cherry blossoms surrounding a gazebo on the GWU Campus

Cybersecurity and Cloud Computing Articles

Types of Security Analytics in a Post-Pandemic World

The COVID-19 pandemic forced organizations to adapt business models for the new standard of working from home, and with that, it also created a new set of opportunities for cyber criminals. Hackers quickly seized the opportunity to take advantage of increased security vulnerabilities due to the rapid shift to more cloud servers and network-connected devices; […]

Network Security vs. Cloud Security: Which Is Right for You?

The circumstances of 2020 made it extremely clear that network security and cloud security are essential for today’s digitally connected world. More records were compromised in 2020 than in any year since at least 2005, increasing 141 percent over 2019’s numbers, according to consulting and solutions firm Risk Based Security. Network security and cloud security […]

Cyber Security vs. Information Security – Is There a Difference?

With prominent cyber security breaches becoming a somewhat regular occurrence, including recent attacks on companies to retrieve credit card data from customers, organizations around the country are, at present, frequently outgunned in the fight to protect their vital information. The problem isn’t bound exclusively to the private sector either; government agencies still struggle to defend […]

Master’s in Computer Science vs Cybersecurity: What’s the Difference?

With so many options for professional development available, computer and IT professionals may wonder which master’s degree would be better suited for their career goals: a master’s degree in computer science vs. cybersecurity. The best way to choose between the two is to understand the demands of each program and the career possibilities they bring. […]

What Does Information Security Mean and Why Does It Matter?

The Importance of Information Security Of all the pressing challenges facing leaders in business and government today, one stands above the rest: keeping their information secure. With computerized technology integrated into nearly every facet of our lives, this concern is well founded. Securing information is urgent for intelligence agencies, law enforcement, and private security firms, […]

The Difference Between a Master’s of Information Assurance vs Cybersecurity

From large-scale consumer data breaches to an unprecedented foreign attack on the 2016 U.S. presidential election, public and private institutions are increasingly being called upon to better secure their data. With so much uncertainty and vulnerability related to data protection, one thing is clear: As cyber criminals become more sophisticated, those who protect, secure and […]

How to Become DoD 8570 Certified

Information Assurance Certification is a valuable way to boost your career. It is also an essential step to working in highly regulated environments. One of the primary areas where information assurance certifications are essential is the U.S. Department of Defense, where all individuals who have the ability to access DoD information systems must meet specific […]

The George Washington University to Launch New Online Cybersecurity Master’s Degree

The George Washington University’s School of Engineering and Applied Sciences (SEAS) will offer an online Master of Engineering in Cybersecurity Policy and Compliance M.Eng.(CPC) with its first term starting this fall. Given the rise in cybercrime and instances of global corporate espionage, this program fills an urgent staffing demand by educating students with a specific […]

Request Information

To learn more about GW’s online graduate programs in cybersecurity and cloud computing, and download a free brochure, fill out the fields below. If you have any additional questions, please call (833) 330-1454 to speak to an admissions counselor.

* All Fields Required. Your Privacy is Protected.

The George Washington University respects your privacy. By submitting this form, you consent to receive emails and calls, which may use automated technology, from a representative of GW. We need your consent to contact you, but you can enroll without consenting to our contacting you.

  Are you enrolling from outside the U.S.? Click Here for an international-friendly contact form.