stitcherLogoCreated with Sketch.
Get Premium Download App
Listen
Discover
Premium
Shows
Likes

Listen Now

Discover Premium Shows Likes

Cyber Frontiers

51 Episodes

61 minutes | 5 months ago
Zero Trust Security In a Pandemic Mindset – CF063
This week on Cyber Frontiers Christian and Jim talk about the zero trust security paradigm and how COVID-19 has drawn this security model into focus for the enterprise. As corporations accelerate technology adoption timelines to meet the demands of a remote workforce, cybersecurity practices and investments are evolving to secure employees and corporate assets in remote work environments. After diving into key aspects of zero trust, we walk through the recent Twitter security incident and analyze the event through the lens of zero trust. We wrap by discussing the evolving trends for the C-suite security mindset and how these ideas
69 minutes | 9 months ago
Identity Theft Protection in 2020 – CF062
This week on Cyber Frontiers Jim and Christian explore how identity theft monitoring services continue to evolve in 2020 to include protection beyond traditional monitoring capabilities. We evaluate how effective these services have been historically, how the business model is shifting, and what the average consumer can expect in trying to increase overall security. We line up the discussion with historical anecdotes on social security, FTC litigations, and statistics on consumer theft at large. It’s a new spin on an old topic with many touch points to previous episodes, and contains food for thought on effective measures to increase security
68 minutes | 10 months ago
COVID-19 Data Analytics – CF061
This week on Cyber Frontiers Christian and Jim tackle the technology shaping society amidst the Coronavirus (COVID-19). We dive into the health (and growth) of the internet backbone, working from home, and distance learning to name a few. We then switch gears into discussing how data and analytic capabilities behind the virus tricked into the mainstream and is now widely available to society at large to make well informed decisions. We specifically highlight the importance of accurate data visualizations to not skew good data, and highlight Corona Data Scraper as a model of open-source, scalable, accurate data analytics and visualizations
64 minutes | a year ago
Adversarial Machine Learning – CF060
This week on Cyber Frontiers Christian and Jim dive into ‘jedi mind tricks’ of AI, better known as adversarial machine learning. We narrate stories that tell tales of fooling the common systems that humans have come to rely on today, from maps to self driving cars, to airport scanners and identification systems. We discuss the growing surface area for cyber physical attacks, and the lack of general purpose solutions and proofs needed to tackle securing machine learning algorithms. We tie together IoT, AI, and ML technologies on the cyber frontier with a new security perspective not analyzed prior on the
60 minutes | a year ago
Security Education with Cyber Skyline – CF059
This week on Cyber Frontiers Christian and Jim interview Franz Payer, CEO of Cyber Skyline (cyberskyline.com) to discuss their platform for training and developing the next generation of security professionals in the industry. We discuss the current challenges in the security education market and explore where Cyber Skyline fills a critical gap across three products that help first-time participants and security practitioners alike up their infosec ability. We also take a look at the growing market segment for cyber education and discuss the evolution of Cyber Skyline into the company it is today. We cover the trends that are evident
59 minutes | a year ago
Quantum Supremacy and the Cryptology Time Machine – CF058
This week on Cyber Frontiers Christian and Jim recap the latest major development in quantum research with Google’s “Quantum Supremacy” milestone. We review the headline narratives and compare today’s quantum progress with where we and others expected it to be. We delve into the tangentially related topic of cryptography, quickly leading to a walk through time of where secure computing has been and where it could be heading looking forward. Scattered throughout we bring in what it all means for the average guy, and even get some time to relate it all back to… ham radios?  Cyber Frontiers is
58 minutes | a year ago
Cyber Anecdotes: A Tale of Worms, Shared Security, and More – CF057
This week on Cyber Frontiers Christian and Jim recap security highlights from the past six weeks. We take a dive into the latest security challenges facing Windows 10, review the buzz around the Capital One breach, and jump into a variety of new tech from cell phone apps to detect pump skimmers to IBM’s unusual announcement of a blockchain-based web browser. We pack interesting anecdotes on the security landscape into an hour you won’t want to miss.  Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future!   Christian Johnson will bring fresh and
72 minutes | 2 years ago
The Manifestation of New Exploitation – CF056
This week on Cyber Frontiers we catch up on some of the latest exploitations and availability drops on the web. We kick off with a discussion of the release of the TCP SACK panic as a new mechanism for DDoS via TCP protocol. We then cover a spectrum of relevant security news with the Microsoft OS product line to round off our security deep dives. On the availability side, we recap the Target outage and the Google Cloud Outage and what it means for consumers. We round things off with some healthy skepticism of Facebook’s new Libra crypto-currency. And as
63 minutes | 2 years ago
Data Breach SecOps, Reputations, and IoT Security – CF055
