Welcome to the New Cyber Frontier, Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics. Hear about developments which impact and affect both the local Colorado efforts and the entire virtual world. You don’t have to be a comput…
Welcome back to this exciting episode of New Cyber Frontier! In this episode, we join our founders for the special treat of a live presentation on how BlockFrame containerizes cybersecurity. This new concept is lined up to revolutionize digital security and privacy by giving every individual a level playing field with the big players. It's simplistic, it's uniform and it's the next thing. With a goal of enabling individual rights, and empowering ethical behavior in a digital world, BlockFrame, is taking the industry by storm. Dr. Gorog explains, "We turn Cybersecurity from what is usually a large-scale operation that only big companies have the ability to afford, to something that a single user can containerize like the individualized coffee pod from Keurig that Revolutionized the coffee industry. It's simple and provides the individualized experience that everyone wants." Look for big things from BlockFrame Inc.
Welcome back to New Cyber Frontier! In this episode, our hosts—Dr. Shawn P. Murray, Tim Montgomery, and Dr. Gorog—tackle pivotal topics shaping our world today: political transitions, evolving social media policies, and the ongoing impact of artificial intelligence (AI). Political Transition: Cybersecurity Takes Center Stage With Donald J. Trump returning to office, significant policy changes are already underway. Over twenty executive orders were signed on Inauguration Day, with many directly impacting cybersecurity. As digital platforms increasingly support political campaigns, public services, and elections, the importance of securing these systems has never been greater. Federal investments in cybersecurity infrastructure are ramping up to address growing threats and to ensure the integrity of critical systems. Social Media and Regulatory Shifts: The TikTok Debate In early 2025, TikTok faced a brief ban in the United States, only to see it repealed following significant adjustments to address data privacy and security concerns, particularly surrounding its Chinese ownership. TikTok's transparency initiatives, including U.S.-based data storage and compliance with stricter regulations, have alleviated some concerns. However, discussions around further legislative actions remain active, leaving the future of the platform uncertain. The Rise of AI: Opportunities and Risks Artificial intelligence continues to redefine industries, but it comes with its challenges. Tools like deepfakes are raising serious concerns about identity theft, privacy violations, and their potential use in cyberattacks. While AI drives innovation and creates new opportunities, there is a valid concern about job displacement in certain sectors. Striking the right balance between harnessing AI's benefits and mitigating its risks will be critical as this technology evolves. These are complex and dynamic issues, and the conversation is just beginning. Tune in to hear our experts discuss these developments in depth. How are you preparing for these changes, and what challenges or opportunities do you see on the horizon? #CyberSecurity #AI #Innovation #SocialMedia #Leadership #CriticalInfrastructure #Podcast Visit our sponsors: BlockFrame Inc.
Peer-to-Peer Insight on Smart Grids, Cybersecurity, and Smart City Innovations In the latest episode of New Cyber Frontier, Dr. Shawn Murray sits down with Engr. David Scott, PE, for an engaging and insightful conversation between two industry experts. With decades of combined experience, they explore the evolving intersection of cybersecurity, engineering, and smart technologies. Key Highlights from the Episode: A Meeting of Minds: Dr. Murray and Engr. Scott discuss their shared passion for solving complex problems in critical infrastructure. Together, they analyze the evolution of smart grids, operational technology (OT), and the rising need for robust cybersecurity across energy, transportation, and smart cities. Smart City Innovations: From intelligent lighting systems to urban automation, the discussion highlights the challenges and opportunities in creating safer, more sustainable cities. Engr. Scott shares his firsthand experience leading projects that integrate automation, sustainability, and security into urban environments. Cybersecurity and Risk Mitigation: Dr. Murray and Engr. Scott delve into the increasing cybersecurity risks to critical infrastructure. From international threats to supply chain vulnerabilities, they emphasize the need for innovation, monitoring, and resilience in engineering and cybersecurity practices. Entrepreneurship Meets Engineering: Engr. Scott, founder of Trick Out My Crib, shares how he combines engineering expertise with entrepreneurship to help homeowners reimagine their spaces through automation and sustainability, while also addressing modern challenges like housing costs and energy efficiency. Looking Ahead: The two peers reflect on how the industry must adapt to emerging threats and technological advancements, with a shared optimism about the growing awareness and investment in cybersecurity and smart systems. This episode showcases a rich exchange of ideas and expertise between two seasoned professionals who are shaping the future of cybersecurity and engineering. Tune in now to hear this peer-to-peer discussion! What resonates most with you about the convergence of engineering and cybersecurity? Join the conversation! #CyberSecurity #Engineering #SmartCities #Automation #Innovation #CriticalInfrastructure #Entrepreneurship #Podcast
Welcome Back to New Cyber Frontier! In this episode, our hosts, Dr. Shawn P. Murray and Dr. Christopher Gorog, are face-to-face after a long time to discuss the critical role of the Information Systems Security Association (ISSA). ISSA is a professional non-profit organization dedicated to advancing the field of cybersecurity. It offers education, networking opportunities, and resources to professionals in the information security industry. Dr. Murray, a seasoned leader and former Chief Operations Officer at ISSA, shares his insights into the organization's evolution and its impact on cybersecurity over the years. What sets ISSA apart from other organizations is its Special Interest Groups (SIGs), which provide deep dives into specific topics within the broad spectrum of security. These SIGs empower members to address niche challenges and stay ahead in the ever-changing cybersecurity landscape. This episode also features Max Gorog, a software developer at Blockframe. With over five years of experience at the company, Max is deeply committed to creating a safer and more secure digital world, reflecting Blockframe's mission of innovation in cybersecurity. Thank you for tuning in! We wish you a secure and successful New Year. Stay connected for more insights and advancements in the cybersecurity field. Visit our sponsors: BlockFrame Inc.
