Content
Strategic insights on blockchain, AI, and leadership in disruption.

One Question That Reveals Your Quantum Readiness
Ask your CISO this single question to assess quantum cryptography readiness. Most enterprises are unprepared for 2027 federal mandates.
Recent Essays

Stablecoins: Making Money Programmable
Stablecoins solve payment infrastructure problems, not currency ones. Discover how programmable money enables micropayments and reshapes financial services architecture.

The Future of SaaS: From UI Lock-in to Commoditized APIs
Explore how AI orchestration is transforming SaaS platforms into invisible infrastructure, reshaping enterprise software strategy and competitive positioning.

When Cyber Insurers Demand Quantum-Safe Cryptography
Cyber insurers will drive post-quantum cryptography adoption faster than regulations. Watch their underwriting criteria shift as actuarial models price harvest-now-decrypt-later risk.

Banking's Future: Interface or Plumbing?
As AI agents and fintech apps become primary interfaces, banks face a critical choice: control customer relationships or become invisible infrastructure competing on margins.
All Content
600 posts
7 Types of CISO
Explore the diverse landscape of CISO roles, from Executive to Buried CISOs, and learn how companies can avoid mismatches by aligning the right talent with specific security leadership needs.
RSA: Are We Talking About The Right Things?
RSA's focus misses the mark, overlooking key issues like nurturing security talent, expanding the workforce, and measuring program effectiveness. Let's reshape the conversation for next year's event.
Are We Running Out of CISOs?
Explore the growing demand and dwindling supply of CISOs as fear of breaches drives security leaders to avoid top roles. Discover why experience with breaches is becoming a valued asset.
My Morning Routine
Discover the intricacies of a balanced morning routine shaped by family dynamics, work demands, and personal habits. Learn how adaptability and planning create a seamless start to each day.
How I Work On The Road
Discover how to stay productive while traveling with essential tech tools and gadgets. Explore the featured gear from a recent Minneapolis trip and learn how to optimize your mobile workspace.
How We End Up With Too Many Security Policies
Explore the pitfalls of policy bloat in security management, as the article delves into redundant policies, misplaced guidelines, and tech-enforced rules, advocating for streamlined security measures.
You Have Too Many Security Policies
Explore the pitfalls of excessive security policies that prioritize compliance over true protection. Discover how simplifying and reducing policies can enhance your organization's security posture.
Security is Not A Special Snowflake
Explore how to integrate security seamlessly into technology processes, transforming it from a policing role to a collaborative partner, ensuring robust systems without hindering innovation.
How I Curate Security Longreads
Discover how Jay Schulman curates his Security Longreads newsletter in just 15 minutes a week. Learn his efficient process using tools like Feedly, Pocket, and Goodbits to stay informed and share insights.
Why Your Strategy Needs a Consultant
Discover why hiring a consultant can transform your strategy by providing fresh perspectives and overcoming internal limitations, much like FDR's need for a second medical opinion revealed critical insights.
Responding to Every E-mail: Two Months In
Discover the journey and challenges of responding to every e-mail for two months. Explore the surprising reactions and insights gained, and why some e-mails may no longer warrant a reply.
Why You Need A Good Boss
A comprehensive discussion on the importance of having a good boss.