Menu
Welcome
About Me
Approach
Consulting Rates
Other Services
Contacts
Hire a Cybersecurity Manager
Common Hiring Mistakes
Cybersecurity Leadership Competency Model
Hiring Tools & Templates
Become a Cybersecurity Manager
Common Disillusions
Top Certifications for Cybersecurity Leadership
Recommended Certification Path for Future Cybersecurity Leaders
Career Progression Map
Managerial vs. Technical
You are a techie
Your are a manager
Does Managing Cybersecurity Require Understanding Technology?
Knowledge, Skills, Abilities
How to create a password purely in your head?
We decide not to store personal data: is it threat or risk avoidance?
How important is a robots.txt file for cybersecurity?
Does BitLocker protect data at rest and/or in transit?
Are passwords stored in web browsers safe?
Would you allow your admins to use Kali-based tools?
Does GDPR explicitly require passwords to be protected?
Your security scan crashed a server
Internal audit questions the quality of antimalware
From A Cost Centrum To A Business-Savvy Peer
manager
(11)
Internal audit questions the quality of antimalware
December 19, 2025
Your security scan crashed a server
December 19, 2025
Is the ISO 27001 certificate a fig leaf?
December 16, 2025
Employee wants to use his own network hub/switch
December 16, 2025
That supplier wants to have a shell on our box
December 16, 2025
Does GDPR explicitly require passwords to be protected?
December 15, 2025
Would you allow your admins to use Kali-based tools?
December 15, 2025
Are passwords stored in web browsers safe?
December 15, 2025
How important is a robots.txt file for cybersecurity?
December 15, 2025
We decide not to store personal data: is it threat or risk avoidance?
December 15, 2025
The Right Blend
December 8, 2025