Retroactive Mindfulness

Is it possible to rescue mindfulness from the past? One of the most interesting lessons I’ve ever had in mindfulness came from Sam Harris in his Waking Up app. He made the argument that it’s not actually time that gives you life, because if you live 90 years on the…

News & Analysis | No. 251

I spend my time reading 3-6 books a month on security, technology, and society—and thinking about what might be coming next. Every Monday I send out a list of the best content I’ve found in the last week to around 40,000 people. It’ll save you tons of time. MY ESSAYS…

The Content Value Hierarchy (CVH)

The Four Levels of the Content Value Hierarchy It’s important for content creators—especially those in the newsletter and podcast spaces—to know what level of content they’re bringing to their audience. I highly recommend Clint’s newsletter, TL;DR Sec. In a recent conversation with a creator friend of mine, Clint Gibler, I…

News & Analysis | No. 250

You’ve reached a piece of member-only content. Subscribe If you’re already a subscriber, please login here. — If you get value from this content, you can support it directly by becoming a member. Being a member gets you access to the newsletter every week instead of just twice a month,…

News & Analysis | No. 249

I spend 5-20 hours a week consuming books, articles, and podcasts that explore the intersection of security, technology, and society. Then every Monday morning I send out the best of what I found. Sign up here >. Get the weekly version >. MY ESSAYS Operation Fortify: A US Ransomware Plan…

Everyday Threat Modeling

Threat modeling is a superpower. When done correctly it gives you the ability to adjust your defensive behaviors based on what you’re facing in real-world scenarios. And not just for applications, or networks, or a business—but for life. The Difference Between Threats and Risks This type of threat modeling is…
1 2 3 7