Mandos Way Blog

Articles to help you align cybersecurity with business objectives and become an impactful cybersecurity leader.

Please hold while we check our collection.

❌ Something's gone wrong. Please try again.

✅ Success! Check your inbox for our email.

I will never spam or sell your information.

Become an Impactful Cybersecurity Leader

Proven strategies to align cybersecurity with business goals
Leadership tips for building and managing high-performing security teams
Practical how-to guides addressing enterprise cybersecurity challenges
Insights on securely adopting and implementing AI in your organization
Cyber Strategy OS - a curated toolkit for cybersecurity leaders/span>
100% free, unsubscribe anytime!

Read by professionals from

Apple
Philips
Toyota
Palo Alto Networks
Zscaler
SentinelOne

Latest from Mandos

Leadership
How to Transition from Individual Cybersecurity Contributor to Strategic Leader by Nikoloz Kokhreidze

How to Transition from a Security Engineer or Analyst to a Strategic Leader

Unlock your leadership potential in cybersecurity. Learn to communicate business value, build strategic networks, and embrace mentorship to bridge the gap between technical expertise and executive roles.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 4 min read
Cybersecurity
Building intelligence-led SOC, practical guide for cybersecurity leaders

3 Critical Steps to Build an Intelligence-Led SOC

Learn how to transform your Security Operations Center from reactive to proactive. Discover key strategies to overcome common challenges and build an intelligence-led SOC.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 5 min read
AI
AI data pipelines and security

CISO's Guide to Securing the AI Data Pipeline

CISOs face unprecedented challenges in securing AI data pipelines. Learn about the complexities, risks, and a three-step guide to fortify your AI security posture.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 6 min read
Cybersecurity
Choosing a Security Operations Center: In-House, Hybrid, or Outsourced

Choosing a Security Operations Center: In-House, Hybrid, or Outsourced

Struggling to choose between an in-house, hybrid or outsourced Security Operations Center (SOC)? This guide helps you weigh pros, cons, costs, and business goals to make an informed decision.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 14 min read
Cybersecurity
The CrowdStrike Falcon Sensor update on July 19, 2024 caused global system outages, exposing risks of single vendor reliance.

The Perils of Platform Dependence: Lessons from the Great CrowdStrike Meltdown

The CrowdStrike Falcon Sensor update on July 19, 2024 caused global system outages, exposing risks of single vendor reliance. Learn why a resilient hybrid approach, open architectures and unified management is needed for effective cybersecurity architectures.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 9 min read
Cybersecurity Leadership
Nikoloz Kokhreidze from Mandos: 5 Strategies for Cybersecurity Leaders to Influence Without Authority

5 Strategies for Cybersecurity Leaders to Influence Without Authority

Discover 5 powerful strategies for cybersecurity leaders to influence without authority. Learn how to build trust, tell compelling stories, cultivate champions, leverage reciprocity, and align security with business outcomes.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 6 min read
Cybersecurity Leadership
The challenges of ciso role and how to succeed mandos nikoloz kokhreidze

The CISO Role is Becoming Impossible - Here is How to Succeed

Learn about the challenges that make the CISO role feel impossible, from the ever-expanding scope of responsibilities to the war for cybersecurity talent. Discover strategies for success, including staying agile, partnering with the business, and prioritizing ruthlessly.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 6 min read
Cybersecurity AI
assess security risks in ai solutions mandos nikoloz kokhreidze

Assessing the Security Risks of an AI Solution During Procurement

Learn how to effectively assess the security risks of AI solutions during procurement. Our comprehensive guide covers risk identification, assessment, mitigation strategies, and best practices for secure AI adoption.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 6 min read
Cybersecurity AI
boost your cyber threat intelligence with the right llm and AI service nikoloz kokhreidze mandos

The Best LLM for Cyber Threat Intelligence: OpenAI, Anthropic, Groq

We compare AI services and LLMs for cyber threat intelligence to find the best one for speed, context and cost.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 21 min read

Popular Tags

AI
AI
Leadership
Leadership
Cybersecurity
Cybersecurity