Discover The CTU Experience

CTU Blog


Content Type

Content Category


Latest Posts

Is the U.S. Prepared to Manage Cybersecurity Threats?

The United States does not yet have a national strategy to deal with cybersecurity; cyber law is undeveloped, and while narrow segments of expertise exist inside and outside of government, broad understanding of the threat and what we might do to prepare for, recovery from, and respond to cyber attacks is woefully lacking.

Taking the Scare out of Writing: What Stephen King (and Other Fiction Writers) Can Teach Us about Writing Essays

The advice of fiction writers such as Stephen King and Robert A. Heinlein has helped me hone my craft. I learn from the purveyors of the craft who have come before me. Books such as On Writing have caused me to reflect upon the life experiences that make me the writer I am.

Election Season 2012: What’s Next for Higher Education?

Higher education has been a great point of debate throughout this presidential election season. Much can be learned from the platforms of both President Barack Obama and Mitt Romney and their collective approach to ensuring that Americans have high quality and accessible means to personal and professional development.

5 Elements of Effective Thinking: SAIR Conference Recap

The highlight of the conference was Professor Edward Burger’s keynote address entitled, “The 5 Elements of Effective Thinking.” A captivating speaker, Dr. Burger creatively outlined these five elements of effective—or innovative—thinking, which he linked to the four basic earthly elements which predate Socrates: Earth, Fire, Air, and Water.

Preparing for Disaster: Exercise Angel Thunder 2013

I recently returned from a planning conference associated with Exercise Angel Thunder 2013. AT-13, and its Defense Support of Civil Authorities segment (Resolute Angel) are played on an 18-month cycle to exercise local, state, federal, and multinational civil and military agencies in disaster response and – particularly for the military forces – personnel recovery in simulated earthquake and combat scenarios.

Trouble Landing Interviews? A Weak Online Presence May Be To Blame

Today, as many as 92% of employers and recruiters use social networks to find job candidates – yet only 38% of job seekers report regular use of LinkedIn to find work. With the candidate pool growing more homogeneous and the hiring process almost entirely digital, there’s really no denying that a professional presence online is critical to career success.

Why Most Entrepreneurs Avoid Decaf and Leap Before They Look - Q & A with Dr. Gene Landrum, Founder of Chuck E. Cheese

An entrepreneur is an enlightened renegade who refuses to kow-tow to conventional wisdom and is always willing to bet what they have to get what they want. Entrepreneurs tend to be radicals on a mission to sate a deep-seated passion; an obsessive Promethean (Intuitive-Thinker) willing to sacrifice all for the redemption of a dream. And strange as it may seem, an entrepreneur tends to leap before they look.

Cybercriminals: Masterminds Wreaking Havoc in Cyberspace

There is a tremendous diversity to the threats in the cyber domain and the entities that are behind them. Let’s take a closer look at the individuals responsible for the various threats threatening our cybersecurity.

Online Learning Success Strategies: Part 3

The key to beginning your education, despite the curve balls life will throw, is finding the right balance between organization and time management. These skills are critical to ensuring you can get through these difficult times with your best foot forward.

Cyber Threats to our Personal and National Security

In recognition of Cybersecurity Awareness month in October, our faculty offer insights on both policy and technical issues related to cybersecurity. In our second post of the series, Bruce Harmon, Ph.D., took a look at the defining terminology making its way into our culture. In today’s post, Stephen Recca, M.A., takes a look at four cybersecurity threats from a policy perspective.

Security Challenges in East Africa: Economic and Social Concerns - Part 1

CTU’s Global Security Series offers background on current national and homeland security topics. Dr. Morag recently participated in the Eastern Accord 2012 Counter Violent Extremism Exercise in Arusha, Tanzania. His second post in this series looked at primary security threats from the trans-national and global Jihadist groups operating in the region. Today’s post will focus on some of the economic and social challenges facing Djibouti, Uganda, Tanzania and Zambia.

Uncovering the Truth: The Reality of Criminal Profiling

Law enforcement has long been a rich source of fodder for the creative minds that keep us entertained in front of the television – not to mention the big screen – year in and year out.

Trojan Horse, Zombies and 15 Critical Cybersecurity Terms You Need to Know

These days, everyone is vulnerable to cybercrime and other breaches to the security of their digital systems and identity. Our world is increasingly connected through computers, smart phones and tablets and an exploding number of apps. This influx of technology makes for that many more digital portals to protect.

Guest Speakers Focus on Career Development at Fall Doctor of Management Symposium

Excitement, engagement and inspiration are the common threads that we strive to weave into our planning to ensure that each doctoral symposium we create is an outstanding experience for everyone involved. And the fall symposium for CTU doctoral management students this week is no exception.