Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

Securing the Systems We Can’t Live Without

What’s the first thing you do when waking in the morning? Turn on the lights? Brush your teeth? Or maybe fire up your laptop to check the morning’s emails? Much of the activity we perform is tied to a web of interconnected systems that allow us to function throughout our day. But what happens when systems critical to our daily living stop working? An example is noticeable on the East Coast, where many of our fellow students and faculty recently dealt with the effects of the havoc wreaked by Hurricane Sandy and hazardous winter conditions.

How to Successfully Pass the PMP Exam

Interested in adding a Project Manager Professional (PMP) designation to your career toolkit? Recently, I reached out to PMP and friend, Fahad Usmani, to gain his insight on the PMP certification process.

5 Tips for Getting LinkedIn Recommendations

LinkedIn recommendations will never replace a traditional reference check, but they certainly can’t hurt. They can speak to your credibility, while giving your LinkedIn profile a boost. While recommendations are important, it’s important not to overdo it. Quantity matters less than quality in many cases.

Why Knowing Your Audience is Key for Effective Writing

In my 12 years as a writing instructor, I recognize the negative feelings people have toward writing. I see the anxiety students have at the thought of putting proverbial pen to paper. Some are even adamant that they’ll never need writing skills for their chosen profession. Yet it’s hard to dispute that we live in a time more dependent on writing than ever before. Ultimately, effective writing depends on how well you analyze and address your audience.

How to Find Your Passion in 2014

The best leaders are also great visionaries. Being a visionary is not just about having great dreams. It’s about having the passion to transform those dreams into reality.

Demand for Cybersecurity Experts on the Rise

Virtually all government and business databases and operations are digitized. Most are linked through communications networks, with many accessible via the Internet. Since information, from national security secrets to trade secrets and daily business operations, is housed in computers and their networks, it’s not surprising that cyberattacks are a major threat to the cyberworld. Within cyberspace, attacks motivated by criminals, hostile governments, terrorists, ex-employees with grudges and hackers have become an epidemic problem.

6 Overlooked Internal Security Threats

For data to truly be an asset, there must be processes, procedures, systems and ownership that insure the accuracy, integrity and timeliness of the data. If data does not have these attributes and capabilities, then why should we be concerned with protecting it? This reveals an obvious front-end requirement of the spectrum of data protection.

Can Fair Trials Exist with Social Media?

In previous blogs, we looked at how criminals are using social media and what they’re doing with the information they find online. We also discussed how law enforcement uses social media to track and ultimately prosecute criminals. Now let’s look at how social media is impacting the courtroom.

Academic Leadership: 3 C’s to Ensure Success in the Classroom

Most people share their challenges, yet few give as much attention to their success. Of course, we can grow and learn from challenges, but there is just as much growth and learning available when we examine our success.

Why Personal Branding is Critical in the Digital Age

Research shows that it takes a fraction of a second for someone to form a first impression of you, and often that impression is accurate. When you settle on that bit of knowledge, it’s unnerving. What if the impression you’re leaving behind isn’t the one you intended?

Is Cloud Technology the “Next Big Thing” in Healthcare?

Hands down, cloud technology is changing the IT landscape whether we’re ready for it or not. The cloud offers businesses and their IT functions greater flexibility and at a more cost-effective rate, so we can expect this trend to become a mainstay, especially in health care related businesses.

The Benefits of Creating Shared Value as a Business Strategy

The CTU Distinguished Lecturer Series continued with Dr. Ingo Böbel, a published author and scholar who has had a profound impact on industrial organization research.

Clear and Present Danger - National Security’s Top Five Threats

Recently, National Defense Magazine (NDM) published a report on the top five threats to national security.

Why Business Students Should Care About Ethics

In the early 2000s, the scandals at Enron, Arthur Anderson and WorldCom caused leading enterprises and places of higher learning to have more prominent discussions about business ethics. The late-2008 global economic meltdown added more names to the list of once reputable companies that have now become infamous: Washington Mutual and Lehman Brothers.

Innovation in Higher Education: Student Centered Teaching

Prior to my career in higher education, I consulted with organizations on how to effectively use emerging media to achieve strategic goals. One client was an intermediate school district. I recall conversations with the district’s curriculum consultants about how experts knew (and preached) the value of innovation in teaching and learning, but failed to actually put it into practice.