top of page
Thought Leadership from Nelson Santini
Search
![Hammers, wrenches and nAIls!](https://static.wixstatic.com/media/f759b0_cc81854f875c427b9d72dc3a4856535d~mv2.png/v1/fill/w_236,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_cc81854f875c427b9d72dc3a4856535d~mv2.webp)
Nelson Santini
Jul 242 min read
Hammers, wrenches and nAIls!
While enjoying a short break from work I came across an article that I thought was “click bait”, until… I clicked and read it. The gist...
![Your wAI, right awAI](https://static.wixstatic.com/media/f759b0_c3844dfe2bb1487f9f0b0f4bd49da1a4~mv2.png/v1/fill/w_236,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_c3844dfe2bb1487f9f0b0f4bd49da1a4~mv2.webp)
Nelson Santini
Jul 92 min read
Your wAI, right awAI
On my morning AI read, I came across an article from Jowi Morales, discussing Microsoft and Qualcomm’s initiative to launch PCs with AI+
![Operate GenAi in High Gear!](https://static.wixstatic.com/media/f759b0_9dd10eecf5a545c495975fa107f6d31a~mv2.png/v1/fill/w_237,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_9dd10eecf5a545c495975fa107f6d31a~mv2.webp)
Nelson Santini
May 23 min read
Operate GenAi in High Gear!
Integrate GenAi applications at the process level and make them speak to each other. This is how you get to operate with Ai in high gear.
![Protect your PAM!](https://static.wixstatic.com/media/f759b0_9167d8a5972741d98340edc496c168a5~mv2.png/v1/fill/w_236,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_9167d8a5972741d98340edc496c168a5~mv2.webp)
Nelson Santini
Dec 22, 20222 min read
Protect your PAM!
We live in the real world but transact online. Our critical infrastructure, utilities, and services have heavily migrated from...
![Living out our Critical Infrastructure’s Cyber-Siege](https://static.wixstatic.com/media/f759b0_716d19f5a54f422390557e94a6658c42~mv2.png/v1/fill/w_168,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_716d19f5a54f422390557e94a6658c42~mv2.webp)
Nelson Santini
Dec 22, 20223 min read
Living out our Critical Infrastructure’s Cyber-Siege
Living out our Critical Infrastructure’s Cyber-Siege. Are we ready for the next attack to our networks?
![](https://static.wixstatic.com/media/f759b0_a73dfc9be1a74682b557d60c1124d5da~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f759b0_a73dfc9be1a74682b557d60c1124d5da~mv2.webp)
![I don’t need to see the pores on your face to proctor your exam.](https://static.wixstatic.com/media/f759b0_a73dfc9be1a74682b557d60c1124d5da~mv2.jpeg/v1/fill/w_236,h_133,fp_0.50_0.50,q_90,enc_auto/f759b0_a73dfc9be1a74682b557d60c1124d5da~mv2.webp)
Nelson Santini
Aug 28, 20223 min read
I don’t need to see the pores on your face to proctor your exam.
Distance learning is a great equalizer that delivers on the promise of knowledge maturing into wisdom. Technology is here to further that no
![](https://static.wixstatic.com/media/f759b0_56ab3bb062364d0595393ea44fc91729~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f759b0_56ab3bb062364d0595393ea44fc91729~mv2.webp)
![Ready or not, Web3.0!](https://static.wixstatic.com/media/f759b0_56ab3bb062364d0595393ea44fc91729~mv2.jpeg/v1/fill/w_237,h_133,fp_0.50_0.50,q_90,enc_auto/f759b0_56ab3bb062364d0595393ea44fc91729~mv2.webp)
Nelson Santini
Mar 3, 20222 min read
Ready or not, Web3.0!
