Mandos Way Blog

Articles to help you align cybersecurity with business objectives and become an impactful cybersecurity leader.

Please hold while we check our collection.

❌ Something's gone wrong. Please try again.

✅ Success! Check your inbox for our email.

I will never spam or sell your information.

What do you get?

Proven strategies to align cybersecurity with business objectives
Leadership tips for building and managing high-performing security teams
Practical how-to guides addressing cybersecurity challenges in enterprise
Insights on securely adopting and implementing AI in your organization
Cyber Strategy OS - a curated collection of tools and resources
100% free, unsubscribe anytime!

Read by professionals from

Apple
Philips
Toyota
Palo Alto Networks
Zscaler
SentinelOne

Latest from Mandos

Cybersecurity
vendor security assessment, risks, cybersecurity

Establishing a Robust Vendor Security Assessment Strategy

Implement a robust vendor and supply chain security assessment strategy. Learn key steps to define risk appetite, identifying vendors, and ongoing monitoring.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 2 min read
Cybersecurity
Discover how to use iOS Shortcuts to enhance your Threat Hunting capabilities with PocketHunt.

PocketHunt - Threat Hunting with iOS Shortcuts

PocketHunt is a minimalistic Threat Hunting tool for iOS. Quick lookups, threat intel and seamless API integration. Turn your iPhone into a Threat Hunting tool.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 3 min read
Cybersecurity
Pi-Hole, ad blocker, privacy, browsing speed

Ultimate Guide to Pi-Hole: Boost Privacy and Browsing Speed

Explore the ins and outs of Pi-Hole, the network-based ad blocker that enhances privacy and browsing speed. Set up on Raspberry Pi for a secure experience.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 12 min read
Cybersecurity
Vulnerabilities, security, organization

Addressing Vulnerability Management in Corporate Environment

Explore why only 26% of vulnerabilities get closed and how effective risk communication and process optimization can improve corporate vulnerability management.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 2 min read
Cybersecurity
Information security, pillars, organization

Pillars of Information Security

Discover the 7 key pillars vital for robust information security. Learn how leadership, procedures, and risk assessment drive secure growth.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 3 min read

Popular Tags

AI
AI
Leadership
Leadership
Cybersecurity
Cybersecurity