Never Underestimate the Rebels — They’re the Ones Who Can Actually Move the System

Author: cgoncalves

  • Never Underestimate the Rebels — They’re the Ones Who Can Actually Move the System

    Never Underestimate the Rebels — They’re the Ones Who Can Actually Move the System

    Some people are easy to praise. They follow instructions, avoid conflict, and never question the way things are done. Then there are the others — the ones who push back, ask uncomfortable questions, and don’t know when to let something go. These are the ones often labeled as troublemakers. But more often than not, they’re the only ones actually paying attention.

    They’re not disruptive for the sake of it. They’re rebels — and that rebelliousness usually comes from seeing clearly what others choose to ignore. They’re not resisting change. They’re demanding it.

    Too often, they’re dismissed as difficult. Labeled as arrogant. Or told, directly, to stop being a problem. But these people — the ones who refuse to nod along quietly — are often the ones who drive real change.

    I’ve seen it firsthand. One of my challenges as a leader came when I was asked to lead a newly formed team with value to uncover and the freedom to shape what that would look like.

    One of the first people assigned to the team shared something with me even before we officially started working together.

    He had been working in a team responsible — among other things — for writing rules and procedures. And while he was technically capable, it was clear that the job wasn’t extracting his best. Someone with his sharpness, speed, and clarity of thought was stuck operating inside a rigid framework — ironically, he’d soon join what we internally started calling the Freestyle Team.”

    I’ve been told I should stop laying down the law,” he said. “That I come off as the guy who always needs to say how things should be done.”

    That comment came from that previous role — and it stuck with him. It made him question whether it was worth speaking up again.

    But I didn’t see it that way. Yes, he was impatient. He didn’t have much tolerance for bureaucracy, and he pushed hard for things to improve — fast. But he was smart, experienced, and he was right.

    I told him, “Don’t hold back. We need more people who care enough to speak up when something’s not working — and who actually know what they’re talking about.

    ”What others saw as overstepping, I saw as urgency. He wasn’t trying to control — he was trying to fix what was broken. And in this new team, that kind of clarity was exactly what we needed.

    In any organization, especially large ones, it’s easy to reward obedience and penalize friction. The quiet, compliant employee is easier to manage. But change never starts with the quiet. It starts with the ones who are restless. Who are frustrated. Who demand better. It starts with the rebels.

    But here’s the thing — if you don’t listen to them, if you don’t give them a real role in shaping the future, one of two things will happen. Either they’ll shut down and start nodding along like everyone else, saying “that’s just the way things are” — or they’ll leave.

    In both cases, the organization loses. Not just a sharp voice, but the very push that could’ve sparked progress.

    In my case, that so-called rebel was exactly what the team needed. He helped shape the mission. He questioned assumptions. He moved fast and challenged me, too — and that made all of us better.

    Leadership isn’t about keeping people in line. It’s about looking beyond the rough edges to understand what someone really brings to the table — even if it comes wrapped in frustration or sharp criticism. Sometimes the hardest voices to manage are the ones carrying the most insight. The challenge is not to silence them, but to help channel that energy into something constructive.

    So the next time someone on your team is labeled as too intense, too critical, or — my favorite — “always laying down the law,” ask yourself: are they actually the problem… or are they trying to solve one nobody else wants to look at?

  • We Need Less Fluffy Language and More Clear Thinking in Cybersecurity

    We Need Less Fluffy Language and More Clear Thinking in Cybersecurity

    There’s a particular genre of language that shows up in almost every cybersecurity report, press release, vendor pitch, or CISO recommendation: security must be robust, solutions should be advanced, systems must be resilient, and threats are always sophisticated. It’s the poetry of the unexamined, the PR sheen applied to technical failure.

    Take robust security. What does that even mean? What does robust protect against that, say, basic or adequate security doesn’t? Is it a measure of uptime? Coverage? Detection capabilities? Resilience under attack?

    Most of the time, “robust” is a placeholder for we don’t really know how this works, but it sounds solid. It’s the cybersecurity equivalent of calling a car “sporty” without specifying the engine. The irony? Many of the systems labeled “robust” fail under the most mundane of attacks — misconfigurations, phishing, default credentials, or unpatched dependencies. Apparently, “robust” doesn’t mean verified, proven, or audited. It just means we’re hoping you won’t ask.

