Knowledge hub

Everything you need to work with Cyberou

Clear answers about subscriptions, your unlimited Kanban Content Board queue (we ship one active request at a time for quality), turnaround, SEO, security research, sponsored LinkedIn, and billing. Last updated .

Getting started

How do I get started with Cyberou?

Getting started is simple. Choose your subscription plan (monthly, quarterly, or annually) and complete the sign-up process. Within 24 hours, you'll receive access to your dedicated Kanban Content Board in the Cyberou app where you can submit your first content request. Once submitted, we start working immediately with a 48-hour average turnaround time.

What happens after I subscribe?

After subscribing, you'll receive a welcome email with: access credentials to your private Kanban Content Board in the app, a brief onboarding guide, contact information for any questions, and instructions on how to submit your first request. Our team will introduce themselves and be ready to start working on your content immediately.

Do you offer a trial or demo?

We don't offer free trials because our model is based on dedicated time allocation. However, you can subscribe for one month, submit a request, and if you're not satisfied, you can pause or cancel your subscription. Most clients stay with us long-term because they see the quality and value immediately.

What types of content can you create?

We specialize in cybersecurity content including: blog posts and articles, whitepapers and eBooks, case studies, technical documentation, product walkthroughs, social media content (LinkedIn, Twitter), email campaigns, press releases, security advisories, threat intelligence reports, and ghostwritten content for executives.

Services and scope

What is security research?

Our security research service involves discovering and documenting novel cybersecurity threats, malware analysis, vulnerability research, threat actor profiling, and emerging attack techniques. This research often leads to significant media coverage and positions your brand as a thought leader. Past examples include WormGPT discovery (233 media mentions) and MatrixPDF toolkit research.

How does influencer marketing work?

Our influencer marketing leverages Daniel Kelley's 100,000+ follower reach on LinkedIn. We create sponsored posts that authentically integrate your product or service, reaching cybersecurity professionals, CISOs, and decision-makers. Past campaigns have achieved 100,000-300,000+ views with high engagement and conversion rates.

Can you write about technical products?

Absolutely. We specialize in technical cybersecurity content. Our team has hands-on experience with security tools, understands complex technical concepts, and can explain them clearly to your target audience. We regularly write about pentesting tools, SIEM platforms, EDR solutions, cloud security, and more.

How do you handle SEO optimization?

Yes, all content is SEO-optimized following best practices: keyword research and integration, proper heading structure, meta descriptions, internal linking suggestions, and content structured for featured snippets. However, we focus on quality and value first. SEO is enhanced through excellent content, not the other way around.

Why wouldn't I just hire a full-time writer?

Senior cybersecurity content writers command $100,000+ salaries plus benefits. Finding someone with both writing skills AND practical security experience is extremely rare and expensive. With us, you get: expert-level cybersecurity knowledge, professional writing skills, no benefits or overhead, flexibility to scale up or down, and multiple specialists rather than one person.

What if I only have one request?

Perfect! Subscribe for one month, submit your request, we'll complete it, then pause your subscription. You're not locked into months of service you don't need. Reactivate anytime when you have more content needs. Many clients operate this way successfully.

Can you deliver a set number of articles per month?

Our model is time-based, not deliverable-based. Article complexity varies widely. A quick blog post versus a comprehensive whitepaper take vastly different time. We can estimate roughly how many standard blog posts fit in a month (typically 8-12), but we don't guarantee specific numbers. Quality over quantity.

Do you do webinars and videos?

We're a writing agency and don't produce video content directly. However, we can: write scripts for webinars, create supporting written materials, develop presentation outlines, and write promotional content. We have connections with video professionals if you need production services.

Do you offer sales or onboarding calls?

No. Our business model relies on asynchronous communication to maximize efficiency. This keeps costs down and allows us to serve more clients better. All onboarding is via email and documentation. For questions, use your Content Board cards or email. We respond quickly and thoroughly.

Do you really offer unlimited requests?

Yes. As long as your membership is active, you can file unlimited requests on your Kanban Content Board. We work on them one at a time, maintaining high quality. If you submit multiple requests, we'll work through them in order or based on your prioritization.

