Cyber Frontiers (Video Small)

Cyber Frontiers (Video Small)

54 episodes

Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Never on a schedule, but always up to date!

Podcasts

The Evolution of Cyber Talent Screening with Franz Payer, CEO Cyber Skyline CF067

Published: May 13, 2022, 5:07 p.m.
Duration: N/A

Listed in: Technology

2021 Cybersecurity Headlines and a Look Ahead at 2022 CF065

Published: March 3, 2022, 12:10 a.m.
Duration: N/A

Listed in: Technology

Liviu Arsene from Bitdefender talks Bitdefender Box and Bitdefender Premium VPN CF064

Published: Oct. 19, 2020, 7:41 p.m.
Duration: N/A

Listed in: Technology

Zero Trust Security In a Pandemic Mindset CF063

Published: Sept. 5, 2020, 11:46 a.m.
Duration: N/A

Listed in: Technology

Identity Theft Protection in 2020 CF062

Published: April 23, 2020, 1:44 a.m.
Duration: N/A

Listed in: Technology

COVID-19 Data Analytics CF061

Published: March 26, 2020, 12:10 a.m.
Duration: N/A

Listed in: Technology

Adversarial Machine Learning CF060

Published: Feb. 15, 2020, 2:06 a.m.
Duration: N/A

Listed in: Technology

Security Education with Cyber Skyline CF059

Published: Dec. 17, 2019, 1:05 a.m.
Duration: N/A

Listed in: Technology

Quantum Supremacy and the Cryptology Time Machine CF058

Published: Nov. 10, 2019, 4:02 a.m.
Duration: N/A

Listed in: Technology

Cyber Anecdotes: A Tale of Worms, Shared Security, and More CF057

Published: Aug. 22, 2019, 11:41 p.m.
Duration: N/A

Listed in: Technology

The Manifestation of New Exploitation CF056

Published: June 22, 2019, 5:13 p.m.
Duration: N/A

Listed in: Technology

Data Breach SecOps, Reputations, and IoT Security CF055

Published: May 4, 2019, 12:50 a.m.
Duration: N/A

Listed in: Technology

Quantum, Cyber, Oh My! The Best of RSA 2019 CF054

Published: March 13, 2019, 2:08 a.m.
Duration: N/A

Listed in: Technology

Containers Gone Wild CF053

Published: Feb. 23, 2019, 2:07 p.m.
Duration: N/A

Listed in: Technology

AI Rising CF052

Published: Feb. 9, 2019, 2:28 a.m.
Duration: N/A

Listed in: Technology

Crypto and Blockchain: Enablers of the Future CF051

Published: Nov. 17, 2018, 5:30 p.m.
Duration: N/A

Listed in: Technology

Computing Without the B.S. CF050

Published: Oct. 17, 2018, 12:21 a.m.
Duration: N/A

Listed in: Technology

Kill The Ancient Authenticator! CF049

Published: Sept. 27, 2018, 1:38 a.m.
Duration: N/A

Listed in: Technology

AI In Everyday Life: Is It Ready for the Limelight? CF048

Published: Sept. 15, 2018, 4:44 p.m.
Duration: N/A

Listed in: Technology

Highlights from DEFCON 26 CF047

Published: Aug. 21, 2018, 8:56 p.m.
Duration: N/A

Listed in: Technology

The Modern Turing Test: A Brief History in ML and Some Cyber Anecdotes CF046

Published: July 11, 2018, 2:11 a.m.
Duration: N/A

Listed in: Technology

Difference between AI and ML, and How Does IoT Fit In Again? CF045

Published: June 27, 2018, 1:39 a.m.
Duration: N/A

Listed in: Technology

GDPR What You Need to Know, RSA Conference Recap and Crypto Mining Update CF044

Published: June 16, 2018, 1:17 a.m.
Duration: N/A

Listed in: Technology

Meltdown and Spectre: A Tear at the Foundation of Computer Security CF042

Published: Jan. 9, 2018, 11:50 p.m.
Duration: N/A

Listed in: Technology

2018 Frontier Trends in Cybersecurity and Data Science CF041

