Synopsis
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
Episodes
-
NCF-346 Escalating Effectual DevOps
20/03/2024 Duration: 34minWelcome back, everybody, to New Cyber Frontier. In today's episode, we have guest Cory O Daniel, C.E.O. and co-founder at MassDriver, who works in DevOps. Mr. Daniel has a background in physics and architecture but switched his career path and started to focus on healthcare information systems and computer science. Mr. Daniel is a self-proclaimed serial entrepreneur and has been in seven startup companies, three of which he co-founded. Cory says "Starting a company and becoming the founder takes hard work, energy, and effort. You must be somebody who can digest information, learn, and be fine when wrong." (Cory O Daniel.) Mr. Daniel explains his path to DevOps and how software has significantly changed he started in 2008, back then unlike today no structured APIs were common. Today we write less coding and sometimes even just dictate to AI, and software development is even automated entirely in some cases. "More of our software is becoming APIs in the cloud services." Software systems are evolving as cloud se
-
NCF-345 Sustainability of Cybersecurity in the AI Era
12/03/2024 Duration: 32minWelcome back, to the New Cyber Frontier Podcast with our hosts Tim Montgomery and Dr. Gorog. In the final episode of the eight-part series, Tim provides a direct inquisitive dialog with Dr. Gorog regarding his dissertation work in distributed trust. What distribution of trust means to the average person is a bit Shakey as the coining of Zero-trust has made the topic somewhat of a fuzzy concept. "Trust and zero-trust are one of the hot catch phrases, now everyone claims alignment to the Zero-trust pillars" but what does that mean? Listen to the discussion on the distribution of trust as our hosts break down the major problem with trust which is how to scale to everyone in the digital age. Gorog says… "for the first-time scalable frameworks for trust are possible. Solving for sustainability, has been key, now the future may drastically change when digital content and sources of data can be trusted. Sustainability means providing some order in the digital free-for-all environment with governance. What the futu
-
NCF-344 Protecting your Data Wealth
26/02/2024 Duration: 32minWelcome back everybody to the New Cyber Frontier Podcast with our hosts Tim Montgomery and Dr. Gorog. In this seventh episode, we will continue on the next-generation post digital transformation philosophy looking at the lifecycle of our data. The discussion centers on the use of data and its importance to you as the owner/creator vs what your data means to others, and why we should all be aware of this when evaluating how applications we choose use our data. Dr. Gorog discusses some examples in Healthcare "How many times does your Fitbit send information to get collected by a web engine that has recorded your heart rate or blood pressure and location. What picture does that provide about your personal activities". Ensuring our data is used in a way that is best for us is something that we will all become competent at when we start to realize that they only thing we have to show for our virtual lives is the data it produces. Having accountability towards your data's use is power it is our currency of the fu
-
NCF-343 Post Digital Transformation Philosophy
20/02/2024 Duration: 33minHello Everybody, welcome back to New Cyber Frontier. We will continue to the sixth episode of this series with Tim Montgomery and Dr. Gorog covering how the world transforms digitally. " In the digital world, we are getting to the point where Eighty Percent of peoples' entire lives work effort is virtual, and this is just going to grow." Dr. Gorog explains how this digital era will continue to grow even further down the road and as this continues, so does the need for individual control of the content that people create. The structure for the post-digital transformation era is created by cybersecurity and the application of privacy-preserving technologies. Tune in today to see the first glimpse of what a Philosophy of the new post-digital transformation era looks like, and explore possibilities of accumulating generational wealth of digital content.
-
NCF-342 On the 2024 Cyber Frontier
14/02/2024 Duration: 36minWelcome back everybody to New Cyber Frontier. In this episode, we have our three hosts Shawn Murray, Tim Montgomery, and Dr. Gorog recapping this last year and discussing the plans for 2024. Dr. Murray covers what he sees as the key events in 2023 with significant legislation for privacy in a variety of states and more definement around responses to and requirements around breaches. Examples are state legislation taking the initiative in Illinois to protect the privacy of biometric data. Many other states are slowly passing laws to protect digital footprint and data. In 2024 some people are asking, instead of just protecting my data, can I switch to the offensive against some of these cyber attacks? This has a multitude of problems and Dr. Gorog explains it perfectly. "The solution is not to make the victim become the attacker because of preemptive striking and the confusion about which one is the attacker and who is the actual victim." If you do not want to miss the future of Cybersecurity, tune in to this
-
NCF-341 Exploring New Methods of Distributed Trust
30/01/2024 Duration: 32minHello Everybody, welcome back to the New Cyber Frontier podcast. We continue with the series' fifth episode with Tim Montgomery and Dr. Gorog, Looking over these past years of work in distributed trust. The normalization of today's society is that we trust these large-scale businesses with our data and goods because they are the only safe options we have in most cases. The alternative to reliance on large organizations in the digital world leaves us potentially working with a myriad of unknown, untested, unverifiable connections on the other side of the world. The safer bet is to go to the megasite provider that we know will at least be in business to resolve issues if they occur. Changing this game requires the tools for distributing trust, which may give us a granular ability to trust small providers or individuals. Dr. Gorog explains the work in distributed ledger as a tool for distributed trust and its use in the connection of different elements of Cybersecurity. Take advantage of this impactful episode,
-
NCF-340 It Takes a Community to Build Next-Gen Cyber