Welcome back, everybody, to this groundbreaking episode of New Cyber Frontier! Today we have our two hosts Shawn Murray and Dr. Gorog finally together after quite some time. This is Mr. Murray's 20th year in business at Murray Security bringing to you new and exciting projects that he has in store. Both hosts will be informing you on the status and future of the new AI era. Artificial intelligence has been around for about forty years, but it has drastically improved over the years. Mr, Murray states, “Generative AI in specific, has an algorithm in the software that has the ability to evolve, adapt, and fact-check the credibility of information. This is great, but, the human factor and guidance is a key in making sure the AI is right when it is completely wrong.” Sometimes AI will get into this cycle and try to prove itself right when it is wrong, it is important to check the truthfulness because if it inputs data into itself and outputs it as true, it can be extremely dangerous. Artificial intelligence is in the process of solving and speeding up a lot of problems and is useful, but it is the responsibility of humans in which direction it is headed for the future. Participate and engage with us today, at New Cyber Frontier! Visit our sponsors: BlockFrame Inc.
Welcome back, everybody, to New Cyber Frontier! Today we are going over Dr. Gorog's trip he went on, to share the IEEE Digital Privacy initiative all over the world. In late June, he made multiple stops in Canada, Singapore, Milan Italy, Vienna Austria, Hungary Budapest, and Bristol England. During his trip, he spoke at different events and conferences including: (I.T.S) Intelligent Transportation Systems, Securing Privacy, and a Privacy-enhancing conference. Digital Transformation has been on the horizon for quite some time now, and we are digging deeper into how the world is shifting more towards Digital and virtual instead of Physical. For a new Generation, this can impact the workforce, it can assemble or destroy a good amount of certain jobs that we have today. This also raises the question, if everything is digital, how much of your private data is owned by you? Maintaining control and security over your data in a digital world is an essential part of our future. Tune in today to see how Digital Transformation will impact your future! Visit our sponsors: BlockFrame Inc.
Welcome back, everybody, to New Cyber Frontier! Today we have hosts Tim Montgomery and Dr. Gorog discussing the current status and future of Artificial intelligence. A.I has been the buzzword everybody has been talking about for the last couple of years, we have seen the evolution and direction it is headed. The important thing is how we apply AI. AI can be a handy instrument for good, however, it can be extremely harmful if misused. A. I will use data from across the internet from multiple sources even if it is true or false. Dr. Gorog talks about a study that students conducted with AI, in this study the students put false information on blog posts and asked about this information to AI. AI actually found the blog posts/websites, and referenced this information as true information to consumers. It is crucial we can distinctly tell when AI is true or false. Our current decisions about the development and use of AI will have a significant impact on its future. Visit our sponsors: BlockFrame Inc.
Welcome back to New Cyber Frontier! Today we speak with guest Dejan Milojicic, Hewlett Packard Enterprises Senior Scientist and Chair of IEEE Future Directions Industry Advisory Board. IEEE has recently announced the release of an epic work effort spanning several years, supported by experts from many industries and backgrounds. The resultant IEEE Megatrends Report will more than likely be one of the most referenced and reliable technology future-looking publications available in the world. In this episode, we provide an overview of what this report means to the markets and how it compares to other industry futures reports from corporate sources such as Gartner and Forrester. Since the IEEE is an individual membership-funded organization focused on the betterment of humanity, we see a much broader resource in its reports vs. others which may have a bias to support trendier conclusions. It is a great full-spectrum resource that includes many insights that explain why some of the most upcoming technologies may be found in areas most financial industry reports have undervalued. This resource has identified three Megatrends that underlie most of the direction of technology development and show how they are anticipated to yield substantial impacts worldwide. Hear the discussion on how the megatrends were determined and how they are impacting us ethically, economically, socially, or ecologically. The three major Megatrends each correlate to one another and anyone looking at future needs will want to ensure they are aligned at the intersection of the major sociological trends that they represent. In today's show, Dr. Milojicic only scratches the surface of the three megatrends: Artificial General Intelligence, Sustainability, and Digital transformation, but there is so much information in the report that you will want to download it to absorb it for yourself. Tune in to today's podcast to see how Megatrends change the world! Visit our sponsors: BlockFrame Inc.
Hello, everybody! Welcome back to New Cyber Frontier! Our guest today is Dan Mapes Founder and President of VERSES AI founder and director of the Spatial Web Foundation best-selling author Spacial Web. Mr. Mapes is all about the future, and his vision is to reinvent the internet. The growth of artificial intelligence (AI) has been rapid and transformative across various topics including; Healthcare, Job automation, Data Privacy, and Retail. AI systems often process large amounts of personal data, raising concerns about how this data is collected, stored, and used. Ensuring compliance with privacy laws and regulations, like GDPR, is essential. Security must be the main priority and core of all these advancing technologies. In the Spacial Web Mr. Mapes talks about building a soverin identity and data lineage in the 3D space which is necessary to make a safer digital era. Take notice of how our world is technologically advancing today. Visit our sponsors: BlockFrame Inc.
