Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

Global Security Series: Collapse of the Syrian Regime and Implications for the Region

The Assad regime, which has ruled Syria since 1963, first under Hafez al-Assad and now under his son, Bashar al-Assad, is in its death throes.

The IT Infrastructure of the Olympics

As the 2012 London Olympics unfold, it is staggering to consider the role information technology plays in the wide-reaching, seventeen-day event; particularly when you consider how the events have changed over history.

After the Aurora Shootings: The Prosecution and Defense of James Eagan Holmes

As extensive media coverage of James Holmes’ shooting spree in Aurora, Colorado continues, reports offer firsthand accounts from survivors of the unfortunate night.

Obamacare: The good and bad

One thing is certain: the debate on how to provide healthcare in the United States will not stop with the Supreme Court's ruling.

Global Security Series: The Syrian-Iranian Link and Its Impact on the Region

Our Global Security Series offers background and analysis on issues related to U.S. national and global security. In Dr. Morag’s fourth post covering Syria, he continues to provide insight into the history and key players in Middle-Eastern conflict.

Rethinking the Cybersecurity Equation

We need to take a hard look at our cybersecurity policy and ensure those that that frame it are the best minds private and public sectors can bring to the table.

Why a 3.3 GPA Could Serve You Best in the Real World

Stop for a moment and consider GPA from the perspective of a potential employer: How important is it that a candidate boasts a 4.0? Conventional wisdom would tell you the higher the GPA, the better – but is this really true?

Global Security Series: Syria’s Role in the Middle East and Arab-Israeli Conflict

CTU’s Global Security Series offers background and analysis on issues related to U.S. national security and homeland security. In Dr. Morag’s third post covering Syria, he provides an overview of the country’s role in regional conflict.

The Cyber Domain: Five Ways to Frame the Security Policy Discussion

Over the last decade alone, technological advances have forced a sea change upon the world with myriad positive implications. But for all the positives, there’s a dark side to our fast-evolving cyber world. There’s been a simultaneous emergence of cyber threats and crimes on a variety of fronts that pose a risk to individuals, businesses, and governments.

Global Security Series: Syria, a Country of Multiple Identities

In Dr. Morag’s second post covering Syria, he provides a brief overview of the country’s political history – from the creation of the French Mandate of Syria in 1920, through independence in 1946, to present day.

The Six-Pack and Criminal Investigations

The goal of any investigation is to find the truth. However, sometimes methods we use to uncover the truth don’t measure up. The “six-pack” is one method that has long had a role in how law officers identify suspects recently been called into question.

Why Certify? Driving Forces Behind Industry Certifications

College graduates do need to consider how they will distinguish themselves from thousands of other graduates competing in the job market.