Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Never on a sched…
This week on Cyber Frontiers Christian and Jim catch up with Franz Payer, CEO of Cyber Skyline (related episodes: CF059, CF012). We explore the growth and development of the Cyber Skyline platform, which has evolved beyond cyber competitions to a suite of talent screening tools and skills-development capabilities. We get Franz's perspectives on where companies are currently struggling to keep up with hiring and retaining qualified cybersecurity talent and how Cyber Skyline fills the void. Learn more at Cyber Skyline Full show notes, transcriptions (available on request), audio and video at http://theAverageGuy.tv/cf67 Cyber Frontiers is all about
This week on Cyber Frontiers we are joined by special guest Ashton Webster. Ashton is now a software engineer at Capital One and has worked on several teams over the last 4 years that focused on fraud detection and prevention. We spend some time catching up with Ashton. We also look at a new rule in the United States that mandates that any company that is considered part of critical infrastructure would be required to report to the Department of Homeland Security within 72 hours of a data breach or within 24 hours of paying a ransomware attack.
This week on Cyber Frontiers Christian and Jim provide a 2021 replay of the headlines that captured the cybersecurity world by storm and look ahead to trends that will shape the direction of security in 2022. With wide-ranging commentary on incidents like the colonial pipeline attack, solar winds, and Log4j, to the mundane and rudimentary data breaches and ransomware attacks, we break down what areas the industry is improving in and where the industry still needs help. We also look at the technology shaping the post-COVID enterprise workplace, with commentary on zero trust architectures, MFA, network infrastructure advancements, and accessibility
We sat down with Liviu Arsene, a Global Cybersecurity Researcher for Bitdefender, Liviu has a strong background in security and technology and talked with us about both the Bitdefender Box and Bitdefender Premium VPN as well as some general Cyber security topics. Get more information about Bitdefender at https://bitdefender.com. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future! Christian Johnson will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large /
This week on Cyber Frontiers Christian and Jim talk about the zero trust security paradigm and how COVID-19 has drawn this security model into focus for the enterprise. As corporations accelerate technology adoption timelines to meet the demands of a remote workforce, cybersecurity practices and investments are evolving to secure employees and corporate assets in remote work environments. After diving into key aspects of zero trust, we walk through the recent Twitter security incident and analyze the event through the lens of zero trust. We wrap by discussing the evolving trends for the C-suite security mindset and how these ideas
This week on Cyber Frontiers Jim and Christian explore how identity theft monitoring services continue to evolve in 2020 to include protection beyond traditional monitoring capabilities. We evaluate how effective these services have been historically, how the business model is shifting, and what the average consumer can expect in trying to increase overall security. We line up the discussion with historical anecdotes on social security, FTC litigations, and statistics on consumer theft at large. It’s a new spin on an old topic with many touch points to previous episodes, and contains food for thought on effective measures to increase security
This week on Cyber Frontiers Christian and Jim tackle the technology shaping society amidst the Coronavirus (COVID-19). We dive into the health (and growth) of the internet backbone, working from home, and distance learning to name a few. We then switch gears into discussing how data and analytic capabilities behind the virus tricked into the mainstream and is now widely available to society at large to make well informed decisions. We specifically highlight the importance of accurate data visualizations to not skew good data, and highlight Corona Data Scraper as a model of open-source, scalable, accurate data analytics and visualizations
This week on Cyber Frontiers Christian and Jim dive into ‘jedi mind tricks’ of AI, better known as adversarial machine learning. We narrate stories that tell tales of fooling the common systems that humans have come to rely on today, from maps to self driving cars, to airport scanners and identification systems. We discuss the growing surface area for cyber physical attacks, and the lack of general purpose solutions and proofs needed to tackle securing machine learning algorithms. We tie together IoT, AI, and ML technologies on the cyber frontier with a new security perspective not analyzed prior on the