Published: Dec. 22, 2017, 12:43 a.m.
Duration: N/A

Listed in: Technology

Mobile Security Matters: Dissecting the Dangers of Mobile Malware CF040

Published: Nov. 29, 2017, 4:42 a.m.
Duration: N/A

Listed in: Technology

DEFCON 2017 Recap and Macbook Wizardry CF039

Published: Aug. 17, 2017, 4:20 a.m.
Duration: N/A

Listed in: Technology

Honey Haven: Creating Research HoneyPots In the Cloud CF038

Published: Aug. 5, 2017, 10:09 p.m.
Duration: N/A

Listed in: Technology

Cyber Exploitation with SSRF & CMS Swiss Cheese CF037

Published: July 18, 2017, 5:53 a.m.
Duration: N/A

Listed in: Technology

On Cybersecurity and Ransomware CF036

Published: June 30, 2017, 4:38 a.m.
Duration: N/A

Listed in: Technology

Essential Cybersecurity Science with Josiah Dykstra CF035

Published: Feb. 21, 2017, 12:11 a.m.
Duration: N/A

Listed in: Technology

2017 Cybersecurity Outlook and 2016 Reflections CF034

Published: Jan. 2, 2017, 2:34 a.m.
Duration: N/A

Listed in: Technology

A Case Study in Webserver Malware for Admins and Users Alike CF033

Published: Dec. 3, 2016, 6:53 p.m.
Duration: N/A

Listed in: Technology

DEFCON 24 CF031

Published: Aug. 17, 2016, 11:54 p.m.
Duration: N/A

Listed in: Technology

IPv6 and What is Coming in the Future CF030

Published: Aug. 7, 2016, 4:05 p.m.
Duration: N/A

Listed in: Technology

Hands on with the Anonabox Pro CF029

Published: June 29, 2016, 2:02 a.m.
Duration: N/A

Listed in: Technology

Tor and Anonymity: An Academic Introduction to the Dark Web CF028

Published: June 8, 2016, 2:01 a.m.
Duration: N/A

Listed in: Technology

Online Affairs, Female Chatbots, and A Mildly Unrelated DDoS Conversation CF026

Published: Sept. 5, 2015, 8:33 p.m.
Duration: N/A

Listed in: Technology

Visualizing Cyberspace, Hacking Cars, and the Takeover of the Internet of Things CF024

Published: Aug. 1, 2015, 12:10 a.m.
Duration: N/A

Listed in: Technology

Data Breaches of the 21st Century OPM Ripples through the FedGov CF023

Published: July 22, 2015, 12:48 a.m.
Duration: N/A

Listed in: Technology

Where is Big Data Headed Next on the Information Superhighway CF021

Published: May 31, 2015, 9:41 a.m.
Duration: N/A

Listed in: Technology

Data & Compute Challenges in Enterprise IT Environments CF020

Published: May 3, 2015, 2:09 a.m.
Duration: N/A

Listed in: Technology

Innovative Hacker Marathons: Bitcamp 2015 CF019

Published: April 17, 2015, 12:22 a.m.
Duration: N/A

Listed in: Technology

Cyber Roundtable with ACES Cybersecurity Students at UMD CF018

Published: Feb. 21, 2015, 4:59 p.m.
Duration: N/A

Listed in: Technology

Using Big Data and Graph Theory to Map the WWW – CF016

Published: Jan. 8, 2015, 5:26 a.m.
Duration: N/A

Listed in: Technology

Part 2: Exploring Big Data Through the Twitterverse – CF014

Published: Dec. 13, 2014, 9:23 p.m.
Duration: N/A

Listed in: Technology

Exploring Big Data Through the Twitterverse – CF013

Published: Nov. 27, 2014, 1:06 a.m.
Duration: N/A

Listed in: Technology

Space Networks & Cybersecurity in Healthcare with Special Guest Jay Ellis – CF011

Published: Oct. 30, 2014, 1:56 a.m.
Duration: N/A

Listed in: Technology

The Evolution of Cloud Computing and Security – CF010

Published: Oct. 19, 2014, 12:13 a.m.
Duration: N/A

Listed in: Technology