Mandos Way Blog

Articles to help you align cybersecurity with business objectives and become an impactful cybersecurity leader.

Please hold while we check our collection.

❌ Something's gone wrong. Please try again.

✅ Success! Check your inbox for our email.

I will never spam or sell your information.

Become an Impactful Cybersecurity Leader

Proven strategies to align cybersecurity with business goals
Leadership tips for building and managing high-performing security teams
Practical how-to guides addressing enterprise cybersecurity challenges
Insights on securely adopting and implementing AI in your organization
Cyber Strategy OS - a curated toolkit for cybersecurity leaders/span>
100% free, unsubscribe anytime!

Read by professionals from

Apple
Philips
Toyota
Palo Alto Networks
Zscaler
SentinelOne

Latest from Mandos

Cybersecurity
Risk Appetite, Risk Management, Contingency Planning, Data Protection

Defining Your Organization's Risk Appetite

Learn to define your organization's risk appetite. Master risk assessments, periodic reviews, and security controls for a robust risk management strategy.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 3 min read
Cybersecurity
security operations center, team, processes, technologies

Establishing a Security Operations Center

Explore key elements for setting up a Security Operations Center (SOC). Learn about essential roles, processes, and technologies for effective cybersecurity.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 5 min read
Leadership
growth mindset, potential, goals, risks, motivation

How to Think with Growth

Unlock your full potential by understanding the Growth Mindset Definition. Learn actionable steps for long-term vision, risk-taking, and a positive mindset.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 3 min read
AI Cybersecurity
AI for phishing, risks, potential misuse, end-user motivations

Using AI to For Phishing Attacks

Delve into the potential misuse of ChatGPT for phishing campaigns. Learn it can generate phishing texts, HTML emails, and Python code for credential harvesting.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 7 min read
Cybersecurity
vendor security assessment, risks, cybersecurity

Establishing a Robust Vendor Security Assessment Strategy

Implement a robust vendor and supply chain security assessment strategy. Learn key steps to define risk appetite, identifying vendors, and ongoing monitoring.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 2 min read
Leadership
team leader qualities, communication, decision-making, delegation, motivation

The Essential Qualities of an Effective Team Leader

Discover the essential qualities of an effective team leader. Learn how clear communication, problem-solving, and positivity can drive team success.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 2 min read
Cybersecurity
Discover how to use iOS Shortcuts to enhance your Threat Hunting capabilities with PocketHunt.

PocketHunt - Threat Hunting with iOS Shortcuts

PocketHunt is a minimalistic Threat Hunting tool for iOS. Quick lookups, threat intel and seamless API integration. Turn your iPhone into a Threat Hunting tool.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 3 min read
Cybersecurity
Pi-Hole, ad blocker, privacy, browsing speed

Ultimate Guide to Pi-Hole: Boost Privacy and Browsing Speed

Explore the ins and outs of Pi-Hole, the network-based ad blocker that enhances privacy and browsing speed. Set up on Raspberry Pi for a secure experience.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 12 min read
Cybersecurity
Vulnerabilities, security, organization

Addressing Vulnerability Management in Corporate Environment

Explore why only 26% of vulnerabilities get closed and how effective risk communication and process optimization can improve corporate vulnerability management.

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 2 min read

Popular Tags

AI
AI
Leadership
Leadership
Cybersecurity
Cybersecurity