This week on Cyber Frontiers Christian and Jim interview Franz Payer, CEO of Cyber Skyline (cyberskyline.com) to discuss their platform for training and developing the next generation of security professionals in the industry. We discuss the current challenges in the security education market and explore where Cyber Skyline fills a critical gap across three products that help first-time participants and security practitioners alike up their infosec ability. We also take a look at the growing market segment for cyber education and discuss the evolution of Cyber Skyline into the company it is today. We cover the trends that are evident
This week on Cyber Frontiers Christian and Jim recap the latest major development in quantum research with Google’s “Quantum Supremacy” milestone. We review the headline narratives and compare today’s quantum progress with where we and others expected it to be. We delve into the tangentially related topic of cryptography, quickly leading to a walk through time of where secure computing has been and where it could be heading looking forward. Scattered throughout we bring in what it all means for the average guy, and even get some time to relate it all back to… ham radios? Cyber Frontiers is
This week on Cyber Frontiers Christian and Jim recap security highlights from the past six weeks. We take a dive into the latest security challenges facing Windows 10, review the buzz around the Capital One breach, and jump into a variety of new tech from cell phone apps to detect pump skimmers to IBM’s unusual announcement of a blockchain-based web browser. We pack interesting anecdotes on the security landscape into an hour you won’t want to miss. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future! Christian Johnson will bring fresh and
This week on Cyber Frontiers we catch up on some of the latest exploitations and availability drops on the web. We kick off with a discussion of the release of the TCP SACK panic as a new mechanism for DDoS via TCP protocol. We then cover a spectrum of relevant security news with the Microsoft OS product line to round off our security deep dives. On the availability side, we recap the Target outage and the Google Cloud Outage and what it means for consumers. We round things off with some healthy skepticism of Facebook’s new Libra crypto-currency. And as
This week on Cyber Frontiers Christian and Jim catch up on cyber anecdotes from our listeners! We start with a deep dive on the data breach website haveibeenpwned.com — and discuss ways users can leverage the data and APIs to reduce their surface area and take advantage of security best practice. From here we tangent onto corporate reputations and polling data, IoT device security, and more! We thread a needle of seemingly disjoint anecdotes into a show that has something for everyone. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future! Christian
This week on Cyber Frontiers Christian and Jim dive into recapping some of the best content from RSA 2019! We pack in a lot of content this show — ranging from a deep-dive into the most pervasive attack techniques in cybersecurity today to a comprehensive review on the state of quantum computing. Whether you are a math nerd, physicist, computer guy, or generalist — there is something for everyone in the quantum content we cover. We bring you what the modern frontier looks like on the sunset side of RSA 2019, which had over 42,000 in attendance this year spanning
This week Christian and Jim dive into the “doomsday” (dramatic much?) cyber event of 2019 — escaping Docker containers! Formally known as CVE-2019-5736, we dive deep on the technical research undertaken by Dragon Sector to take advantage of Linux namespaces in order to reveal the larger discovery and exploit and what it means for the industry. We cover it from the average guy angle as well, and include discussions on use cases for classic virtualization strategies compared to containerization. We leave some food for thought for next time on how machine learning techniques are impairing methodologies for scientific validation of
This week on Cyber Frontiers we catch up on the lingo defining the technology frontier word cloud in 2019. Everyday we increasingly hear the phrase “we can do this now because of artificial intelligence (AI).” It’s showing up in product literature, super bowl ads, you name it! But is it really AI? How did we get to the new hype curve so quickly? We parse out the journey of the buzz from the year of cyber (2017), to the year of machine learning (2018), to what is rapidly shaping up as the year of artificial intelligence (2019). We hop on
This week on Cyber Frontier Christian dives into the state of affairs in the cryptocurrency battle for adopters and the ultimate future of blockchain. We discuss some of the origins of what made Bitcoin popular and misunderstood, while re-tracing how it enabled blockchain technology to gain stronger visibility in the eyes of technologists. From here we discuss the fundamental advancements in computer science that enabled blockchain to succeed, and discuss its future in shaping the internet over the next 10 to 25 years. We also discuss other use cases blockchain is likely to expand into, and provide some initial forecasts
