New Cyber Frontier

  • Author: Vários
  • Narrator: Vários
  • Publisher: Podcast
  • Duration: 54:53:39
  • More information

Informações:

Synopsis

Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.

Episodes

  • NCF-324 Cybersecurity for Everyone

    18/04/2023 Duration: 38min

    I hope everyone enjoyed the break! In today's episode, we have guest Scott Schober,  President and CEO of Berkeley Varitronics Systems and a Cyber Expert who has published three books on Cybersecurity. Mr. Schober has had multiple altercations with getting hacked and has extensive knowledge of this matter, saying, "I call it the Digital footprint; the more you put out there about yourself, your whereabouts, your likes, it creates a digital profile about you which leaves a trail of breadcrumbs about you"(Schober.) One may think this is not a massive deal at the time, but as the information you leave behind becomes more extensive, this leads more of a target on your back to getting hacked or worse. You can control what you see on the internet and your phone, for example, "Say you look up or go buy a pregnancy test at the store; in the following weeks, you will see various ads and promos on your phone about subjects related to pregnancy tests, babies, etc." (Gorog.) This is an interesting and almost eerie subjec

  • NCF-323 Psychology of Trust Digitally

    03/04/2023 Duration: 32min

    Welcome back to the show! In today's episode, we are accompanied by host Tim Montgomery and guest Chris Gorog, the CEO of Blockframe, a Blockchain company that uses Blockchain technology for privacy. In this episode, we will review the relationship of trust within the Internet, Cybersecurity, and the CIA. With millions of people, systems, and devices, we must have an efficient method to understand trust digitally. A mystery is where "We have to trust millions of devices without a human attachment to them; this is where trust becomes the most important and is yet mostly unsolved." (Chris Gorog.) To unpack and understand this, we will first look at the behavior of the human aspect of trust and how trust affects our Psychology.  Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy

  • NCF-322 Critical infrastructure of Zero Trust

    28/03/2023 Duration: 38min

    Write Up Welcome back to the show; today our host, Tim Montgomery, presents us with the release of the Executive Order of Cybersecurity and Critical infrastructure of Zero Trust. "Within agencies, they refer to zero trust to provide collections of concepts and ideas to minimize uncertainty, inforcing accuracy per request of access to information." (Montgomery.) Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic? Tune in to the episode of NewCyberFrontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy

  • NCF-321 Part 2 of Zero Trust

    23/03/2023 Duration: 09min

    Welcome back to the show. We are continuing our series of Zero Trust where we take interviews and get people's impressions at the Rocky Mountain Cyberspace symposium. Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Enjoy this episode of NewCyberFrontier  Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy

  • NCF-320 Zero Trust

    14/03/2023 Duration: 29min

    Welcome back to the show. Today we have our three hosts, Tim Montgomery, Chris Gorog, and  Dr. Shawn Murray, going over "Zero Trust." Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Dr. Shawn Murray Defines these five pillars as "This is a Cybersecurity paradigm focused on resources, protection, and the premise trust is never granted implicitly." (Dr. Murray) Stay tuned for the other half of this episode, where we take interviews and get people's impressions on Zero trust at the Rocky Mountain Cyberspace symposium. Enjoy today's episode.

  • NCF-319 Cloud Security with Kubernetes

    07/03/2023 Duration: 34min

    Today's NewCyberFrontier, guest Dr. Brian Smith, has founded several companies, TippingPoint Technologies Click Security, and most recently Spyderbat. Spyderbat is pioneer in cloud security using “Kubernetes which they believe is the latest step in the evolution of cloud” ( Brian Smith.) Kubernetes use short life cycle cloud containers monitoring the behavior of the container to determine when malicious activity might be enacted. The pretense is, by knowing the normal behavior we can spot the abnormal operations and thus the malicious activity. “Kubernetes have allowed us to change how we think about security systems.” (Brian Smith.) In the past, we try to detect viruses and malware threats and prevent them the best way we could, but there might just be a better way to secure software better than we thought. Tune in to today's episode of NewCyberFrontier, and check out today’s sponsor https://www.spyderbat.com  Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy

