Content
Strategic insights on blockchain, AI, and leadership in disruption.

The Future of SaaS: From UI Lock-in to Commoditized APIs
Explore how AI orchestration is transforming SaaS platforms into invisible infrastructure, reshaping enterprise software strategy and competitive positioning.
Recent Essays

When Cyber Insurers Demand Quantum-Safe Cryptography
Cyber insurers will drive post-quantum cryptography adoption faster than regulations. Watch their underwriting criteria shift as actuarial models price harvest-now-decrypt-later risk.

Banking's Future: Interface or Plumbing?
As AI agents and fintech apps become primary interfaces, banks face a critical choice: control customer relationships or become invisible infrastructure competing on margins.

SaaS Pricing in the Age of AI Agents
Per-seat pricing collapses when AI agents perform 1,000x more actions than humans. Discover why usage-based models are essential for SaaS survival.

CNSA 2.0 Compliance: Your 2027 Quantum-Ready Deadline
Federal contractors must achieve quantum-resistant encryption by January 2027. Understand CNSA 2.0 requirements, supply chain implications, and your migration roadmap essentials.
All Content
598 posts
Security Longreads — Issue
Dive into "Security Longreads," your weekly guide to must-read articles on information security and intriguing topics for security professionals. Explore digital vulnerabilities and offbeat insights today!
One Week with Dash App
Discover how the Dash App transforms driving with insightful data on your habits and costs. Explore its features, from tracking mileage to deciphering the check engine light, and rethink your driving experience.
Why To Do Apps Don't Work
Explore why most to-do apps miss the mark in aiding task collection, despite their features. Discover the author's journey through various apps and the unique challenges faced in the "collect phase.
Today We Fight Back
Join the fight against mass surveillance! On February 11th, unite in protest to protect internet freedom and honor Aaron Swartz's legacy. Stand up for privacy and democracy at thedaywefightback.org.
The FitBit Effect
Explore the evolving world of Bluetooth-enabled medical devices and the crucial need for robust data security. Learn how to safeguard sensitive health information in this new era of mobile connectivity.
Updated for 2014: Online Classes for the Information Security Professional
Explore the latest online courses for information security professionals, featuring 11 top picks across computer security, in-depth topics, and InfoSec-related areas to enhance your cybersecurity skills.
Are Airline Kiosks The Next Fraud Vector?
Explore how airline kiosks might become the next target for credit card fraud, drawing parallels to the infamous Target breach. Learn about potential vulnerabilities and the implications for travelers.
Securing Amazon Web Services - Jay Schulman
The complete guide to securing Amazon Web Services.
Running Ghost on Heroku
Learn how to effortlessly deploy Ghost on Heroku with a few simple tweaks in your config.js file. Follow our step-by-step guide to set up, test, and push your Ghost blog live in no time!
4 Coursera Classes for the InfoSec Professional
Discover key Coursera classes for info security pros, including cryptography and risk management, along with unique offerings like equine nutrition, to broaden your skills and perspectives.