Menu
Welcome
About Me
Approach
Consulting Rates
Other Services
Contacts
Hire a Cybersecurity Manager
Common Hiring Mistakes
Cybersecurity Leadership Competency Model
Hiring Tools & Templates
Become a Cybersecurity Manager
Common Disillusions
Top Certifications for Cybersecurity Leadership
Recommended Certification Path for Future Cybersecurity Leaders
Career Progression Map
Managerial vs. Technical
You are a techie
Your are a manager
Does Managing Cybersecurity Require Understanding Technology?
Knowledge, Skills, Abilities
How to create a password purely in your head?
Decision not to store personal data: threat or risk avoidance?
How important is a robots.txt file for cybersecurity?
Does BitLocker protect data at rest and/or in transit?
Are passwords stored in web browsers safe?
Would you allow your admins to use Kali-based tools?
Does GDPR require passwords to be protected?
Your security scan crashed a server
Internal audit questions the quality of antimalware
From A Cost Centrum To A Business-Savvy Peer
ISMS in place - is required before ISO 27001 certification
How management killed DLP
When the endpoint itself becomes the security perimeter
Do you know how remote links behave in MS Office?
Common pitfalls of implementing SIEM
manager
(23)
Username first, password second - for security, usability, infrastructure efficiency
January 11, 2026
Comparing security impacts of virtualization and containerization
January 4, 2026
Why to know asymmetric encryption
December 30, 2025
How to choose packaged security products?
December 27, 2025
What do you base your decisions on when planning for budget?
December 26, 2025
No security without a system (why ISMS)
December 25, 2025
When we can apply controls directly against threats
December 24, 2025
Mystery shopping as unethical testing of employees
December 22, 2025
Common pitfalls of implementing SIEM
December 22, 2025
How management killed DLP
December 19, 2025
ISMS in place is required before ISO 27001 certification
December 19, 2025
From A Cost Centrum To A Business-Savvy Peer
December 19, 2025
Internal audit questions the quality of antimalware
December 19, 2025
Your security scan crashed a server
December 19, 2025
Is the ISO 27001 certificate a fig leaf?
December 16, 2025
Employee wants to use his own network hub/switch
December 16, 2025
That supplier wants to have a shell on our box
December 16, 2025
Does GDPR require passwords to be protected?
December 15, 2025
Previous