  • NCF-IEEE12 Global Efforts in Digital Privacy

    28/02/2023 Duration: 30min

    Welcome back to this episode of NewCyberFrontier. We Continue our IEEE series and the Initiative over Digital Privacy. Today our guest speaker is Dr. Stefano Zanero, a Cybersecurity Professor, a member of the  ISSA Board of Directors, and a founding member of the Blackhat conference series. In today's discussion, why privacy? Dr. Zanero answers, "Authentication is the building block in the first chapter of any textbook, so we would think it is solved, but it's not." (Zanero.) Dr. Zanero stresses that we still need to improve imperfect solutions to breaches in the Digital Privacy world and with sharing data. In society, the average person is aware of their digital privacy but needs the tools and education necessary to handle their data. Dr. Zanero says, "Having this initiative to gather and generate momentum around this subject is very important." Be an informed listener by tuning into this continuing series of Digital privacy. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy

  • NCF-317 Cybersecurity Buzz words

    07/02/2023 Duration: 31min

    Welcome back to this episode of Just Talking! We have our two hosts, Tim Mongomery, and Chris Gorog. This episode covers many topics, including Cloud services and Buzz Words in the Cyber security industry. With cloud technology constantly evolving, giant companies like Amazon and Microsoft must keep them secure and invulnerable. "By 2025, 50% of data will be in the cloud between thousands of businesses and companies. Enjoy today's episode of Buzz Words! Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services

  • NCF-316 Recapping What We heard from our Guest in 2022

    31/01/2023 Duration: 32min

    In this week's post, we are unpacking all the information we have heard from all our guests this past year, with our hosts Tim Montgomery and Chris Gorog. One topic we discuss in today’s podcast is whether businesses and organizations prioritize security as their primary focus. “ The role of the chief information security officer has come a long way in the past twenty-five years.” (Montgomery.) Businesses inform consumers that they have security in their products, software, and devices for security reasons and are marketing strategies to keep up with competitors. Join us In today’s episode of NewCyberFrontier.    Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services

  • NCF-315 FAA Grounding Incident

    25/01/2023 Duration: 34min

    Welcome back to the show! We are brought to you by our three hosts, Chris Gorog, Tim Montgomery, and Shawn Murray. In today's episode, we are talking about the FAA incident earlier this week. “The FAA announced and grounded all flights in the United States due to a corrupted database file.” (Murray.) This was not a Cyber attack; instead just a corrupted file. It is reported that two contractors working for the FAA changed the system that was not scheduled nor implemented correctly, having to reboot the system and get everything back online. This deals with Business Continuity Disaster Recovery and Critical Infrastructure. Join us in today's episode of NewCyberFrontier   Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services

  • NCF-314 Status of Cybersecurity for Critical Infrastructure

    18/01/2023 Duration: 30min

    In today’s Episode of New Cyber Frontier, we are going over the status of Critical Infrastructure. With thousands of new systems and devices all over the country in play over the last couple of decades, with little to no security, what does this mean for the future? These could include Air conditioning, heating, ventilation, Control systems, HVAC Systems, and much more that are interconnected in some way. Join us In this week's post. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services  

  • NCF-313 The Future of Cybersecurity

    10/01/2023 Duration: 32min

    Welcome back! We have both hosts, Dr. Shawn Murry and Chris Gorog discussing how Cybersecurity is adapting to the future. "It's been a year since Russia invaded Ukraine, and we are starting to see all the Cyber issues with warfare." (Murray.) Privacy was leaked with drones and personal mobile devices on both sides. As technology increases over the next couple of centuries, the internet and Cybersecurity will have to expand to protect personal data. Enjoy this Episode with our hosts and their intelligence on how Cybersecurity is evolving. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services  

  • NCF-IEEE11 Applying Smart Contracts to the Energy Space.

