May 24, 2016

0 Comments

Cyber Security Degree vs. Technology Management Degree

IT professionals are in high demand for leadership and management positions. While it takes years of experience on the job to understand the intricacies of IT systems, understanding the long-term business implications of IT decisions can often be difficult to learn on the job. A master’s program such as a cyber security degree or technology management […]

Continue reading...

May 18, 2016

0 Comments

Career Success in Tech Management

Career success in tech management is fluid as IT professionals aren’t restricted to one industry. Sure, there tons of IT jobs in the IT industry but tech management professionals are needed in every industry. This is highlighted by a recent survey shows that there is only a 3-4% unemployment rate among technology professionals in the United […]

Continue reading...

April 25, 2016

0 Comments

The Changing Role of the CIO

As technology evolves, so has the role of the CIO and the core competencies required to be successful. It is integral for aspiring and current CIOs to update their skillsets to align with the changes in technology. Professional development, either through a masters in technology management degree or CIO certification, can fulfill this need. The […]

Continue reading...

April 11, 2016

0 Comments

Cybersecurity Innovation Forum Preview

Within the cybersecurity industry, staying at the top of the latest cybersecurity innovations is pertinent to sustained success. Discussions with fellow cybersecurity experts on new cybersecurity innovations will help you to stay relevant and focused. George Mason’s School of Business will be hosting a Cybersecurity Innovation Forum on April 13 for professionals looking to discover […]

Continue reading...

March 22, 2016

0 Comments

Shuffling May Be Best Cybersecurity Defense

A team of George Mason researchers proposes a “moving-target” defense against distributed denial-of-service attacks. The defense works by repeatedly shuffling client-to-server assignments to identify and eventually quarantine malicious clients. Denial-of-service attacks, which work by overwhelming a target system thereby forcing it to shut down and deny service to legitimate users, are increasing in severity as […]

Continue reading...