News & Resources
A Blessing for Our Next Director
When I came on in January of 2020 as co-founder of the Carolina Cyber Center (C3), we cast a vision for what C3 was to become. We wanted to do three things: to develop men and women of character in cybersecurity, to provide services to small businesses (public and...
A Blessing for Our Next Director
When I came on in January of 2020 as co-founder of the Carolina Cyber Center (C3), we cast a vision for what C3 was to become. We wanted to do three things: to develop men and women of character in cybersecurity, to provide services to small businesses (public and...

Serving the Career Changers and Recent Grads
What do recent cybersecurity graduates, career changers, and professionals with “gaps” in their resumes have in common? They need to prove that they can do the job. As a cybersecurity educator, professional, and small business leader, the last few days have been...
Make the Statistics Irrelevant
Between 60-80% of data breaches aren’t publicized. We recently signed an agreement with a large group purchasing organization (GPO) to offer services to healthcare companies across America—services like cybersecurity risk assessments, policies, procedures,...
Building Security Together: A Hack the Port 2022 Review
Last week, I had the honor of being a part of the Hack the Port conference in Fort Lauderdale. We heard from national leaders including Alejandro Mayorkas, Secretary of the Department of Homeland Security (DHS); Jen Easterly, Director of Cybersecurity and...
Goodbye, PayPal.
After twenty years, I deleted my PayPal account last Monday morning. You’ve heard my thoughts on user responsibility as it relates to Zelle fraud. But the reality is that responsibility is a two-way street. Even though we are responsible for ensuring that who we send...
Fight the Epidemic: Burnout in Cybersecurity
“71% of [security] analysts experience some level of burnout” and, “64% say they’re likely to switch jobs in the next year.”[1] I love this industry, and it pains me to see statistics like this, even assuming massive bias in the data. While the “security analyst” role...
Learning Cybersecurity Beyond Technical Skill
We all remember sitting through classes because we had to; it didn’t matter if we respected our instructors, if we would ever need to know this again, or if we thought they knew what they were talking about. The only thing that mattered was getting through the class,...