    Then there’s the phrase advanced tools. Every vendor has them. Every CISO is “leveraging” them. And every breach report retroactively claims that “we should implement advanced tools to detect and respond.” But which tools, exactly? What made them advanced? Did they apply behavioral analytics? Correlate signals across domains? Or just produce prettier dashboards?

    When everything is labeled “advanced,” the term loses all discriminatory power. Worse, it implies that the solution to systemic issues is always just a smarter tool away — never better processes, governance, or culture. “Advanced” becomes a way to outsource responsibility to technology. And that’s dangerous.

    The word sophisticated is practically the industry’s safe word. It appears in breach disclosures like clockwork, usually to imply that the attack was so cleverly executed, no reasonable defense could’ve stopped it. But if your system was compromised because someone reused a password or clicked a fake login form, we’re not dealing with sophistication. We’re dealing with competence — on the attacker’s part, and a lack of it on ours.

    Calling every intrusion “sophisticated” shifts blame away from structural flaws and toward the mythical prowess of the adversary. It’s a rhetorical move, not an analytical one. And it doesn’t help anyone.

    Another favorite: resilient architectures. What does that even look like? Redundancy? Immutable infrastructure? Backup strategies? “Resilient” is often just another way of saying “we hope it doesn’t break too badly.” But that doesn’t answer the critical question: resilience under what conditions, with what mitigations, and at what cost?

    This language problem isn’t cosmetic. It actively undermines our understanding of risk. Buzzwords don’t make systems safer. They make failures easier to excuse. The use of vague, inflated terminology creates an illusion of maturity — and an environment where assumptions replace analysis.

    It’s not enough to say security is strong. We need to define how and why. Don’t tell me the system is robust. Show me the threat models, controls, and test results. Don’t say you use advanced tools. Describe the data sources and detection logic. Don’t label a threat as sophisticated unless you can explain its TTPs, and why your defenses failed.

    We don’t need more powerful adjectives. We need more precise thinking — and more honest communication.

  • Quantum Computing and Cyber Security: Separating Signal from Noise

    Quantum Computing and Cyber Security: Separating Signal from Noise

    For the past decades, quantum computing has occupied a strange space in cybersecurity discourse — somewhere between genuine scientific interest and marketing-fueled doomsaying. We’re told it’s coming to break cryptography and render all our defenses obsolete. And yet, here we are.

    Seventeen years after my first contact with quantum computing during my physics degree, we’re still signing our software with RSA, securing web traffic with ECC, and hashing passwords the same way. The predicted cryptographic collapse has yet to arrive — and not for lack of trying. So what gives?

    What Quantum Computers Actually Do

    Let’s start with some reality: quantum computers are not general-purpose machines. They won’t replace your laptop, run your IDE, or brute-force every password on your system overnight. They’re purpose-built to solve a narrow set of mathematical problems — problems that do include factoring large integers (bad news for RSA), but not, for example, bypassing multi-factor authentication or exploiting zero-days.

    The ability to break public-key cryptography stems from one algorithm: Shor’s. It’s brilliant, but it requires a level of quantum scale and error correction that we are still far from achieving. Despite headlines, today’s “quantum computers” remain noisy, limited, and experimental.

    Post-Quantum Cryptography Isn’t a Future Concept — It’s a Present Standard

    What’s often overlooked is that our response to the theoretical risk has already matured. NIST has completed its selection of quantum-resistant algorithms. Organizations across the public and private sectors are beginning migrations — not in panic, but as part of long-term planning. We don’t need fearmongering; we need implementation roadmaps.

    The actual risk isn’t that we won’t have quantum-safe cryptography. It’s that we’ll still be running vulnerable legacy systems when quantum capabilities do become viable. And let’s be clear: that’s a problem we already have with non-quantum threats today.

    Beware the Quantum Echo Chamber

    There’s also an uncomfortable truth we need to address: some of the loud voices about quantum risk have a vested interest in keeping the threat alive.

    “Quantum cybersecurity consultant” is a job title that only exists because of fear about quantum. Many in these roles lack formal training in quantum mechanics or cryptography. Yet their LinkedIn posts and webinars often treat speculation as inevitability and theoretical risk as operational crisis.

    That doesn’t mean quantum computing is irrelevant. But we should question the incentives behind any claim that it’s an urgent existential threat. And we should certainly be skeptical when the solution conveniently involves buying a proprietary “quantum-safe” appliance.