This week on Cyber Frontiers Christian and Jim discuss the computing industry without the bachelor’s degree (B.S.). We discuss the recently increasing trend of major tech companies doing away with degree requirements for top software engineering positions. We evaluate the pros and cons of university value propositions, co-ops/work studies, internships, and apprenticeships and discuss which jobs seem best tailored with-in the field for these backgrounds. As demand for these positions continues to grow, we also discuss the ways in which the job is evolving itself with the advancement of automation and cloud computing, which is letting developers at companies focus
This week Christian is joined by Jim to talk about killing off password security on web and communication platforms, a.k.a. the era of the hardware authenticator! We dive deep into the release of the Yubikey 5, FIDO 2, and Webauthn standards and how these platforms and standards will usher in the next phase of improved cybersecurity for enterprises as well as the average guy. We talk about some of the historical implications of protocols that haven’t evolved over the last thirty years, and what these technologies bring to the table to augment existing internet infrastructure. We also briefly veer into
This week on Cyber Frontiers Christian is joined by Jim to discuss common AI applications influencing everyday life. We take a look at the latest learning technology in discerning fake news, facial recognition at airports, and driverless cars in the Uber and Lyft fleets. We weigh in on what empirical methods are available for validating these use cases in AI, and the socioeconomic impacts that these technologies will create for the average guy in the next five to ten years. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future! Christian Johnson will
This week on Cyber Frontiers Christian and Jim get together to talk about the highlights from DEFCON 26. We dive deep into how voicemails and SMS-unlocks are being used to bypass two-factor authentication on common technology platforms — and how simple attack surfaces are exploited to turn the old tech of voicemails into eye-candy for attackers. We also review the hardware and application based mechanisms used to avoid some of these commonly exploited vectors. We also take some time to discuss potential “digital side doors” into banking data using common financial management applications and introduce the word of the day
This Week on Cyber Frontiers Christian and Jim jump back into the world of machine learning and AI — a comprehensive conversation started on show 045 for those who missed it. We jump back in time to 1950 with the introduction of the Turing Test and walk us through its evolutions into modern AI and machine learning. We also discuss some of the recent cyber buzz with Gmail privacy concerns and new security features coming to iOS 12. Oh, and, fortnite players get excited about llamas too. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the
This week on Cyber Frontiers Christian and Jim explore the commercialization of artificial intelligence and machine learning. We explain the overlapping use of terms that the buzzword industry has created and separate fact from fiction. As ML and AI continue to drive businesses and the next frontier of technological innovation, we explore how the buzzwords of the past five years (I’m looking at you big data and IoT) have paved the framework for the buzzwords of 2018 and beyond. We lay the framework for where the frontier is defined today so that we can dive deep in future episodes. Cyber
We’re back! This week on Cyber Frontiers Christian and Jim catch up on the avalanche of GDPR and separate fact from hype. We also take a dive into where we are with cryptocurrency security, weighing in on the recent Crypto Currency hack in South Korea and the overall maturity of the technology. We also relate the topics back to some of the big themes from RSA 2018 and provide a quick recap of the conference themes. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future! Christian Johnson will bring fresh and relevant topics
This week on Cyber Frontiers we jump into and update on the public disclosures of the meltdown and spectre vulnerabilities. We also chat about the latest hardware hacking efforts with ATMs and JackPotting as well as get Christian’s take on Crypto Currency and the coin market. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future! Christian Johnson will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at
