Menu
Welcome
About Me
Approach
Consulting Rates
Other Services
Contacts
Hire a Cybersecurity Manager
Common Hiring Mistakes
Cybersecurity Leadership Competency Model
Hiring Tools & Templates
Become a Cybersecurity Manager
Common Disillusions
Top Certifications for Cybersecurity Leadership
Recommended Certification Path for Future Cybersecurity Leaders
Career Progression Map
Managerial vs. Technical
You are a techie
Your are a manager
Does Managing Cybersecurity Require Understanding Technology?
Knowledge, Skills, Abilities
How to create a password purely in your head?
Decision not to store personal data: threat or risk avoidance?
How important is a robots.txt file for cybersecurity?
Does BitLocker protect data at rest and/or in transit?
Are passwords stored in web browsers safe?
Would you allow your admins to use Kali-based tools?
Does GDPR require passwords to be protected?
Your security scan crashed a server
Internal audit questions the quality of antimalware
From A Cost Centrum To A Business-Savvy Peer
ISMS in place - is required before ISO 27001 certification
How management killed DLP
When the endpoint itself becomes the security perimeter
Do you know how remote links behave in MS Office?
Common pitfalls of implementing SIEM
Your guide to
The Perfect Cybersecurity Manager
All
auditing
DLP
encryption
GDPR
ISO-27001
manager
network
review
risks
scans
SIEM
techie
web
How management killed DLP
December 19, 2025
ISMS in place is required before ISO 27001 certification
December 19, 2025
From A Cost Centrum To A Business-Savvy Peer
December 19, 2025
Internal audit questions the quality of antimalware
December 19, 2025
Your security scan crashed a server
December 19, 2025
Why are passkeys safer then passwords?
December 18, 2025
Is the ISO 27001 certificate a fig leaf?
December 16, 2025
Employee wants to use his own network hub/switch
December 16, 2025
That supplier wants to have a shell on our box
December 16, 2025
Does GDPR require passwords to be protected?
December 15, 2025
Would you allow your admins to use Kali-based tools?
December 15, 2025
Are passwords stored in web browsers safe?
December 15, 2025
Does BitLocker protect data at rest and/or in transit?
December 15, 2025
How important is a robots.txt file for cybersecurity?
December 15, 2025
Decision not to store personal data: threat or risk avoidance?
December 15, 2025
How to create a password purely in your head?
December 15, 2025
The Right Blend
December 8, 2025
You Are a Managerial Type
December 8, 2025
Previous
Next