Colorado Christian University
Dr. Bryan Malone

Dr. Bryan Malone

Faculty Spotlight

Degrees and Experience
  • D.C.S. in Computer Science (Colorado Technical University)
  • M.Ed. in Secondary Education (Eastern New Mexico University)
  • B.B. in Computer Information Systems/Business Administration (Eastern New Mexico University)
  • Post Graduate Work in Online Instructional Technology (Texas Tech University)
Biography and Professional Achievements

After earning his bachelor’s degree in Computer Information Systems/Business Administration (Eastern New Mexico University), Dr. Malone went on to earn a Master of Education degree in Secondary Education (Eastern New Mexico University), and a D.C.S. in Computer Science (Colorado Technical University). The combination of scholastic and operational experience allows him insight into both the theory and practical implementation of cyber security in various business settings.

As a subject matter expert in applied cyber technology research, Dr. Malone’s areas of expertise range from cyber security, business development, computer science, software engineering, to network protection.

Faith and Learning

Modern smartphones are nothing more than computers that carry phone capabilities. These devices are more powerful than the computers that put a man on the moon. Today, we travel with the convenience of accessing data in real-time. Nevertheless, that convenience comes with risks because these same networks that allow access also allow criminals a path to those same resources.

Ethics, morality, and rigor should dictate prevention in cybersecurity. As with any position of trust, it is important to be able to rely on a person’s moral and ethical foundation like those found in the police, physician, teaching, and cybersecurity disciplines. Add to this the inclusion of strong Christian faith, one that encompasses a harmonious walk with Christ, and you have the necessary foundation to be a valuable employee.

As Christians, we tend to be more trusting just by our very nature of faith and forgiveness. We often take on Jesus’ stance found in Luke 6:31 to “Do to others as you would have them do to you” and Mark 12:31 “Love your neighbor as yourself” as guiding principles for a Christian-based life that should lead us to be less abusive when considering using these skills for personal gain.

The only difference between the behaviors of ethical hackers and cybercriminals in the cybersecurity world is the reason for committing the act. Ethical hackers are extended permission from the owner of the computer system to test the limits of the employed security.

Cybercriminals seek to exploit vulnerabilities for personal gain and without a moral conscience. John 10:10 states the "thief comes only in order to steal, kill and destroy" but ethical hackers come so others "may have life, life in its fullest measure" with safety and protection. As Christians, we seek to provide the application of trust, ethics, morals, and professionalism.

Publications and Presentations
  • Ryoo, J., Malone, B., Laplante, P. and Anand, P., “The Use of Security Tactics in Open Source Software Projects,” IEEE Transactions on Reliability, Volume: 65 Issue: 3, pgs. 1195-1204, 2016.
  • “Two Different Approaches to Online Course Offerings,” League for Innovation in Community Colleges conference on "Information Technology," Chicago, October 1999.
  • “Online Training Tools for the Internet,” Stop Surfing-Start Teaching National Conference: Teaching and Leaning Through the Internet, Myrtle Beach, S.C., February 1999.
  • Web-based Student Satisfaction Survey, 1999 New Mexico Higher Education Assessment Conference, Albuquerque, N.M., February 1999.