Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

So You Think You Have a Smart Password?

In previous posts, I’ve written about potential security threats you face when it comes to protecting your computer systems and data. In this post, we get personal as I share ideas for protecting your personal assets from digital vulnerabilities.

What Six Internal Security Threats are Lurking Down Your Office Corridors?

Big data is more than just hype from the tech world. The proliferation of information across multiple dimensions is real. It comes from everywhere, from cellphone GPS signals, to purchase records and to the updates we make to our favorite social media websites.

Striking a Balance: BYOD in the Corporation

I’m writing this post from the Next Generation Security Summit (NGSS) in Austin, TX. The event brings together about 100 senior executives, in particular the chief information security officers (CISOs), from corporations around the country. Are you curious to know the #1 priority on their minds? CISOs want to know how the proliferation of mobile devices impacts security and compliance. More specifically, how should organizations manage the Bring Your Own Device (BYOD) issue?

Is Cloud Computing Right For Your Organization?

Smart CIOs aren’t lemmings, leaping over cliffs and chasing bright shiny objects in search of the next Information Technology (IT) silver bullet. But in the case of cloud computing, many are diving in – head first.

Auto Hacking Could Be Your Biggest Threat

Approximately 400,000 people flow into the District of Columbia to work each day. Many commute by train or Metro. But a large number drive and thoughtlessly endure the slog into the Washington metro area. Few consider the potential threat hidden in their automobiles. But what if someone wanted to shut down the U.S. government? How might a determined adversary approach the problem using a non-kinetic weapon (i.e. no bombs or boom)? Could a simple computer virus do the trick?

When Disaster Strikes, Will Your Data be Safe?

Natural disasters, like Hurricane Sandy, are grim reminders that we are all vulnerable to unexpected catastrophes brought on by nature or by mankind. Weeks, months, and potentially years later, we experience devastating after-effects that disrupt our lives and our businesses. Yet, much can be done to mitigate the effects of disasters on your business, and it starts with a proactive disaster recovery (DR) strategy.

Is the U.S. Prepared to Manage Cybersecurity Threats?

The United States does not yet have a national strategy to deal with cybersecurity; cyber law is undeveloped, and while narrow segments of expertise exist inside and outside of government, broad understanding of the threat and what we might do to prepare for, recovery from, and respond to cyber attacks is woefully lacking.

Cybercriminals: Masterminds Wreaking Havoc in Cyberspace

There is a tremendous diversity to the threats in the cyber domain and the entities that are behind them. Let’s take a closer look at the individuals responsible for the various threats threatening our cybersecurity.

Cyber Threats to our Personal and National Security

In recognition of Cybersecurity Awareness month in October, our faculty offer insights on both policy and technical issues related to cybersecurity. In our second post of the series, Bruce Harmon, Ph.D., took a look at the defining terminology making its way into our culture. In today’s post, Stephen Recca, M.A., takes a look at four cybersecurity threats from a policy perspective.

Trojan Horse, Zombies and 15 Critical Cybersecurity Terms You Need to Know

These days, everyone is vulnerable to cybercrime and other breaches to the security of their digital systems and identity. Our world is increasingly connected through computers, smart phones and tablets and an exploding number of apps. This influx of technology makes for that many more digital portals to protect.

What Is Cyber?

Cyber is in. Government officials share worries over cybersecurity. The Intelligence Community warns of cyber threats from nation states, anarchist groups and lone wolves. Civil liberties watch groups decry infringements of privacy and individual rights by state-sponsored cyber eavesdropping.

How a Cloud Can Save the Day

Those who work in information technology know that it can be an exciting yet fast-paced environment. Modern firms have demanding needs to stay on top of the ever-evolving trends in the technical space. Talented individuals are needed to help solve complex technical problems with creative solutions.

Security Risks Surrounding Near Field Communication

Another technology is making inroads into our professional lives, while experts begin to weigh its benefits against the security risks.

Op Ed: The IT Energy Solution

Energy is a familiar topic during election seasons. Presidential candidates offer a variety of ideas on how they plan to reduce our nation’s dependency on foreign oil, calling for innovations within the industry.

3 Proactive Steps to KISS Cybersecurity Woes Goodbye

How secure is your business from a cyber attack? If your organization is attacked, what will you lose, both in the attack and in the aftermath or recovery?