News & Resources
Stay Cyber Secure in 4 Easy Steps
If you’ve ever felt overwhelmed with the amount of negative news around cybersecurity, you’re not the only one. Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices...
Stay Cyber Secure in 4 Easy Steps
If you’ve ever felt overwhelmed with the amount of negative news around cybersecurity, you’re not the only one. Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices...
Why We Need You: What Cybersecurity Employers Look For
Creating career opportunities is not easy. We get that. And while my last post laid the groundwork for creating opportunities, there is more to the story. Anyone entering cybersecurity also needs to know what makes a ‘memorable, personal value proposition.’ In short,...
Don’t Wait For Opportunities—Create Them.
Let’s face it. Employers are not offering jobs out of the goodness of their hearts (apart from a few). With 21,010 open cybersecurity positions in North Carolina, and almost 600,000 nationally, the job market should be on the side of the applicant, but it is not. Look...
Incident Response as Triage: Why You Should Outsource
Before co-founding the Carolina Cyber Center, I ran an incident response team for one of the U.S. Olympic Committees (there are over 50). I walked in Saturday morning with my usual checklist and was met with a row of ashen faces—not usually a good sign. What made it...
When External Support is Warranted
We strongly believe cybersecurity measures should be reasonable and prudent and that small businesses can do a lot in-house. However, there are areas where your cybersecurity program (again, focusing on small and medium businesses, or SMBs) should likely consider...
This Christmas, Don’t Click
Christmas is supposed to be about peace on earth, but bad news has been everywhere this week in the cybersecurity world, largely because of Log4j. But we’re not going to talk about that. If you are trying to wrap your head around what it is, we like these resources...
It’s Not If, but When: Incident Response and Data Retrieval
Three days ago, the Swiss Government Computer Emergency response team blazed a warning regarding a zero-day exploit: Log4j. It is hard to overstate just how critical this exploit is – arguably the most significant cybersecurity threat ever. On a criticality scale of...
Get in contact with
Carolina Cyber Center
[gravityform id=”12″ title=”false” description=”false”]