    02/01/2023 Duration: 36min

     Happy New Year! We have two guests in today's show: Tamara Hughes, Principal at TMH Ventures, LLC, and Umit Cali, Associate Professor of Energy Informatics ( AI & Blockchain) at NTNU. "The general objectives of a smart contract are to satisfy common contractual conditions such as payment terms and minimize the need for trusted intermediaries," (Tamara Huges.)This quote is the basis of Smart contracts and, to an extent, how they function. A smart contract is computer code; when given commands, it can run automatically. “This will change the lifestyle of the society and the future of the world” (Umit Cali.) We also discuss how blockchain can be used with energy transactions and in the energy space. Join us In today’s episode of NewCyberFrontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services

  • NCF-IEEE10 Advancements of Health Technology and Cybersecurity

    30/12/2022 Duration: 33min

    Welcome back! In today's episode, we have guest Orlando Lopez, Ph.D., a Certified Project Manager who works for the National Institute of Health and the Department of Health and Human Services. Doctor Lopez works on multiple advanced technologies to help with Therapeutic Planning and Surgical Navigation Systems, along with other fabrication technologies which can help the production of personal devices that can be used at the operating table. With technology advancing, Cyber Security is needed for the security and safety of these advanced technologies. Join us in today's NewCyberFrontier episode.  Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services

  • NCF-312 Understanding Those Starting in Cybersecurity.

    13/12/2022 Duration: 33min

    In today's new edition of NewCyberFrontier, we are accompanied by Ryan Johnson, an intern at Murray Security Services. Ryan Johnson went to Pikes Peak Community College for Cybersecurity in Colorado Springs. One research project Mr. Johnson was operating on was a Vulnerability assessment of security issues. These issues range from many devices, apps, properties, and more. For example, apps can have malware with unsafe databases if installed, and security devices on homes can be taken advantage of if not dealt with properly. Join us with Shawn Murray and Ryan Johnson in today’s episode. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services

  • NCF-IEEE9 Blockchain Security and Energy Transition

    06/12/2022 Duration: 31min

    In this episode, we further our IEEE Blockchain and Transactive Energy series with guest Patrick Phelps, Founder and CEO at WHYGRENE. "The WHYGRENE vision can be distilled into three words; Decarbonized, Decentralized, and Digitized." Mr. Phelps's Incorporation deals with new regulations coming into the market, expressing that the grid has to evolve. These regulations are in play because of the government's demand for clean energy resources instead of finite fossil fuels. With plenty of challenges along the way of converting to clean energy, including battery storage expenses and supply and demand, solutions must be found. Join In today’s special IEEE episode.    

  • NCF-311 Business Strategies with CISO

    29/11/2022 Duration: 34min

    In today's Podcast, we Have Jason Hicks, Field CISO at Coalfire. Jason Hicks has worked on the Technical and Business side at CISO. Mr. Hicks helps people transition from being a technical CISO to being a business leader with skills he has learned and delivers business strategies back to his community and other businesses. Enjoy today's Podcast of New Cyber Frontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services  

  • NCF-310 Security of Digital Footprints

    22/11/2022 Duration: 28min

    In this episode of New Cyber Frontier, our host Tim Montgomery Speaks with Steve Ginty, Director of Threat Intelligence at RiskIQ. Steve Ginty gives his knowledge of Digital Security and protection against malware across the internet. Additionally, RiskIQ has partnered with Microsoft to work with the vulnerability of their exchange systems. Join us on today's episode of New Cyber Frontier.

  • NCF-IEE8 Fielded Blockchain Energy Demonstrations

    15/11/2022 Duration: 34min

    In this episode of New Cyber Frontier, we have two special guests. Sri Nikhil Gourisetti, master’s in systems engineering, Ph.D. Engineering Science. and Dr. James Kempf, Ph.D. in Systems engineering and Senior Consultant at Kempf and Associates. These professionals elaborate on their experience with IEE, Cybersecurity, Energy systems, Blockchain, and much more. In addition, these demonstrations touch on the international level of the value of the blockchain initiative. Sri gives insight into projects at the Pacific North West National Lab and where this might lead with other national labs in the future. Dr. James Kempf has a better view of professional projects globally on the EU and Australian sides of these topics. Join us on this episode of New Cyber Frontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services    

  • NCF-309 Department Of Defense Agent Conveys Security is Essential.

    08/11/2022 Duration: 32min

    In today's episode, we have Christian Dalton, a professional in Counterintelligence for the United States Department Of Defense. Mr. Dalton gave us new tactics and procedures for Security today. "Tradecraft is limited to the imagination." However, Mr. Dalton expresses that tradecraft and business corporations constantly improve as technology advances and becomes more complicated. As these enhance, Security is an essential part of the process. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services  

page 3 from 5