-
Digital Sovereignty – Only Open-Source can protect your Data
The ban on Kaspersky should serve as a warning that the state can abuse all closed-source software. Only open-source can…
-
Bring your Own AI: Management Strategies for the New Shadow IT
Many organizations are slow to adopt genAI. We must take risk management seriously and start laying out strategies for dealing…
-
The Creativity Bloodbath: Another AI-Made Apocalypse?
AI-induced layoffs have hit many industries. Even creative employees aren’t safe, raising the question of what creativity is and whether…
-
AI Regulation: The Unexplained Belief in Big Brother
AI regulation is currently in vogue. Countries worldwide consider them. Yet, they won’t be effective. Join me in exploring why…
-
Why AI Will Boost Demand For Cybersecurity Talent
When listening to industry watchers extolling the promises of AI, you’d expect cybersecurity experts to soon be obsolete. AI will…
-
Five Fascinating Questions Around My Board Work
Some of my articles have gotten some interesting responses. Here are the top five questions about board work.
-
Interview: Bold Journey
My path to the boardroom had many different twists and turns. Join me at Bold Journey to explore my experience…
-
Cyberwarfare: Battlefield of the 21st Century
We often see cyberwarfare as a game between nerds in the basement. Yet, the wars in Ukraine and Gaza show,…
-
Boards Must Be On Top Of The Cybersecurity Culture
Corporate Culture, Talent Pipeline, and Shareholder Value are purviews of board oversight. Find out why boards must increase the oversight…
-
Blameless Post-Mortem: Down With The Disastrous War Room
A War Room can serve an important purpose in resolving incidents. However, they are not a good setting for post…