Hello, everybody! Welcome back to New Cyber Frontier! Today we have our guest Dominic Paulo on the show for the second time. We have asked Mr. Paulo to lend his voice as an engaged but cautious technologist, and to discuss some trends that he sees with blockchain technologies. Mr. Paulo has taken some time to reflect on experienced positions from those in the cyber industry, and to give his opinions on where he believes the future is heading for blockchain, data mining, and cyber security. In this episode, we also discuss data lineage, that is the input and output of data, where data are originally coming from, and the overall timeline of each piece of data. One of the reasons blockchain is so popular is that it clearly shows the data lineage of financial transactions with full transparency, without third parties like banks passing it through hidden black boxes. Many consumers do not realize this is a benefit they can get from data lineage. When artificial intelligence is included in a system, it might also be essential to distinguish the differences between human decisions and non-human A.I. decisions, so we can know the true authors or decision makers, and whether they can be trusted and accountable. This could be particularly critical for the integrity of government or corporate decision documents. Tune in to this episode so you can be better participant of this cyber world today! Visit our sponsors: BlockFrame Inc.
Welcome back to New Cyber Frontier! On this episode, we have a former guest, Dr. Subhash Paluru, the Chief Executive Officer of Freedom Motors, Inc., and a former senior executive at the U.S. Department of Energy. Freedom Motors has been in business for twenty-two years, and Dr Paluru has drastically improved mass-manufacturing. We are also excited that Dr. Paluru is now on the Board of Directors of BlockFrame, Inc., and adds his extensive knowledge of cyber security. In all new companies, branding is essential to encourage investments into the company and its products. Dr. Paluru says, “The inventor will always believe the product is going to change the world. That is excellent motivation, but there also has to be awareness and research behind it.” Turning an idea into a company brand takes extremely hard work and dedication, but it also needs flexibility and creativity to increase the marketing and longevity of the company. Learn how you can attract customers and investors to your brand in today's episode! Visit our sponsors: BlockFrame Inc.
In this episode, we speak with guest Peter Daneyko Co-Founder of KoreChain, about raising capital for startups. This topic is challenging for cybersecurity companies often due to the technical nature and difficulty in relaying the value of new technology. The investment community has very established lingo, norms, and expectations, which are often foreign to newcomers. Great ideas for technology may not correlate directly to the patterns anticipated by the finance industry, so we take some time today to provide cybersecurity practitioners with some invaluable financial incite. Guest Mr. Daneyko has supported over 200 companies raise money to support growth. Daneyko expresses that the way to transition from an early startup to a scalable company is to educate early to understand what to expect when reaching a growth stage. We talk about some questions such as “How to determine the amount of money you want to raise? What are the different options for debt or equity? What are the differences between Reg-CF, Reg-A, B & C? What regulations apply to my company?. How do I get noticed or reach the investment community?”. This is a great conversation for a startup company that does not have that much exposure but has great technology. This show is a good starting point for "Capital Raise 101" or just to understand some of the finance industry lingo. Thanks to Mr. Daneyko for this invaluable incite and you will not want to miss this episode of New Cyber Frontier. Visit our sponsors: BlockFrame Inc.
For our show today we are joined by Slade Griffin President at Contextual Security Solutions and a lifelong veteran of the Energy Cybersecurity industry. Our guest brought up the topic "How effective is our renewable energy infrastructure". After over a decade of renewable energy buildout in the United States, we can see solar panels on countless residences, we see miles of shiny panels as we travel down our super highways, and hundreds of miles of windmills across the US central and western states. With all of this new infrastructure, how are we doing in comparison to our power availability and energy supply now vs before. Many of us can make that assessment for ourselves and the answer would probably be the same as our guest. He says there are more shortages and rolling blackouts now than before. Is this a factor or cybersecurity, or some other forces? Listen to Mr. Griffin and Dr. Gorog debate some points where things may be difficult and some also that may be improved. Thanks for joining on this look into the security and growth factors related shift of our critical infrastructure toward renewable energy. Visit our sponsors: BlockFrame Inc.
In this episode of the New Cyber Frontier Podcast, we have Guest Dominic Paulo, who represents those who are not well versed in cyber security, but may be considered educated consumers of technology. We have asked Mr. Paulo to join to lend a voice of an engaged but cautious technologist and discuss some trends he sees with Blockchain Technology. Mr. Paulo has taken some time to explore what may be a normal place for those in the cyber industry, and give his opinion on where he believes the future is heading for blockchain and data mining. He, like many, questions the current trend of processing large volumes of data and its requirement for significant computational power and energy. As many consumers are conscious of the environment. they can see the trends of increasing infrastructure supporting data mining operations use of fossil fuels most certainly will lead to a less than positive outcome for everyone, Mr. Paulo comments on his evaluation of what he has seen in our hosts Dr. Gorog's latest work, He asks some difficult questions, but then resolves to say he wants to see the ideals behind this work be successful. To implement blockchain without flaws of scalability, that does not destroy the environment and fulfills the needs of transactions like medical records and other data would be absolutely groundbreaking. The thought that users could have control over your digital privacy is also one of the most important things the average person desires.” Tune in to see how this average digital citizen views his security needs. Visit our sponsors: BlockFrame Inc.
