Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

Taking the Scare out of Writing: What Stephen King (and Other Fiction Writers) Can Teach Us about Writing Essays

The advice of fiction writers such as Stephen King and Robert A. Heinlein has helped me hone my craft. I learn from the purveyors of the craft who have come before me. Books such as On Writing have caused me to reflect upon the life experiences that make me the writer I am.

Is the U.S. Prepared to Manage Cybersecurity Threats?

The United States does not yet have a national strategy to deal with cybersecurity; cyber law is undeveloped, and while narrow segments of expertise exist inside and outside of government, broad understanding of the threat and what we might do to prepare for, recovery from, and respond to cyber attacks is woefully lacking.

Election Season 2012: What’s Next for Higher Education?

Higher education has been a great point of debate throughout this presidential election season. Much can be learned from the platforms of both President Barack Obama and Mitt Romney and their collective approach to ensuring that Americans have high quality and accessible means to personal and professional development.

5 Elements of Effective Thinking: SAIR Conference Recap

The highlight of the conference was Professor Edward Burger’s keynote address entitled, “The 5 Elements of Effective Thinking.” A captivating speaker, Dr. Burger creatively outlined these five elements of effective—or innovative—thinking, which he linked to the four basic earthly elements which predate Socrates: Earth, Fire, Air, and Water.

Preparing for Disaster: Exercise Angel Thunder 2013

I recently returned from a planning conference associated with Exercise Angel Thunder 2013. AT-13, and its Defense Support of Civil Authorities segment (Resolute Angel) are played on an 18-month cycle to exercise local, state, federal, and multinational civil and military agencies in disaster response and – particularly for the military forces – personnel recovery in simulated earthquake and combat scenarios.

Trouble Landing Interviews? A Weak Online Presence May Be To Blame

Today, as many as 92% of employers and recruiters use social networks to find job candidates – yet only 38% of job seekers report regular use of LinkedIn to find work. With the candidate pool growing more homogeneous and the hiring process almost entirely digital, there’s really no denying that a professional presence online is critical to career success.

Why Most Entrepreneurs Avoid Decaf and Leap Before They Look - Q & A with Dr. Gene Landrum, Founder of Chuck E. Cheese

An entrepreneur is an enlightened renegade who refuses to kow-tow to conventional wisdom and is always willing to bet what they have to get what they want. Entrepreneurs tend to be radicals on a mission to sate a deep-seated passion; an obsessive Promethean (Intuitive-Thinker) willing to sacrifice all for the redemption of a dream. And strange as it may seem, an entrepreneur tends to leap before they look.

Cybercriminals: Masterminds Wreaking Havoc in Cyberspace

There is a tremendous diversity to the threats in the cyber domain and the entities that are behind them. Let’s take a closer look at the individuals responsible for the various threats threatening our cybersecurity.

A Question of Degree: Will an MS or an MBA Do?

The MBA is designed to equip the individual with an overall core knowledge of business, with courses in finance, economics, marketing, accounting, strategy and leadership. The MS, on the other hand, offers deep dives into coursework that is aligned with a specialized, or more directed career path.

Cyber Threats to our Personal and National Security

In recognition of Cybersecurity Awareness month in October, our faculty offer insights on both policy and technical issues related to cybersecurity. In our second post of the series, Bruce Harmon, Ph.D., took a look at the defining terminology making its way into our culture. In today’s post, Stephen Recca, M.A., takes a look at four cybersecurity threats from a policy perspective.

Uncovering the Truth: The Reality of Criminal Profiling

Law enforcement has long been a rich source of fodder for the creative minds that keep us entertained in front of the television – not to mention the big screen – year in and year out.

Trojan Horse, Zombies and 15 Critical Cybersecurity Terms You Need to Know

These days, everyone is vulnerable to cybercrime and other breaches to the security of their digital systems and identity. Our world is increasingly connected through computers, smart phones and tablets and an exploding number of apps. This influx of technology makes for that many more digital portals to protect.

Rumblings Over International Financial Reporting Standards

We are on the cusp of seeing a uniform way in which financial statements will be prepared as a result of the growing global economy.

Security Challenges in East Africa: Global Jihadist Groups

The East African region, and neighboring Yemen – located just across the Bab al Mandab straight – have been a central area of activity for al Qaeda, its affiliates and fellow travelers. Prior to 9/11, al Qaeda carried out its first major attack against the United States in the region when, in August of 1998, al Qaeda suicide bombers attacked the U.S. embassies in Nairobi, Kenya and Dar es Salaam, Tanzania.