News & Resources
Why We Should Communicate Cybersecurity Self-Efficacy
Our words matter. It’s an interesting statement for the cybersecurity profession, isn’t it? But it’s true. Technical skills are necessary, as are discipline, curiosity, and good character. And so are our words: they frame the context of our cybersecurity goals....
Why We Should Communicate Cybersecurity Self-Efficacy
Our words matter. It’s an interesting statement for the cybersecurity profession, isn’t it? But it’s true. Technical skills are necessary, as are discipline, curiosity, and good character. And so are our words: they frame the context of our cybersecurity goals....

BEC: A Scare for Small Businesses
Not everything is as it seems. On October 31st, we expect this, but what about every other day of the year? Sentenced earlier this year to ten years in prison for wire fraud charges, Obinwanne Okeke transferred over $10 million out of a company in the United...
Cybersecurity for Small Business: Easy Protection Measures
You have seen it before: juggling multiple hats, a list that never grows smaller, a workplace small enough to feel familial but constantly slightly understaffed. That is the feeling of a small workplace, and more than likely, you work in one. 99.9% of US businesses...
Disciplined Passion for Cybersecurity
While discipline without passion is boredom, passion without discipline is chaos. Passion, driven by curiosity, is a key attribute that sets apart great cybersecurity professionals. Actually, I think it sets apart virtually anyone in their chosen field. All too often,...
Cybersecurity: Zero Trust or Intentional Trust?
Next-Gen. AI. Attack Vector. CIA Triad. Deep Learning. Each of these has one thing in common: they represent cybersecurity buzzwords. Merriam-Webster dictionary aptly defines ‘buzzword’ as “an important-sounding usually technical word or phrase often of little meaning...
Character in Crisis: The Importance of Good Character in Cybersecurity
As a follow up to last week's article, we had the opportunity to interview Dr. Mark Wells and Dr. James Tippey on the importance of good character in cybersecurity. Dr. Wells has a background in ethics and philosophy while Dr. Tippey has a background in both...
The Attack on Kaseya: Déjà vu?
The start of this year’s Fourth of July holiday indicates we are not as independent or free as we should be when it comes to cybersecurity. On July 2, 2021, one of the largest supply-chain cyberattacks since SolarWinds occurred at Kaseya, an IT management software...

Get in contact with
Carolina Cyber Center
[gravityform id=”12″ title=”false” description=”false”]