Welcome back, everybody, to New Cyber Frontier. In today's Episode we have guest Eslam Tawfik Ph.D. .Dr Tawfik. studied advanced technology in Egypt. Cybersecurity is frequently used to describe the defense of digital networks, systems, and data against harm, unwanted access, and attacks. On the other hand, protecting the hardware and infrastructure that underpin digital systems is referred to as the physical part of cybersecurity. Securing the Root of Trust is a term you will hear throughout the talk, this is what Dr. Tawfik, explains as the set of underlying credentials that the security in each device depends upon. Cyber Physical security as you will hear also includes defending against different attacks to hardware devices, server rooms, data centers, and network connections, among other physical assets. Organizations can establish a more comprehensive security posture to safeguard their digital assets and infrastructure from various threats by incorporating physical security considerations with traditional cybersecurity procedures. Listen to this fascinating episode where our guest provides some insight that will resonate with many of you interested in the security of IoT and Critical Infrastructure systems. Visit our sponsors: BlockFrame Inc.
In the upcoming episode of the New Cyber Frontier Podcast, hosted by Mr. Timothy Montgomery, we delve into the critical and complex world of legacy system modernization with our esteemed guest, Mike Bowers, Chief Architect with extensive experience in software development and architecture. This discussion promises to bridge the gap between technologists and executives, offering valuable insights into the adoption of high-performance NoSQL/SQL databases, IIoT platforms, and strategic approaches for legacy system modernization. Mike will guide CEOs, IT Managers, software architects/engineers, and control engineers through the intricacies of reducing manufacturing costs, delivering agility by embracing Industry 4.0, and choosing the right technologies for modernizing legacy applications. From defining legacy systems and tackling common challenges to best practices and avoiding pitfalls during the modernization process, this episode is a treasure trove of knowledge for those looking to navigate the complexities of updating their technological infrastructure. Join us to explore how to effectively communicate the benefits of modernization to non-technical executives, measure the ROI of modernization efforts, and prepare for future technological advancements. Mike's advice and insights are geared towards helping businesses make cost-effective, value-driven decisions in their modernization journey. Tune in to today's episode of New Cyber Frontier. Visit our sponsors: BlockFrame Inc.
Today's guest Andy Merritt is the Managing Director and Chief Strategy Officer at One Funds, a Colorado-based startup supporting organization. Mr. Merritt provides our listeners with some exciting news about several alignments in the local community which are the realization of numerous years of planning. New technology support for government-aligned industries has been the focus of the Catalyst Campus and One Funds. The synergies of start-up support from Federal, State, and local investors to provide not only funding for growth but also business resources, alignment with potential government customers, and know-how for achieving government funding grants. It is exciting to see some of the components we explored in very early episodes of New Cyber Frontier mature into what is available today. Tune in to see how you can get involved. Check out our website! New Cyber Frontier Podcast (logiccentralonline.com) Visit our sponsors: BlockFrame Inc.
Welcome back, everybody, to New Cyber Frontier. In today's world-changing episode, we have Guest Sagi Brody who is Chief Technology of Opti9 and Technical Advisor of Cyviation along with our host Dr Gorog. Mr. Brody has been in the digital infrastructure for about twenty-five years where he became Co-founder and Chief Technology & Product Officer at Webair. With cybersecurity growing vastly, the question has to be asked how does this affect aviation? When traveling via aircraft, captains request to turn off cellular devices or put them in airplane mode, This is due to the vulnerability that radio waves have on airplanes. You do not want to miss this episode of New Cyber Frontier where we Protect wings in the sky with cybersecurity.
Welcome back, everybody, to New Cyber Frontier. In today's Episode we have guest Eslam Tawfik Ph.D. .Dr Tawfik. studied advanced technology in Egypt. Cybersecurity is frequently used to describe the defense of digital networks, systems, and data against harm, unwanted access, and attacks. On the other hand, protecting the hardware and infrastructure that underpin digital systems is referred to as the physical part of cybersecurity. Securing the Root of Trust is a term you will hear throughout the talk, this is what Dr. Tawfik, explains as the set of underlying credentials that the security in each device depends upon. Cyber Physical security as you will hear also includes defending against different attacks to hardware devices, server rooms, data centers, and network connections, among other physical assets. Organizations can establish a more comprehensive security posture to safeguard their digital assets and infrastructure from various threats by incorporating physical security considerations with traditional cybersecurity procedures. Listen to this fascinating episode where our guest provides some insight that will resonate with many of you interested in the security of IoT and Critical Infrastructure systems.
Welcome back, everybody, to New Cyber Frontier. In today's episode, we have guest Cory O Daniel, C.E.O. and co-founder at MassDriver, who works in DevOps. Mr. Daniel has a background in physics and architecture but switched his career path and started to focus on healthcare information systems and computer science. Mr. Daniel is a self-proclaimed serial entrepreneur and has been in seven startup companies, three of which he co-founded. Cory says "Starting a company and becoming the founder takes hard work, energy, and effort. You must be somebody who can digest information, learn, and be fine when wrong." (Cory O Daniel.) Mr. Daniel explains his path to DevOps and how software has significantly changed he started in 2008, back then unlike today no structured APIs were common. Today we write less coding and sometimes even just dictate to AI, and software development is even automated entirely in some cases. "More of our software is becoming APIs in the cloud services." Software systems are evolving as cloud services become more relevant as technology progresses; this affects Jobs, the economy, and, most importantly, security. Join today a great update on the current state of DevOps ... Only on New Cyber Frontier
Welcome back, to the New Cyber Frontier Podcast with our hosts Tim Montgomery and Dr. Gorog. In the final episode of the eight-part series, Tim provides a direct inquisitive dialog with Dr. Gorog regarding his dissertation work in distributed trust. What distribution of trust means to the average person is a bit Shakey as the coining of Zero-trust has made the topic somewhat of a fuzzy concept. "Trust and zero-trust are one of the hot catch phrases, now everyone claims alignment to the Zero-trust pillars" but what does that mean? Listen to the discussion on the distribution of trust as our hosts break down the major problem with trust which is how to scale to everyone in the digital age. Gorog says… "for the first-time scalable frameworks for trust are possible. Solving for sustainability, has been key, now the future may drastically change when digital content and sources of data can be trusted. Sustainability means providing some order in the digital free-for-all environment with governance. What the future has in store, is measuring the quality of data, based on its origin and handling. Data quality is key as we move to rapid volume creation of data from AI. Ethical practices and quality data lineage are the new differentiators. He says "The required AI companion will undoubtedly be trusted data lineage solutions" Dr. Gorog explains that we need to paint a new picture of the future of the digital age with more ethical viewpoints. Thank you for tuning into the special series of New Cyber Frontier, be ready for new episodes coming your way!
