Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

Is Cloud Computing the New ‘Green’ Solution?

Today, cloud computing is one of the most cost effective ways of managing enterprises and web applications. The National Institute of Standards and Technology (NIST) explains that cloud computing enables "…on-demand network access to a shared pool of networks, servers, storage, applications and services that can be rapidly provisioned and released with minimal management effort or service provider interaction.” It’s convenient and efficient technology, for sure.

How to Thrive as an IT Professional

The Information Technology (IT) function has become increasingly important to overall decision-making and strategy implementation in businesses. That’s not surprising when you consider how technology drives competitive advantage. Innovation enables businesses to stay ahead of the competition, delivering and satisfying more customers more effectively and efficiently. Further, IT is now an important revenue generator as an increasing share of consumer sales are transacted through mobile and online channels.

How to Successfully Pass the PMP Exam

Interested in adding a Project Manager Professional (PMP) designation to your career toolkit? Recently, I reached out to PMP and friend, Fahad Usmani, to gain his insight on the PMP certification process.

Demand for Cybersecurity Experts on the Rise

Virtually all government and business databases and operations are digitized. Most are linked through communications networks, with many accessible via the Internet. Since information, from national security secrets to trade secrets and daily business operations, is housed in computers and their networks, it’s not surprising that cyberattacks are a major threat to the cyberworld. Within cyberspace, attacks motivated by criminals, hostile governments, terrorists, ex-employees with grudges and hackers have become an epidemic problem.

6 Overlooked Internal Security Threats

For data to truly be an asset, there must be processes, procedures, systems and ownership that insure the accuracy, integrity and timeliness of the data. If data does not have these attributes and capabilities, then why should we be concerned with protecting it? This reveals an obvious front-end requirement of the spectrum of data protection.

Is Cloud Technology the “Next Big Thing” in Healthcare?

Hands down, cloud technology is changing the IT landscape whether we’re ready for it or not. The cloud offers businesses and their IT functions greater flexibility and at a more cost-effective rate, so we can expect this trend to become a mainstay, especially in health care related businesses.

All the Ways You're Not Protecting Company Data

In most organizations, the Chief Security Officer (CSO) or Chief Information Security Officer (CISO) is responsible for alerting the Chief Information Officer (CIO) and other key executives of potential security risks related to the business’ critical Information Systems (IS) infrastructure and data. Another key responsibility is to mitigate cyber-attacks.

So You Think You Have a Smart Password?

In previous posts, I’ve written about potential security threats you face when it comes to protecting your computer systems and data. In this post, we get personal as I share ideas for protecting your personal assets from digital vulnerabilities.

What Six Internal Security Threats are Lurking Down Your Office Corridors?

Big data is more than just hype from the tech world. The proliferation of information across multiple dimensions is real. It comes from everywhere, from cellphone GPS signals, to purchase records and to the updates we make to our favorite social media websites.

Striking a Balance: BYOD in the Corporation

I’m writing this post from the Next Generation Security Summit (NGSS) in Austin, TX. The event brings together about 100 senior executives, in particular the chief information security officers (CISOs), from corporations around the country. Are you curious to know the #1 priority on their minds? CISOs want to know how the proliferation of mobile devices impacts security and compliance. More specifically, how should organizations manage the Bring Your Own Device (BYOD) issue?

Is Cloud Computing Right For Your Organization?

Smart CIOs aren’t lemmings, leaping over cliffs and chasing bright shiny objects in search of the next Information Technology (IT) silver bullet. But in the case of cloud computing, many are diving in – head first.

Auto Hacking Could Be Your Biggest Threat

Approximately 400,000 people flow into the District of Columbia to work each day. Many commute by train or Metro. But a large number drive and thoughtlessly endure the slog into the Washington metro area. Few consider the potential threat hidden in their automobiles. But what if someone wanted to shut down the U.S. government? How might a determined adversary approach the problem using a non-kinetic weapon (i.e. no bombs or boom)? Could a simple computer virus do the trick?

When Disaster Strikes, Will Your Data be Safe?

Natural disasters, like Hurricane Sandy, are grim reminders that we are all vulnerable to unexpected catastrophes brought on by nature or by mankind. Weeks, months, and potentially years later, we experience devastating after-effects that disrupt our lives and our businesses. Yet, much can be done to mitigate the effects of disasters on your business, and it starts with a proactive disaster recovery (DR) strategy.

Is the U.S. Prepared to Manage Cybersecurity Threats?

The United States does not yet have a national strategy to deal with cybersecurity; cyber law is undeveloped, and while narrow segments of expertise exist inside and outside of government, broad understanding of the threat and what we might do to prepare for, recovery from, and respond to cyber attacks is woefully lacking.

Cybercriminals: Masterminds Wreaking Havoc in Cyberspace

There is a tremendous diversity to the threats in the cyber domain and the entities that are behind them. Let’s take a closer look at the individuals responsible for the various threats threatening our cybersecurity.