Knowledge Hub

Everything you need to know about working with Cyberou. Find answers to common questions about our services, workflow, pricing, and more.

Showing 47 results

How do I get started with Cyberou?

Getting started is simple. Choose your subscription plan (monthly, quarterly, or annually) and complete the sign-up process. Within 24 hours, you'll receive access to your dedicated Trello board where you can submit your first content request. Once submitted, we start working immediately with a 48-hour average turnaround time.

Getting Started

What happens after I subscribe?

After subscribing, you'll receive a welcome email with: access credentials to your private Trello board, a brief onboarding guide, contact information for any questions, and instructions on how to submit your first request. Our team will introduce themselves and be ready to start working on your content immediately.

Getting Started

Do you offer a trial or demo?

We don't offer free trials because our model is based on dedicated time allocation. However, you can subscribe for one month, submit a request, and if you're not satisfied, you can pause or cancel your subscription. Most clients stay with us long-term because they see the quality and value immediately.

Getting Started

What types of content can you create?

We specialize in cybersecurity content including: blog posts and articles, whitepapers and eBooks, case studies, technical documentation, product walkthroughs, social media content (LinkedIn, Twitter), email campaigns, press releases, security advisories, threat intelligence reports, and ghostwritten content for executives.

Services

What is security research?

Our security research service involves discovering and documenting novel cybersecurity threats, malware analysis, vulnerability research, threat actor profiling, and emerging attack techniques. This research often leads to significant media coverage and positions your brand as a thought leader. Past examples include WormGPT discovery (233 media mentions) and MatrixPDF toolkit research.

Services

How does influencer marketing work?

Our influencer marketing leverages Daniel Kelley's 100,000+ follower reach on LinkedIn. We create sponsored posts that authentically integrate your product or service, reaching cybersecurity professionals, CISOs, and decision-makers. Past campaigns have achieved 100,000-300,000+ views with high engagement and conversion rates.

Services

Can you write about technical products?

Absolutely. We specialize in technical cybersecurity content. Our team has hands-on experience with security tools, understands complex technical concepts, and can explain them clearly to your target audience. We regularly write about pentesting tools, SIEM platforms, EDR solutions, cloud security, and more.

Services

How do you handle SEO optimization?

Yes, all content is SEO-optimized following best practices: keyword research and integration, proper heading structure, meta descriptions, internal linking suggestions, and content structured for featured snippets. However, we focus on quality and value first. SEO is enhanced through excellent content, not the other way around.

Services

Why wouldn't I just hire a full-time writer?

Senior cybersecurity content writers command $100,000+ salaries plus benefits. Finding someone with both writing skills AND practical security experience is extremely rare and expensive. With us, you get: expert-level cybersecurity knowledge, professional writing skills, no benefits or overhead, flexibility to scale up or down, and multiple specialists rather than one person.

Services

What if I only have one request?

Perfect! Subscribe for one month, submit your request, we'll complete it, then pause your subscription. You're not locked into months of service you don't need. Reactivate anytime when you have more content needs. Many clients operate this way successfully.

Services

Can you deliver a set number of articles per month?

Our model is time-based, not deliverable-based. Article complexity varies widely. A quick blog post versus a comprehensive whitepaper take vastly different time. We can estimate roughly how many standard blog posts fit in a month (typically 8-12), but we don't guarantee specific numbers. Quality over quantity.

Services

Do you do webinars and videos?

We're a writing agency and don't produce video content directly. However, we can: write scripts for webinars, create supporting written materials, develop presentation outlines, and write promotional content. We have connections with video professionals if you need production services.

Services

Do you offer sales or onboarding calls?

No. Our business model relies on asynchronous communication to maximize efficiency. This keeps costs down and allows us to serve more clients better. All onboarding is via email and documentation. For questions, use Trello or email. We respond quickly and thoroughly.

Services

Do you really offer unlimited requests?

Yes. As long as your membership is active, you can file unlimited requests on your Trello board. We work on them one at a time, maintaining high quality. If you submit multiple requests, we'll work through them in order or based on your prioritization.

Pricing & Billing

What does 'one request at a time' mean?

It means we complete your current request before moving to the next one. This ensures quality and proper attention to each piece. Once a request is marked complete, we immediately start the next one in your queue. This model prevents rushed work and maintains our high standards.