Welcome back everybody to the New Cyber Frontier Podcast with our hosts Tim Montgomery and Dr. Gorog. In this seventh episode, we will continue on the next-generation post digital transformation philosophy looking at the lifecycle of our data. The discussion centers on the use of data and its importance to you as the owner/creator vs what your data means to others, and why we should all be aware of this when evaluating how applications we choose use our data. Dr. Gorog discusses some examples in Healthcare "How many times does your Fitbit send information to get collected by a web engine that has recorded your heart rate or blood pressure and location. What picture does that provide about your personal activities". Ensuring our data is used in a way that is best for us is something that we will all become competent at when we start to realize that they only thing we have to show for our virtual lives is the data it produces. Having accountability towards your data's use is power it is our currency of the future. The accumulation of our life's efforts and the future of data management could provide you not only ability to protect it but also earn your right to a small compensation instead of giving it away. Tune in to today's important episode of New Cyber Frontier.
Hello Everybody, welcome back to New Cyber Frontier. We will continue to the sixth episode of this series with Tim Montgomery and Dr. Gorog covering how the world transforms digitally. " In the digital world, we are getting to the point where Eighty Percent of peoples' entire lives work effort is virtual, and this is just going to grow." Dr. Gorog explains how this digital era will continue to grow even further down the road and as this continues, so does the need for individual control of the content that people create. The structure for the post-digital transformation era is created by cybersecurity and the application of privacy-preserving technologies. Tune in today to see the first glimpse of what a Philosophy of the new post-digital transformation era looks like, and explore possibilities of accumulating generational wealth of digital content.
Welcome back everybody to New Cyber Frontier. In this episode, we have our three hosts Shawn Murray, Tim Montgomery, and Dr. Gorog recapping this last year and discussing the plans for 2024. Dr. Murray covers what he sees as the key events in 2023 with significant legislation for privacy in a variety of states and more definement around responses to and requirements around breaches. Examples are state legislation taking the initiative in Illinois to protect the privacy of biometric data. Many other states are slowly passing laws to protect digital footprint and data. In 2024 some people are asking, instead of just protecting my data, can I switch to the offensive against some of these cyber attacks? This has a multitude of problems and Dr. Gorog explains it perfectly. "The solution is not to make the victim become the attacker because of preemptive striking and the confusion about which one is the attacker and who is the actual victim." If you do not want to miss the future of Cybersecurity, tune in to this episode of New Cyber Frontier.
Hello Everybody, welcome back to the New Cyber Frontier podcast. We continue with the series' fifth episode with Tim Montgomery and Dr. Gorog, Looking over these past years of work in distributed trust. The normalization of today's society is that we trust these large-scale businesses with our data and goods because they are the only safe options we have in most cases. The alternative to reliance on large organizations in the digital world leaves us potentially working with a myriad of unknown, untested, unverifiable connections on the other side of the world. The safer bet is to go to the megasite provider that we know will at least be in business to resolve issues if they occur. Changing this game requires the tools for distributing trust, which may give us a granular ability to trust small providers or individuals. Dr. Gorog explains the work in distributed ledger as a tool for distributed trust and its use in the connection of different elements of Cybersecurity. Take advantage of this impactful episode, which contains some of the best explanations of zero-trust and Cybersecurity by Design.
We continue the Fourth in the Eight-episode series with Tim Montgomery and Dr. Gorog. In this episode, we look at some driving forces for the next-generation research into distributed trust. Around 2016, Dr. Gorog, working with the State of Colorado, started the first work into trust for digital records for citizens' data held by the state. At the time technology for distributed ledgers was thought promising but was not economical. Prototypes for state programs found that one year's cloud storage data costs ten times more than the state budgeted. So many people have envisioned blockchain and distributed ledger to solve societal problems, but the truth is that they did not work because they were cost-inhibiting. Large-scale adoption of businesses has found similar technology limitations. Join today to hear more about how the state of Colorado sponsorship has supported and funded exciting work using many Cybersecurity institutions and Universities in Colorado as a test bed. Teams of students, companies, international organizations, and industry professionals worked together to solve some of these challenging problems. Dr. Gorog discusses some of these campaigns, such as Privacy for the People and IEEE Digital Privacy Initiative. Tune into this episode of New Cyber Frontier.
