Search AI security & leadership insights...

How I Think About Security

Real insights on building security programs that accelerate growth instead of slowing it down

Latest Security, AI & Leadership Insights

Don't fall behind - Mandos subscribers are already implementing these strategies

imposter syndrome in cybersecurity and how to conquer it

You Feel Like an Imposter and That's Okay: Here's How to Build Up Confidence

Cybersecurity imposter syndrome is practically universal among leaders. Learn how deliberate failure builds genuine confidence no certification provides.

5 min read
Ai in reverse engineering 3 ai reverse engineering tools

AI Can Now Reverse Engineer Malware - 3 Tools For Your Arsenal

Three powerful AI tools enable analysts to automate complex binary analysis. See how security teams can reverse engineer without additional headcount.

7 min read
Mandos cybersecurity leadership article on The Builder Strikes Back: How Security Teams Must Reclaim Their Engineering Edge

The Builder Strikes Back: How Security Teams Must Reclaim Their Engineering Edge

The vendor dependency trap is crippling security teams. AI is democratizing building capabilities that were once vendor-exclusive. Develop these five critical skills now before your competitors do.

7 min read
5 AI Agent Types Modern Security Teams Must Know About

5 AI Agent Types Modern Security Teams Must Know About

I've decoded the AI agent types that are revolutionizing enterprise cybersecurity programs. Are you leveraging all five? Discover which ones your security team is missing and how you can use them for your advantage.

8 min read
How to Transition from Individual Cybersecurity Contributor to Strategic Leader by Nikoloz Kokhreidze

How to Transition from a Security Engineer or Analyst to a Strategic Leader

Unlock your leadership potential in cybersecurity. Learn to communicate business value, build strategic networks, and embrace mentorship to bridge the gap between technical expertise and executive roles.

5 min read
Building intelligence-led SOC, practical guide for cybersecurity leaders

3 Critical Steps to Build an Intelligence-Led SOC

Learn how to transform your Security Operations Center from reactive to proactive. Discover key strategies to overcome common challenges and build an intelligence-led SOC.

5 min read
AI data pipelines and security

CISO's Guide to Securing the AI Data Pipeline

CISOs face unprecedented challenges in securing AI data pipelines. Learn about the complexities, risks, and a three-step guide to fortify your AI security posture.

6 min read
Choosing a Security Operations Center: In-House, Hybrid, or Outsourced

Choosing a Security Operations Center: In-House, Hybrid, or Outsourced

Struggling to choose between an in-house, hybrid or outsourced Security Operations Center (SOC)? This guide helps you weigh pros, cons, costs, and business goals to make an informed decision.

14 min read
The CrowdStrike Falcon Sensor update on July 19, 2024 caused global system outages, exposing risks of single vendor reliance.

The Perils of Platform Dependence: Lessons from the Great CrowdStrike Meltdown

The CrowdStrike Falcon Sensor update on July 19, 2024 caused global system outages, exposing risks of single vendor reliance. Learn why a resilient hybrid approach, open architectures and unified management is needed for effective cybersecurity architectures.

10 min read

Ready to Fix Your Security Program?

Get regular insights on building security programs that win enterprise deals, pass audits, and don't slow down your engineering team.

Trusted by security professionals at