Menu
Welcome
About Me
Approach
Consulting Rates
Other Services
Contacts
Hire a Cybersecurity Manager
Common Hiring Mistakes
Cybersecurity Leadership Competency Model
Hiring Tools & Templates
Become a Cybersecurity Manager
Common Disillusions
Top Certifications for Cybersecurity Leadership
Recommended Certification Path for Future Cybersecurity Leaders
Career Progression Map
Managerial vs. Technical
You are a techie
Your are a manager
Does Managing Cybersecurity Require Understanding Technology?
Knowledge, Skills, Abilities
How to create a password purely in your head?
Decision not to store personal data: threat or risk avoidance?
How important is a robots.txt file for cybersecurity?
Does BitLocker protect data at rest and/or in transit?
Are passwords stored in web browsers safe?
Would you allow your admins to use Kali-based tools?
Does GDPR require passwords to be protected?
Your security scan crashed a server
Internal audit questions the quality of antimalware
From A Cost Centrum To A Business-Savvy Peer
ISMS in place - is required before ISO 27001 certification
How management killed DLP
When the endpoint itself becomes the security perimeter
Do you know how remote links behave in MS Office?
Common pitfalls of implementing SIEM
SIEM
(1)
Common pitfalls of implementing SIEM
December 22, 2025