Welcome back, everybody, to the New Cyber Frontier Podcast. We continue the Third in the Eight-episode series with Tim Montgomery and Dr. Gorog. In this episode, we discuss the nature of newly evolving open markets in comparison to human historical examples of frontiers. The digital and virtual frontier has infinite possibilities that we barely have scratched the surface of, raising the question, How far can we go? In this digital realm, numerous companies have grown over the years to become the largest entities in the world with an entire virtual presence. Over the next few years, many more are anticipated to make a digital transformation. Participation in the post-digital transformation era has been mostly restricted to large entities; these large companies are difficult to compete with if you are new or entering markets because small businesses and individuals are unknown and untrusted. The individual is relatively uninvolved in this digital transformation; their efforts and digital works are the currency of large entrenched companies. The individual is unprotected. Dr. Gorog explains, "Should the right tools to protect the individual exist, the value of the individual to enter is high, the cost is low, and the entry is instant." The potential is high if the tools existed to do it." Heading in a direction where the individual protects their data, not the company, is a new frontier today. We are looking towards empowering individuals in this technical and virtual era. Tune in to today's episode of New Cyber Frontier.
Welcome back, everybody, to New Cyber Frontier. We continue the Second in the Eight-episode series with Tim Montgomery and Dr. Gorog. Our discussion focuses on the nature of disruption in any market, identifying the critical result of disruption is a change of philosophy. When an entire old way of doing something goes away based on technology, not only business changes, but society changes. If we go back to early 2000, there's a shift in the market, which is overseas manufacturing. Companies would allow their product to be made overseas, making it a quarter of the price; if you couldn't outsource fast enough, you could not keep up. When products are sent to be manufactured overseas, there is no control over that intellectual property. "A company found out that they would compete with their own products in the marketplace, and now we see that the risk surface for cyber-attacks is uncontrollable because it is not in our jurisdiction to enforce. The disruption of that era caused many of the problems we are facing with supply injection attacks today. (Gorog) Dr. Gorog explains further where things are heading now and how disruption again is surfacing but to regain control. Cybersecurity is the control structure in this new era with positive methods to Identify virtual assets, enforce software and data usage, and individualize every device made. Cybersecurity is the structure we stand on for the post-digital transformation economics, let's look at the future. Join us today and get involved at Logic Central Online – Where Logic meets Life
Happy New Year, everybody, and welcome back to New Cyber Frontier! To start 2024, we have an eight-episode series with Tim Montgomery and Dr. Gorog, Ph.D. CISSP is unveiling a new philosophy for Cybersecurity. Dr. Gorog elaborates with our host how working on the recently released work for the last seven years has progressed to a potential game changer. This first episode provides a kick-off point where the conversation focuses on the current state of the cybersecurity industry as we enter this new year. Dr. Gorog says we are still primarily working toward satisfying compliance, with most new approaches focused on data analysis and AI. (Gorog.) Billions of dollars have been spent on compliance and keeping up with the minimum standards to protect the massive data pool. In the last couple of years, digital transformations have been accelerating. Organizations and employees are spending less of their overall effort working toward physical world objects. In fact, many of us have not done anything that has resulted in physical products or outputs for many years. The conversations prelude to what later episodes will cover. Can we transfer everything to digital? Then, what does the world look like in the post-digital transformation? Bringing the philosophical dilemma of "When everything becomes chunks of data, our wealth becomes data." How Does AI affect your data? AI is expanding operations, taking GB's worth of information from your email and devices—this information AI steals is thrown back into the data pool. In the future, how will we be able to tell what disinformation AI is starting to produce? Tune in to this episode of New Cyber Frontier. Join us to listen; you will not want to miss this series opener.
Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.
Welcome back, everybody, to New Cyber Frontier. Our host, Chris Gorog, partnered with the Smalls Podcast on this episode with Dennis Kater and Nate Moser! The Smalls Podcast started in 2017 and deals with The Government Contractor Ecosystem, which aims towards Manufacturers, Service Providers, and Small Government Contractors. The primary audience for The Smalls is business development companies, Owners, and those who want to do business with the Government or Department of Defense. Companies are cautiously getting involved with cybersecurity mainly to implement the measures their contracts require, but not much more. How to identify the best balance for their minimal budgets vs the value they receive is the continued challenge they all experience. Nate and Dennis bring to light some progress in the industry compared with a few years back. Hear the latest from the small business community on cybersecurity; tune in to this week of New Cyber Frontier. Check out The Smalls Podcast here: Podcast – The Smalls
Welcome back, everybody, to NewCyberFrontier. In today's episode, guest Andrew Ginter, Vice President of Industrial Security and Waterfall Security. Mr Ginter is also the author of a book titled, "Engineering Grade OT Security: A Managers Guide." He defines his book as sitting at the intersection of industrial systems and Engineering. These systems could range from inputs and outputs from computer systems such as power plants, Shoe factories, and high-speed passenger train rails. Mr. Ginter explains his book further by saying, "Small Shoe factories and High-speed train rail switches are very different on the Industrial system spectrum. What determines the difference is worst case consequences of compromise." What would be the worst outcome to a Shoe factory versus Passenger Train Rail switches if all commands to computer systems fail? Shoe factories might have to replace all the equipment and a couple million dollars worth of expenses that insurance could cover, but for the switches on a train, if all computer commands fail, this could result in massive casualties and two trains colliding, which insurance can not cover. These are two diverse examples of industrial systems that need to face different approaches to computer systems. Mr Ginter also explains in his book that Engineering Security is a public safety issue with no room for errors. "In recent years, we have been automating everything, which is not always the best option; we must have fail-safes in place with security and protection." We face many problems and cyber attacks in the engineering world that must be considered today. Thank you for watching NewCyberFrontier.
