Content
Strategic insights on blockchain, AI, and leadership in disruption.

One Question That Reveals Your Quantum Readiness
Ask your CISO this single question to assess quantum cryptography readiness. Most enterprises are unprepared for 2027 federal mandates.
Recent Essays

Stablecoins: Making Money Programmable
Stablecoins solve payment infrastructure problems, not currency ones. Discover how programmable money enables micropayments and reshapes financial services architecture.

The Future of SaaS: From UI Lock-in to Commoditized APIs
Explore how AI orchestration is transforming SaaS platforms into invisible infrastructure, reshaping enterprise software strategy and competitive positioning.

When Cyber Insurers Demand Quantum-Safe Cryptography
Cyber insurers will drive post-quantum cryptography adoption faster than regulations. Watch their underwriting criteria shift as actuarial models price harvest-now-decrypt-later risk.

Banking's Future: Interface or Plumbing?
As AI agents and fintech apps become primary interfaces, banks face a critical choice: control customer relationships or become invisible infrastructure competing on margins.
All Content
600 posts
Building Great Security Metrics
Discover the power of effective security metrics to gauge progress and drive improvements. Learn how to measure key processes, avoid common pitfalls, and leverage metrics for career growth and risk reduction.
Get Engaged In Local Security Groups
Discover how to strengthen your local security network by engaging with organizations like OWASP, ISACA, ISSA, and more. Enhance your career through local meetups and conferences.
Security Longreads for August 7, 2015
Explore the latest in information security with Security Longreads, featuring highlights from Black Hat 2015, FBI's TrueCrypt decryption, and Tesla's quick security patch. Discover engaging reads beyond security too!
The Only Security Certifications You Actually Need
Discover which security certifications truly boost your job prospects. Focused on employer demand, this guide highlights the essential CISSP and CISA for security and audit roles.
On Hacking Guns, Toilets, Semis and More
Explore the sensationalized world of hacking at Blackhat, as we delve into vulnerabilities in smart guns, toilets, and truck tracking systems. Learn to focus on real security risks, not media hype.
An Argument for the Decentralization of Security
Explore why decentralizing security in corporate mergers can reduce risks. This blog delves into maintaining separate networks, security teams, and PCI environments to minimize vulnerabilities.
Online Backup
Discover how CrashPlan offers a secure online backup solution with its multi-layered security model, ensuring your data's safety and privacy. Learn to configure these features for optimal protection.
More Advice on Growing Women in Security
Explore strategies to boost female representation in information security by valuing diverse skills beyond technical expertise. Learn how fostering inclusion and early encouragement can bridge the gender gap.
Security Longreads for July 24, 2015
Dive into July 24, 2015's Security Longreads, featuring in-depth insights on cryptographic backdoors, Jeep hacking, overhyped cyber threats, and Twitter's security strategies, plus other intriguing topics.
3 InfoSec Women on Women in Security
Explore insights from three women in information security as they discuss challenges, the importance of diversity, and strategies to encourage more women to pursue careers in this dynamic field.
We Need More Women in Security
Explore the urgent need for more women in security, highlighting barriers and solutions like mentorship and structured learning. Discover how diversifying the field can strengthen the industry.
Security Longreads for July 17, 2015
Explore the latest in security with insights on stolen fingerprints, the rising role of Chief Security Architects, and the US government's hiring challenges, plus why productivity myths and gadgets might be overrated.