<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[CyberChad]]></title><description><![CDATA[Cyberchad]]></description><link>https://www.cyberchad.org/blog</link><generator>RSS for Node</generator><lastBuildDate>Fri, 08 May 2026 19:47:37 GMT</lastBuildDate><atom:link href="https://www.cyberchad.org/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Real Recognizes Real (And Other Things I Wish Someone Told Me Sooner)]]></title><description><![CDATA[I haven't been in cybersecurity since I started my career back in 2018, so I appreciate Chad pulling me in for this one. He's known me since I was a kid, trying to figure out what being a professional even meant. After college, I landed my first job, and Chad was already seasoned. Somehow, a kid from Pompano Beach, FL, and a guy from Camden, NJ found common ground, and we've been tight ever since. Real recognizes real. That goes for anywhere you go. When I started my professional career, I...]]></description><link>https://www.cyberchad.org/post/real-recognizes-real-and-other-things-i-wish-someone-told-me-sooner</link><guid isPermaLink="false">69fa85537c961ad0b9fee4bd</guid><pubDate>Fri, 08 May 2026 17:59:56 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/11062b_6e2c5579935747d58f0fa1e1fde0ce4b~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Chris Cyrille</dc:creator></item><item><title><![CDATA[The Entry Level Cybersecurity Lie: A True Story You Should Listen To]]></title><description><![CDATA[Every day, I read and respond to posts on LinkedIn asking why entry‑level cybersecurity job postings demand prior experience and suggesting that there are no longer any true entry‑level positions available. While I agree there is some validity to these concerns, my frustration comes from the fact that the underlying message often misses the larger issue. There are many entry‑level cybersecurity positions posted each week, and opportunities to work in the field are readily available. What is...]]></description><link>https://www.cyberchad.org/post/the-entry-level-cybersecurity-lie-a-true-story-you-should-listen-to</link><guid isPermaLink="false">69f4a37cb7104c93b99cb29d</guid><pubDate>Fri, 01 May 2026 20:39:11 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/c33997_5fee17a5e91f45c5a652defb54325999~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Taylor Stonelake, CISSP</dc:creator></item><item><title><![CDATA[Your Job Isn't Disappearing. It's Changing. Here's the Data]]></title><link>https://www.cyberchad.org/post/your-job-isn-t-disappearing-it-s-changing-here-s-the-data</link><guid isPermaLink="false">69f1f98b7475e016cb96b5fc</guid><pubDate>Wed, 29 Apr 2026 21:56:03 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/c33997_af822fcc48604a6b80868d5c4207b408~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>davidlevineconsult</dc:creator></item><item><title><![CDATA[The Cybersecurity Talent Problem Nobody Wants to Name, and How Networking Quietly Solves It]]></title><description><![CDATA[By Christina Shannon, CIO at Kik You have heard the line a hundred times. There is a cybersecurity talent shortage. Millions of unfilled jobs. The industry is desperate for people. And then you apply to fifty entry-level roles, hear back from two, get ghosted by both, and start to wonder if the whole thing is a lie. It’s not a lie. But it’s not the whole truth either. And if you are trying to break into this field, or trying to grow once you’re in it, you deserve someone to tell you the full...]]></description><link>https://www.cyberchad.org/post/the-cybersecurity-talent-problem-nobody-wants-to-name-and-how-networking-quietly-solves-it</link><guid isPermaLink="false">69e11a8026cccc5d78fc51f0</guid><pubDate>Thu, 16 Apr 2026 18:10:18 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/c33997_31ef8cd139e1443ea9275371e98023ac~mv2.jpg/v1/fit/w_865,h_560,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Christina Shannon</dc:creator></item><item><title><![CDATA[What Is Cybersecurity?]]></title><description><![CDATA[What Is Cybersecurity? When people ask the question, “What is cybersecurity?” , the answer might seem simple at first. But the more you learn about the field, the more you realize that cybersecurity is far more complex—and far more important—than most people imagine. For many of us, our first exposure to cybersecurity came from movies and television. Growing up, I watched films like Hackers  and shows like Mr. Robot . They portrayed cybersecurity as this world where a brilliant hacker could...]]></description><link>https://www.cyberchad.org/post/what-is-cybersecurity</link><guid isPermaLink="false">69b45f3096363eb43d37319d</guid><pubDate>Fri, 13 Mar 2026 19:03:40 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/c33997_ef7cfdb7478342a0bc9c192471b20c19~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Chad Clemency</dc:creator></item></channel></rss>