On today's episode of New Cyber Frontier, our host, Christopher Gorog, gives a special presentation on Blockframe at the Edge Symposium in Niskayuna, New York. Edge St, Bronx, NY 10465, " Amplifying profitable value from deployed IoT products," we learn to use Cybersecurity as a catalyst for profit. Gorog explains using a distributed trust to bring social and economic value to Blockframe customers, living up to the mission: "to enable customers to create resilient precision ecosystems for sustainable uniform consumption and production." Mr. Gorog describes this address as the day view of the last six years of his Ph.D. work, and we hope you enjoy it also. The talk explains how, in the chaotic industry that is Cybersecurity, businesses are in desperate need of holistic, modular, top-down security that spans across their entire ecosystem. The Blockframe approach implements simplicity. "We solve four significant issues: security for all segments of the Supply Chain, management of deployed devices and their safety, the integration of physical and digital Supply Chain, and lastly, the ability to scale." (Gorog). Blockframe has pioneered a way not to use mining, solving some of the major issues with blockchain and maintaining Carbon neutrality. Thank you for tuning in to this episode! If you have any questions or want to learn more about Blockframe, be sure to contact us on our website, newcyberfrontier.com
Hello Everybody, and welcome back to NewCyberFrontier. On today's episode, we have guest Aviv Grafi, who is the CTO and founder of Votiro. Mr. Grafi talks about Weaponizing Documents and how they are getting more common and more dangerous, popping up in PDF files and Zip files. The best way to try to understand these attacks is to think like a hacker would think and try to protect yourself from future attacks by being vigilant of what you open. Learn more today on how you can protect yourself by tuning in to today's episode. Check our website NewCyberFrontier Check out Votiro's website Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
Hello everybody, welcome back to NewCyberFrontier. On today's episode, we have guest James Fair and host Tim Montgomery. James Fair has worked in the I.T Industry for over thirty-five years, achieving SVP (Senior Vice President.) James Fair's business focuses on providing Cybersecurity for smaller companies at risk. Very thorough with the roadmap layout, they meet compliances, the budget, and Policies. "We wanna make sure people are prepared not just from the perspective of how do we stop someone from getting in, but what we can do if and when someone gets in." (James Fair.) Mr. Fair's business also covers a disaster recovery program if a security breach goes wrong. Join us in today's episode.
On today's show, Samual Hill from Cyolo Security and Tim discuss High-Risk Access and the trends of corporations toward a more secure virtual ecosystem. With a background in the Emergency Room and an M.A. in Strategic Leadership, Samuel is passionate about helping organizations grow and protect themselves effectively in industries such as manufacturing, banking, financial services, insurance, and oil and gas. High Risk is still in today's headlines, and companies are starting to understand security. In this episode, we will discuss how that is trending in today's business culture, how security-related tools are or are not beneficial for remote working, and the manufacturing of oil and gas can benefit the most from security in these remote environments. With the idea of remote and the High Risk it brings to IT Systems of today, how can it benefit from understanding and having the experts evaluate security ramifications? Does security matter when using remote established work in a virtual ecosystem? NewCyberFrontier Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
Welcome back to NewCyberFrontier. In this video, we have guest Patrick Clawson CEO of an API Security Platform Called Resurface Labs. Mr. Clawson has extensive knowledge of Cybersecurity with twenty-plus years of experience. In this episode, we will review API modules and how only 11% are in the marketplace, leaving a gap for encrypted security. We will also be addressing how to start up a business in the cybersecurity world. Starting up a business, Patrick Clawson comes in for growth and focuses on four successful initiatives. "Usually, I reach out to financial and Industrial analyses to get their view on the matter. The third thing I do is Intensive Competitive Research, getting everybody's verdicts worldwide, big or small. The last step is building out the pricing strategy and competitive advantages and contacting buyers to make it relevant. Tune in to today's episode. Thank you.
