Search AI security & leadership insights...

How I Think About Security

Real insights on building security programs that accelerate growth instead of slowing it down

Latest Security, AI & Leadership Insights

Don't fall behind - Mandos subscribers are already implementing these strategies

cisos influence board get buy-in mandos nikoloz kokhreidze

CISO's Guide for Board's Buy-in on Cybersecurity

Ditch the fear tactics to get the board's buy-in for cybersecurity initiatives. Learn how to present cybersecurity as a growth enabler, quantify impact and more

4 min read
define cybersecurity initiatives aligned with business goals mandos nikoloz kokhreidze

Define Cybersecurity Initiatives That Align with Business Goals

Explore key methodologies for aligning cybersecurity initiatives with business goals. Discover actionable steps and examples to identify business drivers.

6 min read
ai startup cybersecurity mistakes mandos nikoloz kokhreidze

5 Mistakes AI Startups Make About Cybersecurity

Learn about common mistakes AI startups make in data privacy, DevSecOps, access management, and employee training. Get actionable tips to grow with confidence.

4 min read
board member conversing with cybersecurity team CISO

Why Executives Treat Cybersecurity as an Operational Issue

Explore the six key reasons executives view cybersecurity as an operational issue rather than a strategic asset. Learn what prevents a security-driven growth.

6 min read
company a does not use security-driven growth and fails, company on the right uses security-driven growth model to succeed

Introduction to Security-Driven Growth

Transform your organization with a Security-Driven Growth. Learn why CISOs and tech leaders need to turn cybersecurity from a cost center to a growth catalyst.

10 min read
clop ransomware ttp, analysis

Cracking CLOP: Inside the Tactics of Cybercrime's Most Wanted

An in-depth analysis of the CLOP cybercrime group's TTPs and the financial aspects of their operations. Learn about their evolution, and impact on cybersecurity

11 min read
 Broken shield computer shield, symbolizing the recent data leak incident and its implications for user data security.

VirusTotal Data Leak

Unpacking the VirusTotal data leak incident that exposed approximately 5,600 users' details, including employees of intelligence agencies and large companies.

3 min read
Illustration of a secured CI/CD pipeline representing the NSA & CISA guide on cybersecurity best practices

Cybersecurity Guide for Improving the CI/CD Pipeline

Explore NSA & CISA-backed strategies for CI/CD security. Understand the importance of security scanning, vulnerability management, secrets management, and more.

4 min read
Ten key strategies to fortify an organization's cybersecurity posture

10 Key Strategies to Boost Your Organization's Cybersecurity

Discover 10 key cybersecurity strategies to fortify your organization. Learn how AI impacts cybersecurity and how to turn challenges into growth opportunities.

4 min read

Ready to Fix Your Security Program?

Get regular insights on building security programs that win enterprise deals, pass audits, and don't slow down your engineering team.

Trusted by security professionals at