What does 'one request at a time' mean?

It means we complete your current request before moving to the next one. This ensures quality and proper attention to each piece. Once a request is marked complete, we immediately start the next one in your queue. This model prevents rushed work and maintains our high standards.

Can I pause my subscription?

Yes, you can pause anytime. If you only have occasional needs, submit your requests, we'll complete them, and you can pause until you need more content. When paused, your billing cycle stops. You can reactivate anytime, and we'll pick up where we left off.

Plans, billing, and sponsorship

Why is quarterly/annually cheaper?

Longer commitments allow us to plan resources better and reduce administrative overhead. Quarterly saves you 10%, and annual saves you 20% compared to monthly. These plans also lock in your rate, protecting you from any price increases during your term.

What's included in the security research add-on?

The security research add-on includes: one major research project per month, original threat discovery and analysis, comprehensive written reports, media outreach support, and social media content based on findings. This often generates significant PR value and positions you as an industry leader.

How much does a sponsored post cost?

Sponsored LinkedIn posts start at $1,597. This includes content creation, posting to Daniel's 100,000+ follower audience, cross-posting to Twitter, performance analytics, and guaranteed reach. The exact price depends on content complexity, campaign goals, and any special requirements.

Do you offer refunds?

No, we don't offer refunds. Our service is time-based, meaning you're paying for dedicated expertise and time allocated to your projects. However, you can pause or cancel anytime, preventing future charges. Most clients see value immediately and stay long-term.

How do I submit requests?

All requests are submitted via your private Kanban Content Board in the Cyberou app. Simply create a new card with: the content type (blog post, whitepaper, etc.), topic or title, key points to cover, target audience, desired length, any reference materials, and deadline if urgent. We'll acknowledge receipt and begin work immediately.

What's the typical turnaround time?

Our average turnaround is 48 hours for most content pieces. Complex projects like whitepapers or deep research may take 3-7 days. Security research projects typically take 2-4 weeks. We'll always communicate expected timelines when we start each request.

Workflow and delivery

How do revisions work?

We offer unlimited revisions within reason to ensure you're happy with the final product. Simply comment on the card with requested changes. Minor edits are typically completed within 24 hours. Note that revision time counts toward your subscription time allocation.

Can I prioritize certain requests?

Yes, absolutely. You can reorder cards on your Content Board to indicate priority. You can also label requests as 'Urgent' or 'High Priority' in the card. Just communicate clearly, and we'll adjust our workflow accordingly.

Do you offer rush delivery?

We aim for 48-hour delivery on most projects already. If you need something faster (24 hours or same-day), mention it in the request. We'll do our best to accommodate, though extremely urgent requests may be limited in scope or depth to meet the deadline.

How do you handle feedback and revisions?

When we deliver content, review it and provide feedback directly on the card. Be specific about what needs changing: tone adjustments, additional information, restructuring, etc. We'll implement your feedback and re-deliver, usually within 24 hours for minor revisions.

Do you use AI to write content?

No, we don't use generative AI to create content. Every piece is researched and written by our human experts with cybersecurity experience. We do use editing tools like ProWritingAid and Grammarly to polish and refine, but these don't generate content. They improve what's already written by humans.

How do you ensure content quality?

Quality comes from: team members with real cybersecurity experience, thorough research on every topic, multiple review rounds before delivery, fact-checking and source verification, and your feedback incorporation. We prioritize accuracy and value over speed or volume.

Content quality and voice

Can you match our brand voice?

Yes. During onboarding, share your brand guidelines, past content examples, and voice preferences (formal/casual, technical/accessible, etc.). We'll adapt our writing style to match your brand. The first few pieces help us calibrate, and we improve alignment over time.

Do you provide sources and citations?

Yes, all content includes proper citations and sources. For technical content, we reference vendor documentation, security advisories, and reputable industry sources. For research pieces, we provide comprehensive bibliographies and attribution.

Can you write in different styles?

Absolutely. We adapt to your needs: technical documentation (precise, detailed), blog posts (engaging, accessible), executive content (strategic, concise), social media (punchy, shareable), whitepapers (authoritative, comprehensive), and more. Just specify your preferred style.

