Search AI security & leadership insights...

How I Think About Security

Real insights on building security programs that accelerate growth instead of slowing it down

Latest Security, AI & Leadership Insights

Don't fall behind - Mandos subscribers are already implementing these strategies

growth mindset, potential, goals, risks, motivation

How to Think with Growth

Unlock your full potential by understanding the Growth Mindset Definition. Learn actionable steps for long-term vision, risk-taking, and a positive mindset.

3 min read
AI for phishing, risks, potential misuse, end-user motivations

Using AI to For Phishing Attacks

Delve into the potential misuse of ChatGPT for phishing campaigns. Learn it can generate phishing texts, HTML emails, and Python code for credential harvesting.

7 min read
vendor security assessment, risks, cybersecurity

Establishing a Robust Vendor Security Assessment Strategy

Implement a robust vendor and supply chain security assessment strategy. Learn key steps to define risk appetite, identifying vendors, and ongoing monitoring.

3 min read
team leader qualities, communication, decision-making, delegation, motivation

The Essential Qualities of an Effective Team Leader

Discover the essential qualities of an effective team leader. Learn how clear communication, problem-solving, and positivity can drive team success.

2 min read
Discover how to use iOS Shortcuts to enhance your Threat Hunting capabilities with PocketHunt.

PocketHunt - Threat Hunting with iOS Shortcuts

PocketHunt is a minimalistic Threat Hunting tool for iOS. Quick lookups, threat intel and seamless API integration. Turn your iPhone into a Threat Hunting tool.

3 min read
Pi-Hole, ad blocker, privacy, browsing speed

Ultimate Guide to Pi-Hole: Boost Privacy and Browsing Speed

Explore the ins and outs of Pi-Hole, the network-based ad blocker that enhances privacy and browsing speed. Set up on Raspberry Pi for a secure experience.

12 min read
Vulnerabilities, security, organization

Addressing Vulnerability Management in Corporate Environment

Explore why only 26% of vulnerabilities get closed and how effective risk communication and process optimization can improve corporate vulnerability management.

3 min read
Information security, pillars, organization

Pillars of Information Security

Discover the 7 key pillars vital for robust information security. Learn how leadership, procedures, and risk assessment drive secure growth.

3 min read

Ready to Fix Your Security Program?

Get regular insights on building security programs that win enterprise deals, pass audits, and don't slow down your engineering team.

Trusted by security professionals at