This week on Cyber Frontiers we jump into full coverage of the 6-day old public disclosures of the meltdown and spectre vulnerabilities. With some issues mitigated, the news is a gravitational force that has dominated cybersecurity early into 2018 and could continue to engage industry for years to come. We discuss the short and long term security implications and performance debacles, and provide technical and non-technical explanations for the two classes of vulnerabilities disclosed. We review the mitigations users can start employing now, and discuss impacts for the average guy and the enterprise. Cyber Frontiers is all about Exploring Cyber
This week on Cyber Frontiers Jim and Christian discuss the upcoming predictions for where the cybersecurity and data science communities trend in 2018. What trends are new on the horizon, and which will only naturally accelerate trends already started? Will passwords finally bite the dust as MFA rules the day? Will AI march closer to the takeover of mankind? Will the repeal of net neutrality impact the way we consume the internet? We talk technology trends that impact security, data, and the technologies that intersect along the way as the new year is ushered in. Cyber Frontiers is all about
Christian is joined by Jim and special guest Kevin Schoonover to talk about mobile device security. Which predominant platforms are winning over consumer trust and adding value? What design and marketplace considerations should be factored in when buying a device that is reliable to use? What can the average guy do to better protect these increasingly valuable assets? We explore the evolution of cell phone security over the last generation of mobile device platforms, and dive into wearables and other devices that have empowered these sensor-filled devices to be far more palatable targets than desktops have ever been. From “built-in”
This week on Cyber Frontiers Christian and Jim recap some of the highlights from the DEFCON security conference. We discuss the overall statistics from this year’s conference, and call out a few defining characteristics for DEFCON’s 25th anniversary. We also discuss the legal drama surrounding Marcus Hutchins, aka MalwareTech, who has been lauded as the security researcher behind stopping the WannaCry ransomware while also facing federal charges for being the mastermind behind the Kronos malware. We also veer off into discussing making a legacy Macbook come into the modern world with a fresh Linux machine for casual use or as
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv Full show notes and video at http://theAverageGuy.tv/cf038 This week on Cyber Frontiers
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv Full show notes and video at http://theAverageGuy.tv/cf037 This week on Cyber Frontiers
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv Full show notes and video at http://theAverageGuy.tv/cf036 This week on Cyber Frontiers
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv Full show notes and video at http://theAverageGuy.tv/cf035 Introduction: Josiah Dykstra – Author
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv Full show notes and video at http://theAverageGuy.tv/cf034 This week on Cyber Frontiers
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv Full show notes and video at http://theAverageGuy.tv/cf033 This week on Cyber Frontiers
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv Full show notes and video at http://theAverageGuy.tv/cf032 This week on Cyber Frontiers
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv Full show notes and video at http://theAverageGuy.tv/cf031 This week on Cyber Frontiers
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv Full show notes and video at http://theAverageGuy.tv/cf030 IPV6 Adoption in 2016 http://arstechnica.com/business/2016/01/ipv6-celebrates-its-20th-birthday-by-reaching-10-percent-deployment/
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv or call in your questions or comments to be played on the
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1 Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv or call in your questions or comments to be played on the
Listen Mobile: This week on Cyber Frontiers Christian and Jim are joined by special guest Jeremy Krach to provide the 2016 cybersecurity forecast. We first wrap-up 2015 by discussing the latest hack challenges and cybersecurity breaches, and then dive into what tools, technologies, and challenges will shape the evolution of cybersecurity over the next year. We also look at how the cybersecurity threat space will change and whether or not corporations and individuals are prepared to combat it. It’s a holiday special you won’t want to miss! Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies
This week on Cyber Frontiers our discussions on hacks and leaks heats up as Christian, Ashton, and Jim weigh in on the Ashley Madison leak. We talk about the data from a high level, and some of the trend analysis that has already been done regarding the data leak. This leads us into a conversation about AI chatbots, and in this case, female bots programmed to lure men to the Ashley Madison website. We speculate a bit on how the leak was conducted, leading us to a mildly (un)related conversation about DDoS attacks and why they are still an issue.
