My Work From Home Office
David Moulton David Moulton

My Work From Home Office

What do you need to succeed as a WFH employee? Discipline, maturity, a company that has the connectivity tools to allow it, sure. And a bit of kit doesn't hurt. This is an ongoing entry as I document my remote work setup, my command center, if you will. I started working remotely full-time in April of 2011 as part of the amazing team at Cynergy. After that, I worked remotely at Salesforce as a leader of a global team. I returned to the office in the early days of my tenure with IBM, but when the pandemic sent the world home, I returned to the efficiency and rhythm of remote work. I am now a remote employee with Palo Alto Networks. Over more than a decade, I have logged what works or doesn't for me, and this is where I share my thoughts on the topic.

Read More
Why We Stopped Making Content and Started Answering Questions
David Moulton David Moulton

Why We Stopped Making Content and Started Answering Questions

The 10+5 Framework started as a simple content prioritization tool: 10 best assets, 5 in development. But the real breakthrough came when we stopped thinking about content formats and started with buyer questions instead. This single shift transformed how we align content to campaigns, buyer needs, and journey stages. Simple change, profound impact.

Read More
The State of Slop
David Moulton David Moulton

The State of Slop

Marketing departments worldwide are gorging themselves at an all-you-can-eat buffet of algorithmic slop. What you're getting is the literary equivalent of Cheez Whiz.

Today AI-generated sludge is flooding the market so having an authentic human voice is becoming the rarest and therefore most valuable resource. The more sophisticated AI becomes, the more valuable human weirdness becomes.

Stop outsourcing your thinking and start using these gazillion-dollar machined as kick-ass partners to unlock your authentic voice and original ideas.

Read More
How Companies Sabotage Themselves with User-Hostile Design
David Moulton David Moulton

How Companies Sabotage Themselves with User-Hostile Design

You tap through from LinkedIn to learn what a company does, only to find their website buried under popups for account sherpas, cookie consent banners, and strategically placed chatbots that make actually reading their content nearly impossible. Companies are spending thousands on marketing to attract qualified prospects, then driving them away with user-hostile design that prioritizes data collection over basic usability.

Read More
When Systems Break Down (And What Comes Next)
Off The Mic David Moulton Off The Mic David Moulton

When Systems Break Down (And What Comes Next)

Between data breaches that shouldn't happen, AI that's getting a little too curious for its own good, and that gnawing sense that everything feels stuck, it's easy to wonder if we're living through some kind of civilizational debugging session. But here's the thing about broken systems: they're often the precursor to something better. The current moment isn't just about things falling apart, it's about the opportunity to build something more thoughtful, more secure, and more human-scale.

Read More
A $10 Coupon Is Costing You Your Privacy
David Moulton David Moulton

A $10 Coupon Is Costing You Your Privacy

Imagine picking up your phone after lunch and discovering your AI assistant just spent an hour texting your girlfriend, sending "I love you" messages while you were offline. This terrifying moment led privacy expert Arjun Bhatnagar to a shocking realization: your phone number alone can reveal your social security number, family details, and complete digital footprint. "We give the same information to the IRS that we give to Domino's," he warns. Here's how simple habit changes can help you reclaim control of your digital life.

Read More
Your Software Is Capable of 10x More Than You Think (And Your Competitors Know It)
David Moulton David Moulton

Your Software Is Capable of 10x More Than You Think (And Your Competitors Know It)

Microsoft's CTO Kevin Scott recently identified a critical business blind spot: "capability overhang"—the growing gap between what your tools can actually do and what your teams know how to do with them. While your competitors might be leveraging automation features you didn't know existed, your organization could be using only 20% of your software's true potential, creating an invisible competitive disadvantage. The solution isn't more training for individuals—it's building systematic organizational approaches to continuously discover and deploy the hidden capabilities already sitting in your tech stack.

Read More
Attention Is the Real ROI
David Moulton David Moulton

Attention Is the Real ROI

When we launched Threat Vector in July 2023, the goal wasn’t just to publish a podcast, it was to earn attention from the people who live and breathe cybersecurity. Less than a year later, we’ve gone from 7-minute segments to 70+ full-length episodes. But for me, success isn’t about how many episodes we ship. It’s about how much of our audience’s time—and trust—we’ve earned. In a world obsessed with clicks and impressions, we’re measuring something more meaningful: attention.

Read More
Reflecting on CyberMarketingCon
David Moulton David Moulton

Reflecting on CyberMarketingCon

Presenting live at CyberMarketingCon was an energizing experience, especially seeing how much more dynamic the conversation with David Ebder became on stage compared to our practice sessions. The audience’s engagement and thoughtful questions reinforced just how powerful live discussions can be.

Read More
Are You Leaving the Backdoor Open for Hackers?
Off The Mic David Moulton Off The Mic David Moulton

Are You Leaving the Backdoor Open for Hackers?

What Caught My Attention This Week?

  • China Breaches U.S. Treasury: A stark reminder of the dangers lurking in supply chain vulnerabilities.

  • AI Deepfakes Target Elections: Sanctions reveal how Russia and Iran weaponize disinformation campaigns.

  • Chrome Extensions Compromised: Trusted tools turned into silent data thieves by hackers.

And on Threat Vector this week, I had a conversation with Margaret Kelly about the hidden dangers of cloud misconfigurations. From loose permissions to exposed infrastructure, we explored how these gaps are a dream for nation-state attackers like those behind the Treasury breach. This is a reminder that fixing your cloud is no longer optional—it’s urgent.

Read More
Are EVs Worth the Hype? My Experience with the Mustang Mach-E
David Moulton David Moulton

Are EVs Worth the Hype? My Experience with the Mustang Mach-E

Is switching to an EV really worth it? After leasing the Mustang Mach-E, I’ve discovered how this sporty electric SUV redefines convenience, fun, and practicality. From home charging to exhilarating acceleration, here’s what makes the Mach-E a game-changer—and where it still has room to improve.

Read More
What Happens When Cyber Hygiene Fails?
David Moulton David Moulton

What Happens When Cyber Hygiene Fails?

What happens when cyber hygiene fails? Businesses face breaches, data loss, and sometimes devastating financial fallout—all because of overlooked basics like updates, strong passwords, and multi-factor authentication.

Cybercriminals thrive on these gaps, turning simple mistakes into major crises. But it doesn’t have to be this way. By mastering a few foundational habits, individuals and organizations can turn the tables and build resilience against even the most sophisticated attacks.

Read More