to assess quantum cryptography readiness. Most enterprises are unprepared for 2027 federal mandates.

Recent Essays

All Content

600 posts

August 12, 2015

Building Great Security Metrics

Discover the power of effective security metrics to gauge progress and drive improvements. Learn how to measure key processes, avoid common pitfalls, and leverage metrics for career growth and risk reduction.

August 10, 2015

Get Engaged In Local Security Groups

Discover how to strengthen your local security network by engaging with organizations like OWASP, ISACA, ISSA, and more. Enhance your career through local meetups and conferences.

August 07, 2015

Security Longreads for August 7, 2015

Explore the latest in information security with Security Longreads, featuring highlights from Black Hat 2015, FBI's TrueCrypt decryption, and Tesla's quick security patch. Discover engaging reads beyond security too!

August 05, 2015

The Only Security Certifications You Actually Need

Discover which security certifications truly boost your job prospects. Focused on employer demand, this guide highlights the essential CISSP and CISA for security and audit roles.

August 03, 2015

On Hacking Guns, Toilets, Semis and More

Explore the sensationalized world of hacking at Blackhat, as we delve into vulnerabilities in smart guns, toilets, and truck tracking systems. Learn to focus on real security risks, not media hype.

July 29, 2015

An Argument for the Decentralization of Security

Explore why decentralizing security in corporate mergers can reduce risks. This blog delves into maintaining separate networks, security teams, and PCI environments to minimize vulnerabilities.

July 27, 2015

Online Backup

Discover how CrashPlan offers a secure online backup solution with its multi-layered security model, ensuring your data's safety and privacy. Learn to configure these features for optimal protection.

July 27, 2015

More Advice on Growing Women in Security

Explore strategies to boost female representation in information security by valuing diverse skills beyond technical expertise. Learn how fostering inclusion and early encouragement can bridge the gender gap.

July 24, 2015

Security Longreads for July 24, 2015

Dive into July 24, 2015's Security Longreads, featuring in-depth insights on cryptographic backdoors, Jeep hacking, overhyped cyber threats, and Twitter's security strategies, plus other intriguing topics.

July 22, 2015

3 InfoSec Women on Women in Security

Explore insights from three women in information security as they discuss challenges, the importance of diversity, and strategies to encourage more women to pursue careers in this dynamic field.

July 20, 2015

We Need More Women in Security

Explore the urgent need for more women in security, highlighting barriers and solutions like mentorship and structured learning. Discover how diversifying the field can strengthen the industry.

July 17, 2015

Security Longreads for July 17, 2015

Explore the latest in security with insights on stolen fingerprints, the rising role of Chief Security Architects, and the US government's hiring challenges, plus why productivity myths and gadgets might be overrated.

Jay Schulman — Plan for Thursday