Web 3.0 is reinventing Business, and there is little choice about it. Small and large, B2C and B2B companies alike; whether they sell to com
![“Made in the USA” … soup to nuts!](https://static.wixstatic.com/media/f759b0_e1ca3cf11c0a4677a7a14bd00888e0bc~mv2.png/v1/fill/w_236,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_e1ca3cf11c0a4677a7a14bd00888e0bc~mv2.webp)
Nelson Santini
Oct 30, 20183 min read
“Made in the USA” … soup to nuts!
I don’t want a $650BN defense budget to be “all for nothing” because we saved $0.01/chip by making it overseas.
![Crossing the generational chasm in cybersecurity views](https://static.wixstatic.com/media/f759b0_843ab73b777a45888d280ac810e1e1c6~mv2.png/v1/fill/w_236,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_843ab73b777a45888d280ac810e1e1c6~mv2.webp)
Nelson Santini
Oct 4, 20183 min read
Crossing the generational chasm in cybersecurity views
“Loose lips sink ships” doesn’t cut it alone anymore.
![Living out our Critical Infrastructure’s Cyber-Siege](https://static.wixstatic.com/media/f759b0_716d19f5a54f422390557e94a6658c42~mv2.png/v1/fill/w_168,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_716d19f5a54f422390557e94a6658c42~mv2.webp)
Nelson Santini
Sep 16, 20183 min read
Living out our Critical Infrastructure’s Cyber-Siege
Living out our Critical Infrastructure’s Cyber-Siege. Are we ready for the next attack to our networks?
![The Single Integrated Operating Plan (SIOP) Concept applied to Cyber Defense](https://static.wixstatic.com/media/f759b0_3caa0ad865d54411bbe2fab6496d0fdf~mv2.png/v1/fill/w_237,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_3caa0ad865d54411bbe2fab6496d0fdf~mv2.webp)
Nelson Santini
Feb 19, 20183 min read
The Single Integrated Operating Plan (SIOP) Concept applied to Cyber Defense
How would we respond to a full-on cyber-attack?
![Restoring Comms: It Is About More Than Bandwidth—Securing Comms Can No Longer Be an Afterthought](https://static.wixstatic.com/media/f759b0_b410305b7b384ba3847454574be0c802~mv2.png/v1/fill/w_236,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_b410305b7b384ba3847454574be0c802~mv2.webp)
Nelson Santini
Apr 17, 20173 min read
Restoring Comms: It Is About More Than Bandwidth—Securing Comms Can No Longer Be an Afterthought
We need to better factor communications and cybersecurity into emergency preparedness.
![Betting Against Downtime](https://static.wixstatic.com/media/f759b0_4a8f2e0ee70e4a92ac39873597856041~mv2.png/v1/fill/w_236,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_4a8f2e0ee70e4a92ac39873597856041~mv2.webp)
Nelson Santini
Oct 28, 20162 min read
Betting Against Downtime
It’s not a question of “if”, but a certain “when”. Your network will be attacked. Be prepared!
![The Art of War: A cybersecurity take](https://static.wixstatic.com/media/f759b0_04811523d7c64962ab18e3d34d48fa16~mv2.png/v1/fill/w_236,h_133,fp_0.50_0.50,q_95,enc_auto/f759b0_04811523d7c64962ab18e3d34d48fa16~mv2.webp)
Nelson Santini
Oct 16, 20162 min read
The Art of War: A cybersecurity take
How would Sun Tzu apply his theory in today's world of cybersecurity?
![](https://static.wixstatic.com/media/f759b0_acff7bfcc76c4134a6b66eb241be2a50~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f759b0_acff7bfcc76c4134a6b66eb241be2a50~mv2.webp)
![Mind The Gap!](https://static.wixstatic.com/media/f759b0_acff7bfcc76c4134a6b66eb241be2a50~mv2.jpg/v1/fill/w_237,h_133,fp_0.50_0.50,q_90,enc_auto/f759b0_acff7bfcc76c4134a6b66eb241be2a50~mv2.webp)
Nelson Santini
Apr 3, 20162 min read
Mind The Gap!
How do we eliminate the gap between body cam footage, and where it resides?
bottom of page