Pricing & Billing

Can I pause my subscription?

Yes, you can pause anytime. If you only have occasional needs, submit your requests, we'll complete them, and you can pause until you need more content. When paused, your billing cycle stops. You can reactivate anytime, and we'll pick up where we left off.

Pricing & Billing

Why is quarterly/annually cheaper?

Longer commitments allow us to plan resources better and reduce administrative overhead. Quarterly saves you 10%, and annual saves 20% compared to monthly. These plans also lock in your rate, protecting you from any price increases during your term.

Pricing & Billing

What's included in the security research add-on?

The security research add-on includes: one major research project per month, original threat discovery and analysis, comprehensive written reports, media outreach support, and social media content based on findings. This often generates significant PR value and positions you as an industry leader.

Pricing & Billing

How much does a sponsored post cost?

Sponsored LinkedIn posts start at $1,597. This includes content creation, posting to Daniel's 100,000+ follower audience, cross-posting to Twitter, performance analytics, and guaranteed reach. The exact price depends on content complexity, campaign goals, and any special requirements.

Pricing & Billing

Do you offer refunds?

No, we don't offer refunds. Our service is time-based, meaning you're paying for dedicated expertise and time allocated to your projects. However, you can pause or cancel anytime, preventing future charges. Most clients see value immediately and stay long-term.

Pricing & Billing

How do I submit requests?

All requests are submitted via your private Trello board. Simply create a new card with: the content type (blog post, whitepaper, etc.), topic or title, key points to cover, target audience, desired length, any reference materials, and deadline if urgent. We'll acknowledge receipt and begin work immediately.

Workflow

What's the typical turnaround time?

Our average turnaround is 48 hours for most content pieces. Complex projects like whitepapers or deep research may take 3-7 days. Security research projects typically take 2-4 weeks. We'll always communicate expected timelines when we start each request.

Workflow

How do revisions work?

We offer unlimited revisions within reason to ensure you're happy with the final product. Simply comment on the Trello card with requested changes. Minor edits are typically completed within 24 hours. Note that revision time counts toward your subscription time allocation.

Workflow

Can I prioritize certain requests?

Yes, absolutely. You can reorder cards on your Trello board to indicate priority. You can also label requests as 'Urgent' or 'High Priority' in the card. Just communicate clearly, and we'll adjust our workflow accordingly.

Workflow

Do you offer rush delivery?

We aim for 48-hour delivery on most projects already. If you need something faster (24 hours or same-day), mention it in the request. We'll do our best to accommodate, though extremely urgent requests may be limited in scope or depth to meet the deadline.

Workflow

How do you handle feedback and revisions?

When we deliver content, review it and provide feedback directly on the Trello card. Be specific about what needs changing: tone adjustments, additional information, restructuring, etc. We'll implement your feedback and re-deliver, usually within 24 hours for minor revisions.

Workflow

Do you use AI to write content?

No, we don't use generative AI to create content. Every piece is researched and written by our human experts with cybersecurity experience. We do use editing tools like ProWritingAid and Grammarly to polish and refine, but these don't generate content. They improve what's already written by humans.

Content Quality

How do you ensure content quality?

Quality comes from: team members with real cybersecurity experience, thorough research on every topic, multiple review rounds before delivery, fact-checking and source verification, and your feedback incorporation. We prioritize accuracy and value over speed or volume.

Content Quality

Can you match our brand voice?

Yes. During onboarding, share your brand guidelines, past content examples, and voice preferences (formal/casual, technical/accessible, etc.). We'll adapt our writing style to match your brand. The first few pieces help us calibrate, and we improve alignment over time.

Content Quality

Do you provide sources and citations?

Yes, all content includes proper citations and sources. For technical content, we reference vendor documentation, security advisories, and reputable industry sources. For research pieces, we provide comprehensive bibliographies and attribution.

Content Quality

Can you write in different styles?

Absolutely. We adapt to your needs: technical documentation (precise, detailed), blog posts (engaging, accessible), executive content (strategic, concise), social media (punchy, shareable), whitepapers (authoritative, comprehensive), and more. Just specify your preferred style.

Content Quality

How technical can you get?

