-
AI in a Closing World
Non-free AI is hiding decisions and data from us. Without our ability to look into AI, we don’t know what…
-
Digital Sovereignty – Only Open-Source can protect your Data
The ban on Kaspersky should serve as a warning that the state can abuse all closed-source software. Only open-source can…
-
Bring your Own AI: Management Strategies for the New Shadow IT
Many organizations are slow to adopt genAI. We must take risk management seriously and start laying out strategies for dealing…
-
AI Regulation: The Unexplained Belief in Big Brother
AI regulation is currently in vogue. Countries worldwide consider them. Yet, they won’t be effective. Join me in exploring why…
-
Why AI Will Boost Demand For Cybersecurity Talent
When listening to industry watchers extolling the promises of AI, you’d expect cybersecurity experts to soon be obsolete. AI will…
-
Five Fascinating Questions Around My Board Work
Some of my articles have gotten some interesting responses. Here are the top five questions about board work.
-
Interview: Bold Journey
My path to the boardroom had many different twists and turns. Join me at Bold Journey to explore my experience…
-
Cyberwarfare: Battlefield of the 21st Century
We often see cyberwarfare as a game between nerds in the basement. Yet, the wars in Ukraine and Gaza show,…
-
Blameless Post-Mortem: Down With The Disastrous War Room
A War Room can serve an important purpose in resolving incidents. However, they are not a good setting for post…
-
It’s in the Culture, Embracing Stereotypes and Eliminating Blame
Many factors within an organization contribute to the stress in IT and cybersecurity. Let us explore how we can improve…