24/01/2024 Duration: 33minWe continue the Fourth in the Eight-episode series with Tim Montgomery and Dr. Gorog. In this episode, we look at some driving forces for the next-generation research into distributed trust. Around 2016, Dr. Gorog, working with the State of Colorado, started the first work into trust for digital records for citizens' data held by the state. At the time technology for distributed ledgers was thought promising but was not economical. Prototypes for state programs found that one year's cloud storage data costs ten times more than the state budgeted. So many people have envisioned blockchain and distributed ledger to solve societal problems, but the truth is that they did not work because they were cost-inhibiting. Large-scale adoption of businesses has found similar technology limitations. Join today to hear more about how the state of Colorado sponsorship has supported and funded exciting work using many Cybersecurity institutions and Universities in Colorado as a test bed. Teams of students, companies, interna
-
NCF-339 New Frontier of Individual Empowerment
16/01/2024 Duration: 06minWelcome back, everybody, to the New Cyber Frontier Podcast. We continue the Third in the Eight-episode series with Tim Montgomery and Dr. Gorog. In this episode, we discuss the nature of newly evolving open markets in comparison to human historical examples of frontiers. The digital and virtual frontier has infinite possibilities that we barely have scratched the surface of, raising the question, How far can we go? In this digital realm, numerous companies have grown over the years to become the largest entities in the world with an entire virtual presence. Over the next few years, many more are anticipated to make a digital transformation. Participation in the post-digital transformation era has been mostly restricted to large entities; these large companies are difficult to compete with if you are new or entering markets because small businesses and individuals are unknown and untrusted. The individual is relatively uninvolved in this digital transformation; their efforts and digital works are the currency
-
NCF-338 Disrupting Markets by Cybersecurity Economics
09/01/2024 Duration: 33minWelcome back, everybody, to New Cyber Frontier. We continue the Second in the Eight-episode series with Tim Montgomery and Dr. Gorog. Our discussion focuses on the nature of disruption in any market, identifying the critical result of disruption is a change of philosophy. When an entire old way of doing something goes away based on technology, not only business changes, but society changes. If we go back to early 2000, there's a shift in the market, which is overseas manufacturing. Companies would allow their product to be made overseas, making it a quarter of the price; if you couldn't outsource fast enough, you could not keep up. When products are sent to be manufactured overseas, there is no control over that intellectual property. "A company found out that they would compete with their own products in the marketplace, and now we see that the risk surface for cyber-attacks is uncontrollable because it is not in our jurisdiction to enforce. The disruption of that era caused many of the problems we are facin
-
NCF-337 Entering a New Year and New Phase for Cybersecurity
02/01/2024 Duration: 33minHappy New Year, everybody, and welcome back to New Cyber Frontier! To start 2024, we have an eight-episode series with Tim Montgomery and Dr. Gorog, Ph.D. CISSP is unveiling a new philosophy for Cybersecurity. Dr. Gorog elaborates with our host how working on the recently released work for the last seven years has progressed to a potential game changer. This first episode provides a kick-off point where the conversation focuses on the current state of the cybersecurity industry as we enter this new year. Dr. Gorog says we are still primarily working toward satisfying compliance, with most new approaches focused on data analysis and AI. (Gorog.) Billions of dollars have been spent on compliance and keeping up with the minimum standards to protect the massive data pool. In the last couple of years, digital transformations have been accelerating. Organizations and employees are spending less of their overall effort working toward physical world objects. In fact, many of us have not done anything that has resulte
-
NCF-336 Confidential Computing Explained
05/12/2023 Duration: 31minWelcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.
-
NCF-335 Small Business Balances Cybersecurity Cost vs Value
28/11/2023 Duration: 27minWelcome back, everybody, to New Cyber Frontier. Our host, Chris Gorog, partnered with the Smalls Podcast on this episode with Dennis Kater and Nate Moser! The Smalls Podcast started in 2017 and deals with The Government Contractor Ecosystem, which aims towards Manufacturers, Service Providers, and Small Government Contractors. The primary audience for The Smalls is business development companies, Owners, and those who want to do business with the Government or Department of Defense. Companies are cautiously getting involved with cybersecurity mainly to implement the measures their contracts require, but not much more. How to identify the best balance for their minimal budgets vs the value they receive is the continued challenge they all experience. Nate and Dennis bring to light some progress in the industry compared with a few years back. Hear the latest from the small business community on cybersecurity; tune in to this week of New Cyber Frontier. Check out The Smalls Podcast here: Podcast – The Smalls
-
NCF-334 Security Engineering for Industrial Systems
13/11/2023 Duration: 31minWelcome back, everybody, to NewCyberFrontier. In today's episode, guest Andrew Ginter, Vice President of Industrial Security and Waterfall Security. Mr Ginter is also the author of a book titled, "Engineering Grade OT Security: A Managers Guide." He defines his book as sitting at the intersection of industrial systems and Engineering. These systems could range from inputs and outputs from computer systems such as power plants, Shoe factories, and high-speed passenger train rails. Mr. Ginter explains his book further by saying, "Small Shoe factories and High-speed train rail switches are very different on the Industrial system spectrum. What determines the difference is worst case consequences of compromise." What would be the worst outcome to a Shoe factory versus Passenger Train Rail switches if all commands to computer systems fail? Shoe factories might have to replace all the equipment and a couple million dollars worth of expenses that insurance could cover, but for the switches on a train, if all compute
-
NCF-333 EDGE Symposium Presentation
03/10/2023 Duration: 19minThank you for coming back to NewCyberFrontier! In today’s video, our host, Chris Gorog, is giving a presentation on Blockframe at the EDGE Symposium in New York. Please tune in to learn more about how we handle Cybersecurity at Blockframe.
