Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

Cybercriminals: Masterminds Wreaking Havoc in Cyberspace

There is a tremendous diversity to the threats in the cyber domain and the entities that are behind them. Let’s take a closer look at the individuals responsible for the various threats threatening our cybersecurity.

Cyber Threats to our Personal and National Security

In recognition of Cybersecurity Awareness month in October, our faculty offer insights on both policy and technical issues related to cybersecurity. In our second post of the series, Bruce Harmon, Ph.D., took a look at the defining terminology making its way into our culture. In today’s post, Stephen Recca, M.A., takes a look at four cybersecurity threats from a policy perspective.

Trojan Horse, Zombies and 15 Critical Cybersecurity Terms You Need to Know

These days, everyone is vulnerable to cybercrime and other breaches to the security of their digital systems and identity. Our world is increasingly connected through computers, smart phones and tablets and an exploding number of apps. This influx of technology makes for that many more digital portals to protect.

Security Challenges in East Africa: Global Jihadist Groups

The East African region, and neighboring Yemen – located just across the Bab al Mandab straight – have been a central area of activity for al Qaeda, its affiliates and fellow travelers. Prior to 9/11, al Qaeda carried out its first major attack against the United States in the region when, in August of 1998, al Qaeda suicide bombers attacked the U.S. embassies in Nairobi, Kenya and Dar es Salaam, Tanzania.

What Is Cyber?

Cyber is in. Government officials share worries over cybersecurity. The Intelligence Community warns of cyber threats from nation states, anarchist groups and lone wolves. Civil liberties watch groups decry infringements of privacy and individual rights by state-sponsored cyber eavesdropping.

Security Risks Surrounding Near Field Communication

Another technology is making inroads into our professional lives, while experts begin to weigh its benefits against the security risks.

Federalism and Homeland Security: Our Constitutional System of Governance

All governing systems have their pros and cons and the constitutional system that we have in the United States is no exception. One could argue that the single theme that has served as a central thread throughout American history is the old argument between Thomas Jefferson and James Madison over the role, power and authority of state versus federal governments.

3 Proactive Steps to KISS Cybersecurity Woes Goodbye

How secure is your business from a cyber attack? If your organization is attacked, what will you lose, both in the attack and in the aftermath or recovery?

Global Impact of the Rise of China: Defining Government

The People’s Republic of China is governed by the Chinese Communist Party or CCP. China is a one-party authoritarian state and the CCP is committed to maintaining a permanent monopoly on political power. China today has a collective leadership and major decisions require consensus among the CCP’s senior echelons, unlike North Korea and Cuba whose Communist parties have acted as support structures for the rule of dictators.

Global Impact of the Rise of China: the Twentieth Century

At the dawn of the Twentieth Century, China found itself divided, weak, and subject to the predations of colonial powers.

Attack on the Sikh Temple in Wisconsin: A Case of Mistaken Identity?

On August 5, 2012, white supremacist Wade Michael Page carried out an act of domestic terrorism gunning down six Sikh worshipers and injuring several others, including a police officer who responded to the emergency call.

Rethinking the Cybersecurity Equation

We need to take a hard look at our cybersecurity policy and ensure those that that frame it are the best minds private and public sectors can bring to the table.

Global Security Series: The Syrian-Iranian Link and Its Impact on the Region

Our Global Security Series offers background and analysis on issues related to U.S. national and global security. In Dr. Morag’s fourth post covering Syria, he continues to provide insight into the history and key players in Middle-Eastern conflict.

After the Colorado Wildfires: 3 Lessons in Disaster Preparedness

The Waldo Canyon fire is mostly gone, now, but has left its mark on the mountainside, the neighborhood, and the hearts of people. My thoughts go out to those who lost their homes.

Global Security Series: Syria’s Role in the Middle East and Arab-Israeli Conflict

CTU’s Global Security Series offers background and analysis on issues related to U.S. national security and homeland security. In Dr. Morag’s third post covering Syria, he provides an overview of the country’s role in regional conflict.