News & Resources
Celebrate Gartner’s Top Eight Predictions–Then Prepare
Gartner’s top eight predictions for the next four years double down on one specific thing: organizations will, and must, adapt to face growing cybersecurity threats. At the Gartner Security & Risk Management Summit in Australia last week, analysts outlined these...
Celebrate Gartner’s Top Eight Predictions–Then Prepare
Gartner’s top eight predictions for the next four years double down on one specific thing: organizations will, and must, adapt to face growing cybersecurity threats. At the Gartner Security & Risk Management Summit in Australia last week, analysts outlined these...

Curiosity Doesn’t Kill the Cat: My Journey in Cybersecurity
We asked Elise Marchant, Cybersecurity & Curriculum Development Analyst at the Carolina Cyber Center, about the importance of curiosity in cybersecurity and her own journey to get where she is today. Here's what she told us: In high school, every subject I took...
201: The Cyber Industry Has It Wrong…
The cybersecurity industry needs an overhaul. Cybersecurity itself is often avoided and misunderstood, because, to put it frankly, we pretend that cybersecurity is a technological problem instead of a people problem. We need to see and understand people in order to...
103: The Five Minute Cyberattack and Corporate Blind Spots
In the aftermath of the COVID-19 pandemic crisis, Amber Long is quitting her job. She weathered the tension of continued company cutbacks and survived months of remote-work isolation. Normalcy was at first distant, then seemingly closer as her company finally became...
Beyond Technical Skills: How to Choose Your Non-Traditional Cyber Program
Individuals pursuing a cybersecurity career are increasingly looking past traditional cybersecurity programs. Practically speaking, a college education is not for everyone – as the expense, duration and schedule demands are often not feasible or prudent for certain...
102: A Bear in the HoneyDocs—Knowing a Cyber-Attack When You See It
Cyber incidents and attacks are not primarily a technology problem—they are a people problem. Last week my colleague Chris Wallace discussed Verizon’s 2021 Data Breach Investigation Report. Specifically, the relevance to small businesses and the need for these...
Security Outside the Box: The Importance of Critical Thinking
Growing up in Nairobi, Kenya, Daniel Mugambi describes his childhood as being “always around computers.” His relationship to them was different than most of ours: instead of spending his hours glued to the screen, he was fascinated by what happened inside the...

Get in contact with
Carolina Cyber Center
[gravityform id=”12″ title=”false” description=”false”]