This week on Cyber Frontiers Christian is joined by Ashton and Jim to cover a variety of hot topics on the cyber frontier. Ashton first gives us a deep dive into his technique for visualizing various computer binaries and code using his own Binary Art creation. We quickly bridge the gap to how it relates to reverse engineering, and specifically discuss where reverse engineering is highly applicable in many of today’s security issues. Christian then takes a deep dive into the Jeep and Chrysler car hacks, discussing not only the challenges in security engineering of these devices – but what
This week on Cyber Frontiers Jim and Christian take some time to discuss what has quickly become a favorite past time – data breaches! With the LastPass breach and OPM breach both making waves in the news (one more so than the other) – we took the time to analyze the impact of these two breaches and how they are inherently different. We analyzed the social impact for the average guy, and discussed some of the pitfalls that continue to plague the data breach incidents we keep seeing in the media. We provide the analysis and stay pretty high-level with
This week on Cyber Frontiers Kevin joins us to bring to a close a fantastic three part series on how cutting edge technologies are being received and adopted in the enterprise. In this segment, we take a look at how current cloud computing solutions are powering the enterprise. We evaluate different solutions, what communities are currently driving the market, and the roadblocks associated with implementing certain architectures. We also tie in key conversations from the previous two episodes to see how other technologies like SDN are playing a major role in re-designing the cloud and the data centers they operate
This week on Cyber Frontiers Kevin Schoonover joins us again to cover part two of our series investigating how up and coming technologies are being incorporated into enterprise IT environments. In particular, we look at where we’ve been with data infrastructure in the last five years, and what the future holds in store. With discussions around the rapidly changing infrastructure and hardware design for data analytics, as well as the security and reliability of information that has become an increasingly valuable commodity, we quickly pick up where we left off in episode 20 for a jam packed hour of insight
This week on Cyber Frontiers the usual crew is joined by Kevin Schoonover, Director of Engineering at Arrow ECS, to discuss how new technologies are (or aren’t) making their way into the enterprise IT spotlight. We talk about differences in relational vs. object oriented data stores, implementations of software-defined-networking, and what driving factors (cost, ease of use, adaptability) are pushing certain technologies to the forefront. We also look at what job roles will become more important as these technologies become mainstream. The talk encompasses the ‘challenges of a real IT department’ – and provides an interesting context to how the
This week on Cyber Frontiers, Christian is joined by Ashton, Jim, and special guest Jeremy Krach live from the floor of Bitcamp – one of the largest hackathons on college campuses in the USA. Albeit technical difficulties, we get behind the scenes access to Bitcamp and covered the opening of the event. If you’ve never been to a Hackathon before or want to know why they are relevant to solving today’s computing challenges – this is a great show to cover what getting your hack on is all about. Cyber Frontiers is all about Exploring Cyber security, Big Data, and
This week on cyber frontiers Jim Collison comes to D.C. to join Christian and Ashton for a cyber roundtable conversation. We chat with students in the ACES cybersecurity program at the University of Maryland to gain their perspective on the state of the industry, educating students in the field, and potential future career paths for college students engaged in cybersecurity. With seven of us charging away at the conversation, we cover a variety of different topics with multiple viewpoints for the listener to digest. From recapping the biggest breaches of 2014 to discussing what it means to be a students
This week on Cyber Frontiers Christian, Ashton, and Jim catch up with Dr. Jim Purtilo (guest from Episode 3) to discuss historical and trending topics in cyber legislation, as well as many of the central issues surrounding cyber education in industry and academia. We explore some of the driving factors behind changes in mentality on where cyber legislation should be developed (and/or curtailed) – and where the disconnects are in understanding the current state of affairs in cyber legislation, education, and privacy matters that impact the average guy Cyber Frontiers is all about Exploring Cyber security, Big Data, and the
This week Ashton and Christian kick off the new year by discussing plans to launch the first major cybersecurity research project on the development sandbox: mapping the internet with traceroute, distributed Nmap, and Hadoop. We discuss strategies and design challenges that will be present early on in development and potential solutions that may be employed. Furthermore, we tie back the project to the latest developments in the North Korea cyber fiasco with Sony Corporation. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the