Categories
Artificial Intelligence Education Innovation Reading

Latest Read: HBR’s 10 Must Reads 2026

HBR’s 10 Must Reads 2026 from Harvard Business Review.

HBR's 10 Must Reads 2026: The Definitive Management Ideas of the Year by Harvard Business Review

As 2023 was coming to a close, I found myself diving into HBR’s 10 Must Reads for 2024. It was a great way to get a feel for the management ideas shaping the year ahead. Then came the 2025 edition, and now, here I am again—starting 2026 with HBR’s latest collection.

This is for both new and experienced leaders seeking insights, and advice to propel their organizations forward in the new year.

To no surprise, AI remains a key read for organizations. The focus “Bring everyone on board with your AI efforts” is addressing the much needed broad participation in AI adoption. This is even more important in 2026 as models have been updated in 2025 to bring new reasoning models that can propel organizations forward, only if the deployment touches all employees.

However a risk based approach will save organizations from overspending and unauthorized egress of organizational data.

Categories
Cyberinfrastructure Education Reading

Latest Read: Code of Honor

The Code of Honor: Embracing Ethics in Cybersecurity by Ed Skoudis and Dr. Paul J. Maurer.

The Code of Honor: Embracing Ethics in Cybersecurity by Paul J. Maurer and Ed Skoudis

Ed holds a BS in Electrical Engineering from the University of Michigan and a MS in Information Networking from Carnegie Mellon. Today he is the President of the SANS Technology Institute. Paul holds a M.Div.from Gordon-Conwell Theological Seminary and PhD in Political Science from Claremont Graduate University. Today he is the President of Montreat College.

I found this to be one of the most insightful books on cybersecurity and a must read for anyone in the fields of IT, AI, or IR. Jon outlines key elements for cybersecurity teams to X: Espionage (Bletchley Park), Sabotage (Stuxnet), Subversion (2016 US Election Interference), and Cyber Power (China).

It is very welcoming to see Mariano addressing machine learning for predictive cybersecurity. Mariano introduces statistical methods and machine learning easily accessible to security teams with Bayesian inference. Examples predictive detection, anomaly identification, and early warning signs is proving how AI is moving any cybersecurity program from reactive to proactive.

Mariano is including Python scripts and Jupyter-based workflows, providing technically savvy security teams a direct path to experimentation and deployment in their internal test deployments.

This book certainly provides cybersecurity teams with a practical roadmap for driving a data-driven mindset. This can be an excellent resources for organizational leaders to understand business in the age of aggressive malware and data breach announcements.

Categories
Cyberinfrastructure Education Innovation Reading

Latest Read: Data-Driven Cybersecurity

Data-Driven Cybersecurity: Reducing risk with proven metrics by Mariano Mattei.

Data-Driven Cybersecurity Reducing risk with proven metrics by Mariano Mattei

Mariano holds a Masters in Cyber Defense and Information Security from Temple University. She is the former Director Governance, Risk, and Compliance at Layer 8 Security, and CISO at Mattei. Today Mariano is VP Cybersecurity and CISO at Azzur.

It is very welcoming to see Mariano addressing machine learning for predictive cybersecurity. Mariano introduces statistical methods and machine learning easily accessible to security teams with Bayesian inference. Examples predictive detection, anomaly identification, and early warning signs is proving how AI is moving any cybersecurity program from reactive to proactive.

Mariano is including Python scripts and Jupyter-based workflows, providing technically savvy security teams a direct path to experimentation and deployment in their internal test deployments.

This book certainly provides cybersecurity teams with a practical roadmap for driving a data-driven mindset. This can be an excellent resources for organizational leaders to understand business in the age of aggressive malware and data breach announcements.

Categories
Cyberinfrastructure Education Innovation Reading

Latest Read: Age of Deception

Age of Deception: Cybersecurity As Secret Statecraft (Cornell Studies in Security Affairs) by Jon R. Lindsay.

Age of Deception: Cybersecurity as Secret Statecraft by John Lindsey

Jon holds a PhD in political science from the Massachusetts Institute of Technology and an M.S. in computer science and B.S. in symbolic systems from Stanford University. He served in the US Navy with operational assignments in Europe, Latin America, and the Middle East. Today Jon is an Associate Professor at the School of Cybersecurity and Privacy at Georgia Tech. His research explores the role of emerging technology in global security.

I found this to be certainly one of the most insightful books on cybersecurity and a must read for anyone working in the fields of IT, AI, or IR. He reveals how cybersecurity has elevated to impact national security and international relations, resulting in secret statecraft. In fact, Jon introduces the statecraft of cybersecurity by revising Espionage (Bletchley Park), Sabotage (Stuxnet), Subversion (2016 US Election Interference), and Cyber Power (China).

He begins by updating the history of espionage at Bletchley Park. This will certainly be an amazing insight to many readers who only know the Turing story or the 2014 movie The Imitation Game, of the early efforts at Bletchley Park revealing the challenges the British faced in confronting Enigma.

Categories
Artificial Intelligence Education Innovation Reading

Latest Read: LLM-Based Solutions


Large Language Model-Based Solutions: How to Deliver Value with Cost-Effective Generative AI Applications by Shreyas Subramanian.

Large Language Model-Based Solutions: How to Deliver Value with Cost-Effective Generative AI Applications by Shreyas Subramanian

Shreyas holds a PhD in Aerospace Engineering from Purdue University and MS in Mechanical Engineering from Wright State University. He is the former Director of Research at Robust Analytics. Today he is Principal Data Scientist at Amazon Web Services.

Here is a good, very practical guide for those who seek to build and deploy cost-effective LLM-based solutions. From selecting a model, pre-and post-processing, prompt engineering, and fine tuning. Shreyas is certainly providing insights for optimizing inference and affordable architectures for typical applications. So today, generative AI value is found at the intersection of performance and cost. Howver organizations must optimize their infrastructure in order to reduce cloud costs.

Shreyas is certainly emphasizing the “biggest” model is not always the best. Model Selection and Foundation should be a wise, smaller approach provides developers to focus on domain-specific models. This requires less computational resources.