Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

Securing the Systems We Can’t Live Without

What’s the first thing you do when waking in the morning? Turn on the lights? Brush your teeth? Or maybe fire up your laptop to check the morning’s emails? Much of the activity we perform is tied to a web of interconnected systems that allow us to function throughout our day. But what happens when systems critical to our daily living stop working? An example is noticeable on the East Coast, where many of our fellow students and faculty recently dealt with the effects of the havoc wreaked by Hurricane Sandy and hazardous winter conditions.

How to Successfully Pass the PMP Exam

Interested in adding a Project Manager Professional (PMP) designation to your career toolkit? Recently, I reached out to PMP and friend, Fahad Usmani, to gain his insight on the PMP certification process.

Demand for Cybersecurity Experts on the Rise

Virtually all government and business databases and operations are digitized. Most are linked through communications networks, with many accessible via the Internet. Since information, from national security secrets to trade secrets and daily business operations, is housed in computers and their networks, it’s not surprising that cyberattacks are a major threat to the cyberworld. Within cyberspace, attacks motivated by criminals, hostile governments, terrorists, ex-employees with grudges and hackers have become an epidemic problem.

6 Overlooked Internal Security Threats

For data to truly be an asset, there must be processes, procedures, systems and ownership that insure the accuracy, integrity and timeliness of the data. If data does not have these attributes and capabilities, then why should we be concerned with protecting it? This reveals an obvious front-end requirement of the spectrum of data protection.

Can Fair Trials Exist with Social Media?

In previous blogs, we looked at how criminals are using social media and what they’re doing with the information they find online. We also discussed how law enforcement uses social media to track and ultimately prosecute criminals. Now let’s look at how social media is impacting the courtroom.

Is Cloud Technology the “Next Big Thing” in Healthcare?

Hands down, cloud technology is changing the IT landscape whether we’re ready for it or not. The cloud offers businesses and their IT functions greater flexibility and at a more cost-effective rate, so we can expect this trend to become a mainstay, especially in health care related businesses.

The Benefits of Creating Shared Value as a Business Strategy

The CTU Distinguished Lecturer Series continued with Dr. Ingo Böbel, a published author and scholar who has had a profound impact on industrial organization research.

Clear and Present Danger - National Security’s Top Five Threats

Recently, National Defense Magazine (NDM) published a report on the top five threats to national security.

Why Business Students Should Care About Ethics

In the early 2000s, the scandals at Enron, Arthur Anderson and WorldCom caused leading enterprises and places of higher learning to have more prominent discussions about business ethics. The late-2008 global economic meltdown added more names to the list of once reputable companies that have now become infamous: Washington Mutual and Lehman Brothers.