Content
Strategic insights on blockchain, AI, and leadership in disruption.

Post-Quantum Cryptography: Why Your Encryption Walls Will Fail
Quantum computing will obsolete current encryption in hours, not centuries. Learn why enterprise security strategies must fundamentally shift now.
Recent Essays

Market Access: Why Your Nephew Beats Hedge Funds
Institutional finance is losing the access game to retail traders with 24/7 market exposure. Explore how blockchain's permissionless design is reshaping market structure.

Quantum Computing Timeline: From Someday to 2028
Quantum computing arrives in 2-3 years, not 10. Leaders must act now on post-quantum cryptography or risk data breaches.

Should You Train AI to Replace Your Job?
Knowledge workers are voluntarily training AI to automate their roles for short-term pay. But the real cost of obsolescence is far higher than companies are offering.

Coach Your Team to Manage Less and Lead More
Leaders ask the wrong time-management question. Discover why coaching teams to solve problems independently, protecting learning time, and prioritizing health are strategic investments that compound success.
All Content
562 posts
Are We Running Out of CISOs?
Explore the growing demand and dwindling supply of CISOs as fear of breaches drives security leaders to avoid top roles. Discover why experience with breaches is becoming a valued asset.
My Morning Routine
Discover the intricacies of a balanced morning routine shaped by family dynamics, work demands, and personal habits. Learn how adaptability and planning create a seamless start to each day.
How I Work On The Road
Discover how to stay productive while traveling with essential tech tools and gadgets. Explore the featured gear from a recent Minneapolis trip and learn how to optimize your mobile workspace.
How We End Up With Too Many Security Policies
Explore the pitfalls of policy bloat in security management, as the article delves into redundant policies, misplaced guidelines, and tech-enforced rules, advocating for streamlined security measures.
You Have Too Many Security Policies
Explore the pitfalls of excessive security policies that prioritize compliance over true protection. Discover how simplifying and reducing policies can enhance your organization's security posture.
Security is Not A Special Snowflake
Explore how to integrate security seamlessly into technology processes, transforming it from a policing role to a collaborative partner, ensuring robust systems without hindering innovation.
How I Curate Security Longreads
Discover how Jay Schulman curates his Security Longreads newsletter in just 15 minutes a week. Learn his efficient process using tools like Feedly, Pocket, and Goodbits to stay informed and share insights.
Why Your Strategy Needs a Consultant
Discover why hiring a consultant can transform your strategy by providing fresh perspectives and overcoming internal limitations, much like FDR's need for a second medical opinion revealed critical insights.
Responding to Every E-mail: Two Months In
Discover the journey and challenges of responding to every e-mail for two months. Explore the surprising reactions and insights gained, and why some e-mails may no longer warrant a reply.
Why You Need A Good Boss
A comprehensive discussion on the importance of having a good boss.
My Longest Running New Years Resolution
Discover the rollercoaster journey of a five-year-long New Year's resolution to go paperless. From tech upgrades to small victories and persistent challenges, find inspiration in the quest for digital organization.
New Years Resolutions Don’t Work
Discover why New Year's resolutions often fail and explore a fresh approach to goal-setting. Learn how timing, specificity, and regular reviews can transform your ambitions into achievements.