News & Resources
How do I Know What a Data Breach Looks Like?
Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two...
How do I Know What a Data Breach Looks Like?
Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two...
Competence Before Certification: A Letter to Cybersecurity Students
To Current and Future Students, Our jobs are not easy. By ‘our,’ I mean yours and mine. We prepare long hours, studying to create a technical foundation. We work to understand the ins and outs of networks, applications, and firewalls. We painstakingly analyze...
Russia, Ukraine, and Your Cybersecurity
Conflict questions loom large—when will Russia invade Ukraine? How will Europe respond, and how will the US react? In the anxiety produced by the physical presence of Russian troops surrounding Ukraine, we can overlook the other forms of Russian aggression against...
Bridging the Emotional Gap in Cybersecurity
How do you feel about cybersecurity? We know that cybersecurity is a primarily a human endeavor – an endeavor driven by human decisions and conflicts that are escalated or resolved through a cyber professional’s human skill. Technology helps, but it’s just a tool. If...
Why We Need You: What Cybersecurity Employers Look For
Creating career opportunities is not easy. We get that. And while my last post laid the groundwork for creating opportunities, there is more to the story. Anyone entering cybersecurity also needs to know what makes a ‘memorable, personal value proposition.’ In short,...
Don’t Wait For Opportunities—Create Them.
Let’s face it. Employers are not offering jobs out of the goodness of their hearts (apart from a few). With 21,010 open cybersecurity positions in North Carolina, and almost 600,000 nationally, the job market should be on the side of the applicant, but it is not. Look...
Incident Response as Triage: Why You Should Outsource
Before co-founding the Carolina Cyber Center, I ran an incident response team for one of the U.S. Olympic Committees (there are over 50). I walked in Saturday morning with my usual checklist and was met with a row of ashen faces—not usually a good sign. What made it...
Get in contact with
Carolina Cyber Center
[gravityform id=”12″ title=”false” description=”false”]