C3 Staff
Goodbye, PayPal.

Goodbye, PayPal.

After twenty years, I deleted my PayPal account last Monday morning. You’ve heard my thoughts on user responsibility as it relates to Zelle fraud. But the reality is that responsibility is a two-way street. Even though we are responsible for ensuring that who we send...

Fight the Epidemic: Burnout in Cybersecurity

Fight the Epidemic: Burnout in Cybersecurity

“71% of [security] analysts experience some level of burnout” and, “64% say they’re likely to switch jobs in the next year.”[1] I love this industry, and it pains me to see statistics like this, even assuming massive bias in the data. While the “security analyst” role...

Learning Cybersecurity Beyond Technical Skill

Learning Cybersecurity Beyond Technical Skill

We all remember sitting through classes because we had to; it didn’t matter if we respected our instructors, if we would ever need to know this again, or if we thought they knew what they were talking about. The only thing that mattered was getting through the class,...

The Attack You’re Responsible For

The Attack You’re Responsible For

When a smishing (SMS-phishing) attack poses as your bank and rips you off thousands of dollars through Zelle, who’s responsible and accountable for the? Is it your bank, since they cover other types of fraudulent losses? Is it Zelle, since it was their platform that...

Russia, Ukraine, and Your Cybersecurity

Russia, Ukraine, and Your Cybersecurity

Conflict questions loom large—when will Russia invade Ukraine? How will Europe respond, and how will the US react? In the anxiety produced by the physical presence of Russian troops surrounding Ukraine, we can overlook the other forms of Russian aggression against...

Bridging the Emotional Gap in Cybersecurity

Bridging the Emotional Gap in Cybersecurity

How do you feel about cybersecurity? We know that cybersecurity is a primarily a human endeavor – an endeavor driven by human decisions and conflicts that are escalated or resolved through a cyber professional’s human skill. Technology helps, but it’s just a tool. If...

Why We Need You: What Cybersecurity Employers Look For

Why We Need You: What Cybersecurity Employers Look For

Creating career opportunities is not easy. We get that. And while my last post laid the groundwork for creating opportunities, there is more to the story. Anyone entering cybersecurity also needs to know what makes a ‘memorable, personal value proposition.’ In short,...

Don’t Wait For Opportunities—Create Them.

Don’t Wait For Opportunities—Create Them.

Let’s face it. Employers are not offering jobs out of the goodness of their hearts (apart from a few). With 21,010 open cybersecurity positions in North Carolina, and almost 600,000 nationally, the job market should be on the side of the applicant, but it is not. Look...

Incident Response as Triage: Why You Should Outsource

Incident Response as Triage: Why You Should Outsource

Before co-founding the Carolina Cyber Center, I ran an incident response team for one of the U.S. Olympic Committees (there are over 50). I walked in Saturday morning with my usual checklist and was met with a row of ashen faces—not usually a good sign. What made it...