0
Skip to Content
Seeking Eureka
Home
Insights
Projects
Seeking Eureka
Home
Insights
Projects
Home
Insights
Projects
Centralization by Stealth: Proactive Governance to Protect the Blockchain from the Majority Attack
Patrick Lefler 10/7/25 Patrick Lefler 10/7/25

Centralization by Stealth: Proactive Governance to Protect the Blockchain from the Majority Attack

Read More
Merkle Trees: The Engine of Bitcoin’s Scalability and Integrity
Patrick Lefler 10/2/25 Patrick Lefler 10/2/25

Merkle Trees: The Engine of Bitcoin’s Scalability and Integrity

Read More
Beyond VaR: Expected Shortfall as the New Standard for Strategic Resilience
Patrick Lefler 9/30/25 Patrick Lefler 9/30/25

Beyond VaR: Expected Shortfall as the New Standard for Strategic Resilience

Read More
Move Fast and Don’t Break Things: Embedding Risk-Awareness Without Killing Innovation
Patrick Lefler 9/25/25 Patrick Lefler 9/25/25

Move Fast and Don’t Break Things: Embedding Risk-Awareness Without Killing Innovation

Read More
Leading Beyond the Breach: A Framework for Decisive Action in a Cyber Incident
Patrick Lefler 9/23/25 Patrick Lefler 9/23/25

Leading Beyond the Breach: A Framework for Decisive Action in a Cyber Incident

Read More
From Anomaly to Action: A Risk Manager’s Guide to Applying Benford’s Law
Patrick Lefler 9/18/25 Patrick Lefler 9/18/25

From Anomaly to Action: A Risk Manager’s Guide to Applying Benford’s Law

Read More
Using Poisson Distribution Analysis to Drive Financial Risk Insight
Patrick Lefler 9/11/25 Patrick Lefler 9/11/25

Using Poisson Distribution Analysis to Drive Financial Risk Insight

Read More
Leveraging the Endowment Effect for Project Risk Management
Patrick Lefler 8/26/25 Patrick Lefler 8/26/25

Leveraging the Endowment Effect for Project Risk Management

Read More
The Problem with “Normal” Thinking: A Primer on Extreme Value Theory
Patrick Lefler 8/19/25 Patrick Lefler 8/19/25

The Problem with “Normal” Thinking: A Primer on Extreme Value Theory

Read More
The Cybersecurity Data Deluge: Drowning in Information, Starved of Action
Patrick Lefler 8/14/25 Patrick Lefler 8/14/25

The Cybersecurity Data Deluge: Drowning in Information, Starved of Action

Read More
Poisson Distribution: A Cybersecurity Defender’s Ally in Detecting Brute-Force Attacks
Patrick Lefler 8/12/25 Patrick Lefler 8/12/25

Poisson Distribution: A Cybersecurity Defender’s Ally in Detecting Brute-Force Attacks

Read More