    What Sensible Preparation Actually Looks Like

    If you’re not designing cryptographic protocols, you don’t need to dive into quantum math. What you should be doing is:

    • Performing threat modeling: Where in your systems does data need to remain secure for decades? That’s where quantum becomes relevant.
    • Staying informed: Understand the roadmap for quantum computing advancements and NIST’s post-quantum standards. No need to follow every paper — just keep up with the milestones.
    • Planning migrations: Especially for long-term confidentiality, like government archives, health records, or industrial IP. Start now, move gradually.

    This is about posture, not panic.

    The Real Bottom Line

    Quantum computing deserves respect, not reverence. It’s a fascinating and complex area of research, and it will have an impact — eventually. But framing it as the sword of Damocles hanging over cybersecurity is neither honest nor helpful.

    The real work ahead isn’t in reinventing cryptography. It’s in upgrading our infrastructure, deprecating insecure systems, and making sure that when quantum does arrive, we’ve already adapted.

    So no, quantum isn’t going to “break security”. But if we let hype cloud our judgment and delay rational planning, we just might break it ourselves.

    AI helped me write this article, but the thinking and opinions are all mine.

  • Is Threat Intel Answering the Right Questions?

    Is Threat Intel Answering the Right Questions?

    I’m excited to share that, in addition to my main presentation at RSAC 2025, I’ll be facilitating a Birds of a Feather session called “Is Threat Intel Answering the Right Questions?” This will be an interactive discussion—no slides, no scripted lecture—just a chance for us to examine what really matters in cyber threat intelligence.

    Why This Topic?

    In the world of CTI, many teams focus on who is behind an attack (attribution) and what artifacts (IOCs) might block or detect it. But are these elements enough to cover the “right questions” that defenders must address every day? Attackers can easily switch IP addresses and domains, and an organization may not always benefit from deep actor profiling.

    The session aims to explore how we can turn threat intel into more actionable insights—especially in areas like TTPs (tactics, techniques, and procedures), where defenders often find the best long-term value.

    What to Expect

    • Open Conversation

    We’ll kick off with key questions around whether IoCs alone suffice, if attribution is overused, and how TTPs might fill in gaps. Then we’ll hand the mic (literally) around for everyone to weigh in.

    • Real-World Perspectives

    Whether you’re a seasoned threat intel analyst or just starting to integrate CTI, this BoF is a space to share experiences, debate approaches, and learn from peers.

    • Practical Takeaways

    Expect to leave with at least one or two insights—maybe a new method for prioritizing intel or a fresh perspective on balancing who vs. how. Our collective stories often spark the best ideas.

    Join the Discussion

    If you’ll be at RSAC 2025, drop by and lend your voice! Is threat intel truly answering the questions defenders need answered—or is there a disconnect between intel feeds and actual security outcomes? Let’s talk candidly about what works, what doesn’t, and how we can steer CTI toward more meaningful results.

    (Feel free to contact me if you have any pre-session questions or want to share initial thoughts. See you at RSAC!)

  • I’m Speaking at RSA Conference 2025! Join Me in San Francisco

    I’m Speaking at RSA Conference 2025! Join Me in San Francisco

    I’m thrilled to share that I’ll be speaking at RSA Conference 2025, one of the biggest cybersecurity events in the world. It’s an incredible opportunity to connect with industry experts, exchange ideas, and discuss the latest advancements in cybersecurity.

    My session, “Lessons Learned from Implementing an Intel-Based Purple Teaming Process”, will take place on Saturday, May 1st 12:20 PDT as part of the Security Strategy & Architecture track.

    In this talk, I’ll dive into:

    ✔️ How to integrate threat intelligence-based purple teaming into an organization
    ✔️ Practical challenges and lessons learned along the way
    ✔️ Using MITRE ATT&CK to guide testing and prioritize TTPs for adversary simulation
    ✔️ How this approach enhances risk assessment and improves security posture

    This is a topic I’m passionate about, as it blends real-world threat intelligence with red and blue team collaboration to drive meaningful security improvements. If you’re working in threat intelligence, red teaming, blue teaming, or risk management, this session will provide practical insights to help elevate your security strategy.

    Through this session, I hope to spark conversations, share what has worked (and what hasn’t), and learn from others in the field. I’d love to connect with you at RSAC 2025—whether at my session or around the event. If you’re attending, feel free to reach out!

    More details about my session here: https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1728065297917001WxUx

    Let’s make RSA Conference 2025 an opportunity to learn, share, and strengthen our cybersecurity community. See you in San Francisco!