Very technical. Our team has hands-on cybersecurity experience, not just writing skills. We can explain complex topics like memory exploitation, cryptographic protocols, threat hunting techniques, reverse engineering, and more. We understand the technology, not just the terminology.

Content Quality

Do you offer ghostwriting?

Yes, ghostwriting is one of our specialties. We regularly write for founders, CTOs, CISOs, and other executives. We'll capture their voice, expertise, and perspective while handling all the writing. This positions them as thought leaders without the time investment.

Content Quality

Do you help with content strategy?

While we're primarily a content creation service, we offer strategic input. Based on our cybersecurity industry knowledge, we can suggest: trending topics worth covering, content gaps in your current strategy, angles that generate media interest, and formats that perform well. We're collaborators, not just order-takers.

Content Quality

How do you handle complex technical reviews?

For highly technical content, we recommend: providing access to subject matter experts for fact-checking, allowing extra review time, being specific about technical accuracy requirements, and accepting multiple revision rounds. We're technically proficient but recognize when specialized expertise is needed for verification.

Workflow

What information do you need to start?

To start effectively: brand guidelines and voice preferences, target audience details, any existing content or style guides, product/service information, access to relevant documentation, key messaging points, and competitor examples (what to emulate or avoid). The more context, the better the first draft.

Technical

Do you need access to our tools?

For product walkthroughs or technical documentation, yes, we may need demo access or accounts. For security tools, screenshots and documentation often suffice. We'll discuss specific needs per project and sign NDAs if required.

Technical

How do you handle confidential information?

We treat all client information as confidential by default. We're happy to sign NDAs and follow your security protocols. Content is never shared outside your organization without approval. We understand the sensitivity of security topics and handle information accordingly.

Technical

Can you work with our marketing team?

Yes. We integrate seamlessly with your existing team. We can join Slack channels, attend relevant meetings (async communication preferred), coordinate with designers for graphics, and collaborate with product marketers for accurate information. We're an extension of your team.

Technical

What tools do you use?

Primary tool is Trello for project management. For writing, we use Google Docs or Microsoft Word. For editing, we use ProWritingAid and Grammarly. For research, standard security tools and threat intelligence platforms. We're flexible and can adapt to your preferred tools.

Technical

Can you repurpose existing content?

Yes! Content repurposing is efficient and valuable. We can: turn blog posts into social media series, convert whitepapers into blog post series, adapt long-form content for email campaigns, create LinkedIn posts from technical documentation, and extract key points for infographic content (copy only, we don't design graphics).

Content Quality

Can you translate content?

We write primarily in English. For translations, we don't offer that service directly, but we can recommend translation services or write in simplified English that translates well. If you have translated versions, we can adapt English content to match tone and style of other languages.

Technical

How long are typical articles?

It varies by type: blog posts (800-1,500 words), in-depth articles (1,500-2,500 words), whitepapers (3,000-5,000 words), case studies (1,000-2,000 words), social posts (150-300 words), eBooks (5,000-10,000 words). We adjust length based on topic depth and audience needs, not arbitrary word counts.

Content Quality

What happens if we're not happy with content?

We work until you're satisfied. Provide specific feedback, and we'll revise accordingly. If something fundamentally misses the mark, we'll start fresh. In rare cases where alignment isn't working, you can pause your subscription. Our goal is 100% satisfaction. Most clients are thrilled with the first draft.

Workflow

Is there a setup fee?

No setup fees. Your subscription price is all-inclusive. We provide: Trello board setup, onboarding documentation, team introductions, and immediate access. You can submit your first request the same day you subscribe.

Pricing & Billing

What payment methods do you accept?

We accept all major credit cards (Visa, Mastercard, American Express) and ACH bank transfers for annual plans. Payment is processed securely through our payment platform. Invoices are provided for accounting purposes.

Pricing & Billing

Do you optimize for specific platforms?

Yes. We understand platform-specific requirements: LinkedIn's algorithm preferences, Twitter's character limits and thread strategies, blog SEO best practices, email subject line optimization, and Medium's formatting norms. We tailor content for maximum impact on each platform.

Technical

Still have questions?

We're here to help. Reach out and we'll get back to you within 24 hours.

Contact Us