Insights
Here is our shared knowledge base and latest happenings concerning the industry, our partners and company.
NAVIGATING THE ‘SPAM LIKELY’ LABYRINTH
Joseph Meyer has lead successful sales teams for over 18-years in retail B2C, mid-market B2B, and in the Fortune 500 enterprise markets. His technology experience ranges from networking, voice transformation, applications, analytics, and all realms of IT and telecom. He has a passion for bridging divisions within companies to ensure that vision, infrastructure and solutions work together.
Trust is our currency.
Carraig Stanwyck joined Lou Rabon on Channel Security Secrets to dig into what’s actually happening inside security programs. Teams chasing new products while ignoring what they already own. Procurement shaping outcomes more than the people running security. Organizations operating without a clear risk appetite. And the role transparency plays when you’re trying to build trust in an environment that isn’t always built for it.
A New Recipe for Cybersecurity
Michael Meis is a security leader with a passion for architecting security programs, leading people, and developing world-class security teams. He argued that cybersecurity struggles not because teams lack funding or tools but because the structure puts too much weight on too few people. Attackers move fast and the traditional model cannot keep up.
A Letter to Anyone Wondering… Huh?
A friend in business retorted to me, “I’ve never known anyone to actively demote themselves and bring in their replacement while smiling.” Cyber security leaders think in terms of impact. They don’t ask “Is this cool?” — they ask “If this fails, what breaks for customers and the business?” That mindset promotes growth while reducing friction in business.
Connection Over Silos: What Technology Leaders Must Get Right About Customer Experience
Stacy Sherman, founder of Doing CX Right, took the stage at the Portland Summit to deliver a powerful message for technology leaders: IT and security are not just support functions. When leaders break silos, align goals, and strengthen connection across teams, they turn technology into a true competitive advantage.
Detection Is Only as Good as Its Source
At the Stealth Security Experience in Chicago, one of the partners stepped into a Shark Tank-style pitch. Chris Nyhuis, President and CEO of Vigilant, didn’t talk about integrations or buzzwords. He talked about trust.
How Leaders Are Closing the Browser Security Gap
At our Stealth Security Experience in Chicago, Cliff Moore, CISO of Wilson Sporting Goods, said it plainly: “Where the awareness ends, the technology has to pick up.” He’s right. Even world-class phishing programs still see 6 to 7 percent click-through rates. That’s not failure. That’s human nature. People click. And in global environments, that margin for error turns into hundreds of risky interactions a day.
Scaling Observability and Security: How M1 Finance Built a Data Strategy Without Compromise
At our Stealth Security Experience in Chicago, 3 Tree Tech hosted a conversation that hit on a critical challenge facing technology leaders today: how do you scale data access across your organization without compromising on cost, control, or clarity?Axiom, a featured partner, brought in a customer to help unpack that question.
Digital Executive Protection: the New Corporate Mandate
The digital landscape broadens daily as the number of devices, applications, and online services in use by businesses and consumers continuously expands. C-suite leaders and high-net-worth individuals (HNWIs) are particularly vulnerable when it comes to personal digital protection, given their public visibility, wealth, and lack of cybersecurity expertise. Knowing this, sophisticated criminals target executives’ and their families’ personal online accounts, homes, and digital footprints for financial gain, blackmail, or reputation damage.
The Myth of the Lone Wolf CISO
At the 3 Tree Tech Stealth Security Experience in Chicago, Rick Doten shut down one of the biggest misconceptions in cybersecurity: the lone wolf CISO. The idea that one person can single-handedly defend an entire organization is not just outdated, it is reckless. Security is not about heroics. At its core, it is about adaptability, relationships, and having the right people in the right places when things go sideways.
The Great POTS Phase-Out: A Donkey Kong Adventure
In the grand jungle of telecommunications, a major transformation is underway, one that even Donkey Kong himself would find challenging. The industry is tossing aside classic Plain Old Telephone Service (POTS) lines like old-school barrels. High-tech digital solutions are taking their place. This shift brings rising costs, tricky obstacles, and serious strategy from the industry’s biggest players.
Perimeter-based security is out. Zero trust is in.
In 3 Tree Tech forum keynote, Brian Wane, CEO of XQ confronted the digital age’s Goliath: sophisticated cybersecurity threats menacing organizations worldwide. Wane’s talk, dubbed “Data vs. Goliath,” didn’t just a focus on vulnerabilities; it was a call for a paradigm shift in how CISOs protect our most valuable digital assets.
How to build a cybersecurity team
Cybersecurity is more warfare than security. At a 3 Tree Tech security event, Michael Meis, Associate CISO of The University of Kansas Health System says if you want to win, you have to think strategically in such a way to conquer you adversary. If you want to learn how to build a cybersecurity team, Meis has a fascinating perspective… from Sun Tzu.
Who is Eric Skeens?
This video introduces Eric Skeens, the co-founder of 3 Tree Tech. He shares his 15 years of experience in the technology industry, explaining his journey from software to hardware and then to the telecom world.
Who is Bob Kingery?
Bob Kingery, founder and managing partner of 3 Tree Tech in Portland, Oregon, discusses his background and the mission of his company.