On today's show, Fausto Lendeborg and Tim discuss Cloud Platforms, Cloud migration, the speed of business objectives, and the organization's perspective. Fausto is the Co-Founder and CEO of Secberus, a Cloud Security Governance Platform designed to manage cloud risk at scale. With over 20 years of experience in cybersecurity, Fausto has been an integral part of multiple successful ventures, including Prolexic and Zenedge; Fausto now focuses on sharing his cloud governance, Security, and compliance knowledge in the modern as-code environment. CISOs have a hold on the trending change and know how to use and secure cloud ecosystems for the organization's benefit. The idea of the Cloud has taken off and is now one of the top IT skills needed in today's business markets. So how is Security standing up and taking charge of the Cloud security and its virtual ecosystems? Secberus Website Secberus - Assess, understand and manage cloud infrastructure drift at enterprise scale. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
Welcome back to the show! Today we have guest Amit Serper Director of Security Research at Sternum. At Sternum, Mr. Serper is tasked with researching hardware or "Hardware Hacking," where he takes apart specific devices to gain access to them. Mr. Serpers say's, "Our approach to security at Sternum is, we know those devices are vulnerable for various reasons, but when developers write the code, we know they do not have security in mind. Our job is to understand the vulnerability that is on these devices." Security structures are not up to date on most devices, causing exploitation or vulnerability. Join in today's Episode of NewCyberFrontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
Welcome back to the show! Our Guest, Justin Beals, CEO and co-founder at Strike Graph, a 20+ year veteran, Background in Telco, and four different startups. Today we talk about a new era of turning security tools into a business value proposition, turning the advertising of security posture into marketing goods and services. Tune into this week's podcast episode. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
I hope everyone enjoyed the break! In today's episode, we have guest Scott Schober, President and CEO of Berkeley Varitronics Systems and a Cyber Expert who has published three books on Cybersecurity. Mr. Schober has had multiple altercations with getting hacked and has extensive knowledge of this matter, saying, "I call it the Digital footprint; the more you put out there about yourself, your whereabouts, your likes, it creates a digital profile about you which leaves a trail of breadcrumbs about you"(Schober.) One may think this is not a massive deal at the time, but as the information you leave behind becomes more extensive, this leads more of a target on your back to getting hacked or worse. You can control what you see on the internet and your phone, for example, "Say you look up or go buy a pregnancy test at the store; in the following weeks, you will see various ads and promos on your phone about subjects related to pregnancy tests, babies, etc." (Gorog.) This is an interesting and almost eerie subject to discuss because your phone can decide what you see based on your searches and interests. Go check out more on Scott Schober! Here is his website www.ScottSchober.com Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
Welcome back to the show! In today's episode, we are accompanied by host Tim Montgomery and guest Chris Gorog, the CEO of Blockframe, a Blockchain company that uses Blockchain technology for privacy. In this episode, we will review the relationship of trust within the Internet, Cybersecurity, and the CIA. With millions of people, systems, and devices, we must have an efficient method to understand trust digitally. A mystery is where "We have to trust millions of devices without a human attachment to them; this is where trust becomes the most important and is yet mostly unsolved." (Chris Gorog.) To unpack and understand this, we will first look at the behavior of the human aspect of trust and how trust affects our Psychology. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
Write Up Welcome back to the show; today our host, Tim Montgomery, presents us with the release of the Executive Order of Cybersecurity and Critical infrastructure of Zero Trust. "Within agencies, they refer to zero trust to provide collections of concepts and ideas to minimize uncertainty, inforcing accuracy per request of access to information." (Montgomery.) Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic? Tune in to the episode of NewCyberFrontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
Welcome back to the show. We are continuing our series of Zero Trust where we take interviews and get people's impressions at the Rocky Mountain Cyberspace symposium. Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Enjoy this episode of NewCyberFrontier Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
Welcome back to the show. Today we have our three hosts, Tim Montgomery, Chris Gorog, and Dr. Shawn Murray, going over "Zero Trust." Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Dr. Shawn Murray Defines these five pillars as "This is a Cybersecurity paradigm focused on resources, protection, and the premise trust is never granted implicitly." (Dr. Murray) Stay tuned for the other half of this episode, where we take interviews and get people's impressions on Zero trust at the Rocky Mountain Cyberspace symposium. Enjoy today's episode. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
Today's NewCyberFrontier, guest Dr. Brian Smith, has founded several companies, TippingPoint Technologies Click Security, and most recently Spyderbat. Spyderbat is pioneer in cloud security using “Kubernetes which they believe is the latest step in the evolution of cloud” ( Brian Smith.) Kubernetes use short life cycle cloud containers monitoring the behavior of the container to determine when malicious activity might be enacted. The pretense is, by knowing the normal behavior we can spot the abnormal operations and thus the malicious activity. “Kubernetes have allowed us to change how we think about security systems.” (Brian Smith.) In the past, we try to detect viruses and malware threats and prevent them the best way we could, but there might just be a better way to secure software better than we thought. Tune in to today's episode of NewCyberFrontier, and check out today's sponsor https://www.spyderbat.com Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
Welcome back to this episode of NewCyberFrontier. We Continue our IEEE series and the Initiative over Digital Privacy. Today our guest speaker is Dr. Stefano Zanero, a Cybersecurity Professor, a member of the ISSA Board of Directors, and a founding member of the Blackhat conference series. In today's discussion, why privacy? Dr. Zanero answers, "Authentication is the building block in the first chapter of any textbook, so we would think it is solved, but it's not." (Zanero.) Dr. Zanero stresses that we still need to improve imperfect solutions to breaches in the Digital Privacy world and with sharing data. In society, the average person is aware of their digital privacy but needs the tools and education necessary to handle their data. Dr. Zanero says, "Having this initiative to gather and generate momentum around this subject is very important." Be an informed listener by tuning into this continuing series of Digital privacy. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
In today's episode, we are back with our three hosts, Tim Montgomery, Chris Gorog, and Dr. Shawn Murray. “The amount of data going into SIMS is too vast for humans to keep up with” (Murray). In addition, the sophistication of some cyber attacks outwits the human eye needing specific tools to catch in the programming languages. Enjoy today's episode of NewCyberFrontier.
Welcome back to this episode of Just Talking! We have our two hosts, Tim Mongomery, and Chris Gorog. This episode covers many topics, including Cloud services and Buzz Words in the Cyber security industry. With cloud technology constantly evolving, giant companies like Amazon and Microsoft must keep them secure and invulnerable. "By 2025, 50% of data will be in the cloud between thousands of businesses and companies. Enjoy today's episode of Buzz Words! Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services
In this week's post, we are unpacking all the information we have heard from all our guests this past year, with our hosts Tim Montgomery and Chris Gorog. One topic we discuss in today's podcast is whether businesses and organizations prioritize security as their primary focus. “ The role of the chief information security officer has come a long way in the past twenty-five years.” (Montgomery.) Businesses inform consumers that they have security in their products, software, and devices for security reasons and are marketing strategies to keep up with competitors. Join us In today's episode of NewCyberFrontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services