How technical can you get?

Very technical. Our team has hands-on cybersecurity experience, not just writing skills. We can explain complex topics like memory exploitation, cryptographic protocols, threat hunting techniques, reverse engineering, and more. We understand the technology, not just the terminology.

Do you offer ghostwriting?

Yes, ghostwriting is one of our specialties. We regularly write for founders, CTOs, CISOs, and other executives. We'll capture their voice, expertise, and perspective while handling all the writing. This positions them as thought leaders without the time investment.

Do you help with content strategy?

While we're primarily a content creation service, we offer strategic input. Based on our cybersecurity industry knowledge, we can suggest: trending topics worth covering, content gaps in your current strategy, angles that generate media interest, and formats that perform well. We're collaborators, not just order-takers.

How do you handle complex technical reviews?

For highly technical content, we recommend: providing access to subject matter experts for fact-checking, allowing extra review time, being specific about technical accuracy requirements, and accepting multiple revision rounds. We're technically proficient but recognize when specialized expertise is needed for verification.

What information do you need to start?

To start effectively: brand guidelines and voice preferences, target audience details, any existing content or style guides, product/service information, access to relevant documentation, key messaging points, and competitor examples (what to emulate or avoid). The more context, the better the first draft.

Do you need access to our tools?

For product walkthroughs or technical documentation, yes, we may need demo access or accounts. For security tools, screenshots and documentation often suffice. We'll discuss specific needs per project and sign NDAs if required.

How do you handle confidential information?

We treat all client information as confidential by default. We're happy to sign NDAs and follow your security protocols. Content is never shared outside your organization without approval. We understand the sensitivity of security topics and handle information accordingly.

Can you work with our marketing team?

Yes. We integrate seamlessly with your existing team. We can join Slack channels, attend relevant meetings (async communication preferred), coordinate with designers for graphics, and collaborate with product marketers for accurate information. We're an extension of your team.

What tools do you use?

Your queue and workflow live in the Cyberou app's Kanban Content Board. For writing, we use Google Docs or Microsoft Word. For editing, we use ProWritingAid and Grammarly. For research, we use standard security tools and threat intelligence platforms. We're flexible and can adapt to your preferred tools.

Technical, privacy, and collaboration

Can you repurpose existing content?

Yes! Content repurposing is efficient and valuable. We can: turn blog posts into social media series, convert whitepapers into blog post series, adapt long-form content for email campaigns, create LinkedIn posts from technical documentation, and extract key points for infographic content (copy only, we don't design graphics).

Can you translate content?

We write primarily in English. For translations, we don't offer that service directly, but we can recommend translation services or write in simplified English that translates well. If you have translated versions, we can adapt English content to match tone and style of other languages.

How long are typical articles?

It varies by type: blog posts (800-1,500 words), in-depth articles (1,500-2,500 words), whitepapers (3,000-5,000 words), case studies (1,000-2,000 words), social posts (150-300 words), eBooks (5,000-10,000 words). We adjust length based on topic depth and audience needs, not arbitrary word counts.

What happens if we're not happy with content?

We work until you're satisfied. Provide specific feedback, and we'll revise accordingly. If something fundamentally misses the mark, we'll start fresh. In rare cases where alignment isn't working, you can pause your subscription. Our goal is 100% satisfaction. Most clients are thrilled with the first draft.

Is there a setup fee?

No setup fees. Your subscription price is all-inclusive. We provide: Content Board setup, onboarding documentation, team introductions, and immediate access. You can submit your first request the same day you subscribe.

What payment methods do you accept?

We accept all major credit cards (Visa, Mastercard, American Express) and ACH bank transfers for annual plans. Payment is processed securely through Stripe in the app. Invoices are provided for accounting purposes.

Do you optimize for specific platforms?

Yes. We understand platform-specific requirements: LinkedIn's algorithm preferences, Twitter's character limits and thread strategies, blog SEO best practices, email subject line optimization, and Medium's formatting norms. We tailor content for maximum impact on each platform.

Still have questions?

Send goals, timeline, and links through our contact form—we will reply with how the programme fits your team.

Contact Cyberou Read terms of service