Search security leadership articles...

From Professional to Leader

Strategies and tactics to become a confident leader in cybersecurity

Latest Cybersecurity Must-Reads

Mandos subscribers are already ahead. Don't miss out!

How to Transition from Individual Cybersecurity Contributor to Strategic Leader by Nikoloz Kokhreidze

How to Transition from a Security Engineer or Analyst to a Strategic Leader

Unlock your leadership potential in cybersecurity. Learn to communicate business value, build strategic networks, and embrace mentorship to bridge the gap between technical expertise and executive roles.

Oct 15 4 min read
Building intelligence-led SOC, practical guide for cybersecurity leaders

3 Critical Steps to Build an Intelligence-Led SOC

Learn how to transform your Security Operations Center from reactive to proactive. Discover key strategies to overcome common challenges and build an intelligence-led SOC.

Oct 8 5 min read
AI data pipelines and security

CISO's Guide to Securing the AI Data Pipeline

CISOs face unprecedented challenges in securing AI data pipelines. Learn about the complexities, risks, and a three-step guide to fortify your AI security posture.

Oct 1 6 min read
Choosing a Security Operations Center: In-House, Hybrid, or Outsourced

Choosing a Security Operations Center: In-House, Hybrid, or Outsourced

Struggling to choose between an in-house, hybrid or outsourced Security Operations Center (SOC)? This guide helps you weigh pros, cons, costs, and business goals to make an informed decision.

Sep 17 14 min read
The CrowdStrike Falcon Sensor update on July 19, 2024 caused global system outages, exposing risks of single vendor reliance.

The Perils of Platform Dependence: Lessons from the Great CrowdStrike Meltdown

The CrowdStrike Falcon Sensor update on July 19, 2024 caused global system outages, exposing risks of single vendor reliance. Learn why a resilient hybrid approach, open architectures and unified management is needed for effective cybersecurity architectures.

Jul 24 9 min read
Nikoloz Kokhreidze from Mandos: 5 Strategies for Cybersecurity Leaders to Influence Without Authority

5 Strategies for Cybersecurity Leaders to Influence Without Authority

Discover 5 powerful strategies for cybersecurity leaders to influence without authority. Learn how to build trust, tell compelling stories, cultivate champions, leverage reciprocity, and align security with business outcomes.

Jul 18 5 min read
The challenges of ciso role and how to succeed mandos nikoloz kokhreidze

The CISO Role is Becoming Impossible - Here is How to Succeed

Learn about the challenges that make the CISO role feel impossible, from the ever-expanding scope of responsibilities to the war for cybersecurity talent. Discover strategies for success, including staying agile, partnering with the business, and prioritizing ruthlessly.

Apr 17 6 min read
assess security risks in ai solutions mandos nikoloz kokhreidze

Assessing the Security Risks of an AI Solution During Procurement

Learn how to effectively assess the security risks of AI solutions during procurement. Our comprehensive guide covers risk identification, assessment, mitigation strategies, and best practices for secure AI adoption.

Apr 3 5 min read
boost your cyber threat intelligence with the right llm and AI service nikoloz kokhreidze mandos

The Best LLM for Cyber Threat Intelligence: OpenAI, Anthropic, Groq

We compare AI services and LLMs for cyber threat intelligence to find the best one for speed, context and cost.

Mar 14 21 min read

Ready to Transform from Technical Expert to Strategic Leader?

Join the Mandos community and get the insights, frameworks, and support you need to lead with confidence

Trusted by security professionals at