-
NCF-332 Weaponized Documents and Content
24/07/2023 Duration: 33minHello Everybody, and welcome back to NewCyberFrontier. On today’s episode, we have guest Aviv Grafi, who is the CTO and founder of Votiro. Mr. Grafi talks about Weaponizing Documents and how they are getting more common and more dangerous, popping up in PDF files and Zip files. The best way to try to understand these attacks is to think like a hacker would think and try to protect yourself from future attacks by being vigilant of what you open. Learn more today on how you can protect yourself by tuning in to today’s episode. Check our website NewCyberFrontier Check out Votiro’s website Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
-
NCF-330 High-risk is a Reality
19/06/2023 Duration: 33minOn today's show, Samual Hill from Cyolo Security and Tim discuss High-Risk Access and the trends of corporations toward a more secure virtual ecosystem. With a background in the Emergency Room and an M.A. in Strategic Leadership, Samuel is passionate about helping organizations grow and protect themselves effectively in industries such as manufacturing, banking, financial services, insurance, and oil and gas. High Risk is still in today's headlines, and companies are starting to understand security. In this episode, we will discuss how that is trending in today's business culture, how security-related tools are or are not beneficial for remote working, and the manufacturing of oil and gas can benefit the most from security in these remote environments. With the idea of remote and the High Risk it brings to IT Systems of today, how can it benefit from understanding and having the experts evaluate security ramifications? Does security matter when using remote established work in a virtual ecosystem? NewCyberFr
-
NCF-329 API Marketplace and business opportunities
13/06/2023 Duration: 31minWelcome back to NewCyberFrontier. In this video, we have guest Patrick Clawson CEO of an API Security Platform Called Resurface Labs. Mr. Clawson has extensive knowledge of Cybersecurity with twenty-plus years of experience. In this episode, we will review API modules and how only 11% are in the marketplace, leaving a gap for encrypted security. We will also be addressing how to start up a business in the cybersecurity world. Starting up a business, Patrick Clawson comes in for growth and focuses on four successful initiatives. "Usually, I reach out to financial and Industrial analyses to get their view on the matter. The third thing I do is Intensive Competitive Research, getting everybody's verdicts worldwide, big or small. The last step is building out the pricing strategy and competitive advantages and contacting buyers to make it relevant. Tune in to today's episode. Thank you.
-
NCF-328 How fast is the Cloud Migration Moving
06/06/2023 Duration: 33minOn today's show, Fausto Lendeborg and Tim discuss Cloud Platforms, Cloud migration, the speed of business objectives, and the organization's perspective. Fausto is the Co-Founder and CEO of Secberus, a Cloud Security Governance Platform designed to manage cloud risk at scale. With over 20 years of experience in cybersecurity, Fausto has been an integral part of multiple successful ventures, including Prolexic and Zenedge; Fausto now focuses on sharing his cloud governance, Security, and compliance knowledge in the modern as-code environment. CISOs have a hold on the trending change and know how to use and secure cloud ecosystems for the organization's benefit. The idea of the Cloud has taken off and is now one of the top IT skills needed in today's business markets. So how is Security standing up and taking charge of the Cloud security and its virtual ecosystems? Secberus Website Secberus - Assess, understand and manage cloud infrastructure drift at enterprise scale. Visit our sponsors: BlockFrame Inc. IEEE
-
NCF-326 Cybersecurity Research
15/05/2023 Duration: 40minWelcome back to the show! Today we have guest Amit Serper Director of Security Research at Sternum. At Sternum, Mr. Serper is tasked with researching hardware or "Hardware Hacking," where he takes apart specific devices to gain access to them. Mr. Serpers say's, "Our approach to security at Sternum is, we know those devices are vulnerable for various reasons, but when developers write the code, we know they do not have security in mind. Our job is to understand the vulnerability that is on these devices." Security structures are not up to date on most devices, causing exploitation or vulnerability. Join in today's Episode of NewCyberFrontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
-
NCF-325 Security as a Business Value Proposition
25/04/2023 Duration: 28minWelcome back to the show! Our Guest, Justin Beals, CEO and co-founder at Strike Graph, a 20+ year veteran, Background in Telco, and four different startups. Today we talk about a new era of turning security tools into a business value proposition, turning the advertising of security posture into marketing goods and services. Tune into this week's podcast episode. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy