Menu
Welcome
About Me
Approach
Consulting Rates
Other Services
Contacts
Hire a Cybersecurity Manager
Common Hiring Mistakes
Cybersecurity Leadership Competency Model
Hiring Tools & Templates
Become a Cybersecurity Manager
Common Disillusions
Top Certifications for Cybersecurity Leadership
Recommended Certification Path for Future Cybersecurity Leaders
Career Progression Map
Managerial vs. Technical
You are a techie
Your are a manager
Does Managing Cybersecurity Require Understanding Technology?
Knowledge, Skills, Abilities
How to create a password purely in your head?
Decision not to store personal data: threat or risk avoidance?
How important is a robots.txt file for cybersecurity?
Does BitLocker protect data at rest and/or in transit?
Are passwords stored in web browsers safe?
Would you allow your admins to use Kali-based tools?
Does GDPR require passwords to be protected?
Your security scan crashed a server
Internal audit questions the quality of antimalware
From A Cost Centrum To A Business-Savvy Peer
ISMS in place - is required before ISO 27001 certification
How management killed DLP
When the endpoint itself becomes the security perimeter
Do you know how remote links behave in MS Office?
Common pitfalls of implementing SIEM
Your guide to
The Perfect Cybersecurity Manager
All
auditing
DLP
encryption
GDPR
ISO-27001
manager
network
review
risks
scans
SIEM
techie
web
How to make better use of SSH
January 18, 2026
Username first, password second - for security, usability, infrastructure efficiency
January 11, 2026
CSP as a single best move toward web security (but not used)
January 4, 2026
Comparing security impacts of virtualization and containerization
January 4, 2026
Have you noticed? Websites keep sessions alive longer. Why?
December 31, 2025
Why to know asymmetric encryption
December 30, 2025
Security problems with two active network interfaces
December 28, 2025
How to choose packaged security products?
December 27, 2025
What do you base your decisions on when planning for budget?
December 26, 2025
No security without a system (why ISMS)
December 25, 2025
Risk ≠ threat explained
December 25, 2025
When we can apply controls directly against threats
December 24, 2025
Will passkeys soon replace passwords?
December 22, 2025
Mystery shopping as unethical testing of employees
December 22, 2025
Common pitfalls of implementing SIEM
December 22, 2025
Do you know how remote links behave in MS Office?
December 22, 2025
Explain to a developer that ignoring XSS is a mistake
December 20, 2025
When endpoint itself becomes the security perimeter
December 20, 2025
Previous