Search AI security & leadership insights...

How I Think About Security

Real insights on building security programs that accelerate growth instead of slowing it down

Latest Security, AI & Leadership Insights

Don't fall behind - Mandos subscribers are already implementing these strategies

company a does not use security-driven growth and fails, company on the right uses security-driven growth model to succeed

Introduction to Security-Driven Growth

Transform your organization with a Security-Driven Growth. Learn why CISOs and tech leaders need to turn cybersecurity from a cost center to a growth catalyst.

10 min read
clop ransomware ttp, analysis

Cracking CLOP: Inside the Tactics of Cybercrime's Most Wanted

An in-depth analysis of the CLOP cybercrime group's TTPs and the financial aspects of their operations. Learn about their evolution, and impact on cybersecurity

11 min read
 Broken shield computer shield, symbolizing the recent data leak incident and its implications for user data security.

VirusTotal Data Leak

Unpacking the VirusTotal data leak incident that exposed approximately 5,600 users' details, including employees of intelligence agencies and large companies.

3 min read
Illustration of a secured CI/CD pipeline representing the NSA & CISA guide on cybersecurity best practices

Cybersecurity Guide for Improving the CI/CD Pipeline

Explore NSA & CISA-backed strategies for CI/CD security. Understand the importance of security scanning, vulnerability management, secrets management, and more.

4 min read
Ten key strategies to fortify an organization's cybersecurity posture

10 Key Strategies to Boost Your Organization's Cybersecurity

Discover 10 key cybersecurity strategies to fortify your organization. Learn how AI impacts cybersecurity and how to turn challenges into growth opportunities.

4 min read
Common pitfalls in AI development and strategies to avoid them

8 Common Pitfalls in AI Development and How to Avoid Them

Avoid common mistakes in AI implementation to drive success. Learn how to focus on data quality, team assembly, and model transparency for effective AI adoption

4 min read
Image representing the Digital Operational Resilience Act (DORA) and its impact on the EU financial sector

Understanding DORA Regulation: A Guide for CISOs

Comprehensive guide to the Digital Operational Resilience Act (DORA) for the EU financial sector. Learn about DORA's objectives and impact on your organization.

8 min read
A stressed cybersecurity professional at a computer, symbolizing the issue of burnout in the cybersecurity field.

Navigating Burnout in Cybersecurity: A Guide for CISOs

Explore why burnout in cybersecurity is rising and how CISOs can effectively manage this pressing issue. Learn proven strategies for productivity in your team.

8 min read
AI_spectrum, machine_learning, deep_learning, weak_AI, strong_AI, super_AI, conscious_AI

Navigating the AI Spectrum

Explore the AI spectrum, from weak AI to conscious AI. Understand the relationship between AI, Machine Learning, and Deep Learning, and their applications.

8 min read

Ready to Fix Your Security Program?

Get regular insights on building security programs that win enterprise deals, pass audits, and don't slow down your engineering team.

Trusted by security professionals at