This week on Cyber Frontiers Christian and Jim catch up on cyber anecdotes from our listeners! We start with a deep dive on the data breach website haveibeenpwned.com — and discuss ways users can leverage the data and APIs to reduce their surface area and take advantage of security best practice. From here we tangent onto corporate reputations and polling data, IoT device security, and more! We thread a needle of seemingly disjoint anecdotes into a show that has something for everyone.  Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future!   Christian
71 minutes | 2 years ago
Quantum, Cyber, Oh My! The Best of RSA 2019 – CF054
This week on Cyber Frontiers Christian and Jim dive into recapping some of the best content from RSA 2019! We pack in a lot of content this show — ranging from a deep-dive into the most pervasive attack techniques in cybersecurity today to a comprehensive review on the state of quantum computing. Whether you are a math nerd, physicist, computer guy, or generalist — there is something for everyone in the quantum content we cover. We bring you what the modern frontier looks like on the sunset side of RSA 2019, which had over 42,000 in attendance this year spanning
50 minutes | 2 years ago
Containers Gone Wild – CF053
This week Christian and Jim dive into the “doomsday” (dramatic much?) cyber event of 2019 — escaping Docker containers! Formally known as CVE-2019-5736, we dive deep on the technical research undertaken by Dragon Sector to take advantage of Linux namespaces in order to reveal the larger discovery and exploit and what it means for the industry. We cover it from the average guy angle as well, and include discussions on use cases for classic virtualization strategies compared to containerization. We leave some food for thought for next time on how machine learning techniques are impairing methodologies for scientific validation of
69 minutes | 2 years ago
AI Rising – CF052
This week on Cyber Frontiers we catch up on the lingo defining the technology frontier word cloud in 2019. Everyday we increasingly hear the phrase “we can do this now because of artificial intelligence (AI).” It’s showing up in product literature, super bowl ads, you name it! But is it really AI? How did we get to the new hype curve so quickly? We parse out the journey of the buzz from the year of cyber (2017), to the year of machine learning (2018), to what is rapidly shaping up as the year of artificial intelligence (2019). We hop on
74 minutes | 2 years ago
Crypto and Blockchain: Enablers of the Future – CF051
This week on Cyber Frontier Christian dives into the state of affairs in the cryptocurrency battle for adopters and the ultimate future of blockchain. We discuss some of the origins of what made Bitcoin popular and misunderstood, while re-tracing how it enabled blockchain technology to gain stronger visibility in the eyes of technologists. From here we discuss the fundamental advancements in computer science that enabled blockchain to succeed, and discuss its future in shaping the internet over the next 10 to 25 years. We also discuss other use cases blockchain is likely to expand into, and provide some initial forecasts
67 minutes | 2 years ago
Computing Without the B.S. – CF050
This week on Cyber Frontiers Christian and Jim discuss the computing industry without the bachelor’s degree (B.S.). We discuss the recently increasing trend of major tech companies doing away with degree requirements for top software engineering positions. We evaluate the pros and cons of university value propositions, co-ops/work studies, internships, and apprenticeships and discuss which jobs seem best tailored with-in the field for these backgrounds. As demand for these positions continues to grow, we also discuss the ways in which the job is evolving itself with the advancement of automation and cloud computing, which is letting developers at companies focus
63 minutes | 2 years ago
Kill The Ancient Authenticator! – CF049
This week Christian is joined by Jim to talk about killing off password security on web and communication platforms, a.k.a. the era of the hardware authenticator! We dive deep into the release of the Yubikey 5, FIDO 2, and Webauthn standards and how these platforms and standards will usher in the next phase of improved cybersecurity for enterprises as well as the average guy. We talk about some of the historical implications of protocols that haven’t evolved over the last thirty years, and what these technologies bring to the table to augment existing internet infrastructure. We also briefly veer into
52 minutes | 2 years ago
AI In Everyday Life: Is It Ready for the Limelight? – CF048
This week on Cyber Frontiers Christian is joined by Jim to discuss common AI applications influencing everyday life. We take a look at the latest learning technology in discerning fake news, facial recognition at airports, and driverless cars in the Uber and Lyft fleets. We weigh in on what empirical methods are available for validating these use cases in AI, and the socioeconomic impacts that these technologies will create for the average guy in the next five to ten years.  Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future!   Christian Johnson will
55 minutes | 2 years ago
Highlights from DEFCON 26 – CF047
This week on Cyber Frontiers Christian and Jim get together to talk about the highlights from DEFCON 26. We dive deep into how voicemails and SMS-unlocks are being used to bypass two-factor authentication on common technology platforms — and how simple attack surfaces are exploited to turn the old tech of voicemails into eye-candy for attackers. We also review the hardware and application based mechanisms used to avoid some of these commonly exploited vectors. We also take some time to discuss potential “digital side doors” into banking data using common financial management applications and introduce the word of the day
COMPANY
About us Careers Stitcher Blog Help
AFFILIATES
Partner Portal Advertisers Podswag
Privacy Policy Terms of Service Do Not Sell My Personal Information
© Stitcher 2020