Cyber Frontiers

Cyber Frontiers

54 episodes

Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Never on a schedule, but always up to date!

Podcasts

The Evolution of Cyber Talent Screening with Franz Payer, CEO Cyber Skyline CF067

Published: May 13, 2022, 5:07 p.m.
Duration: 58 minutes 49 seconds

Listed in: Technology

Guest Ashton Webster and New Compliance Rules for Critical Infrastructure Reporting CF066

Published: April 7, 2022, 12:52 a.m.
Duration: 1 hour 4 minutes 39 seconds

Listed in: Technology

2021 Cybersecurity Headlines and a Look Ahead at 2022 CF065

Published: March 3, 2022, 12:10 a.m.
Duration: 1 hour 11 minutes 35 seconds

Listed in: Technology

Liviu Arsene from Bitdefender talks Bitdefender Box and Bitdefender Premium VPN CF064

Published: Oct. 19, 2020, 7:41 p.m.
Duration: 55 minutes 42 seconds

Listed in: Technology

Zero Trust Security In a Pandemic Mindset CF063

Published: Sept. 5, 2020, 11:46 a.m.
Duration: 1 hour 42 seconds

Listed in: Technology

Identity Theft Protection in 2020 CF062

Published: April 23, 2020, 1:44 a.m.
Duration: 1 hour 9 minutes 25 seconds

Listed in: Technology

COVID-19 Data Analytics CF061

Published: March 26, 2020, 12:10 a.m.
Duration: 1 hour 8 minutes 17 seconds

Listed in: Technology

Adversarial Machine Learning CF060

Published: Feb. 15, 2020, 2:06 a.m.
Duration: 1 hour 3 minutes 55 seconds

Listed in: Technology

Security Education with Cyber Skyline CF059

Published: Dec. 17, 2019, 1:05 a.m.
Duration: 59 minutes 38 seconds

Listed in: Technology

Quantum Supremacy and the Cryptology Time Machine CF058

Published: Nov. 10, 2019, 4:02 a.m.
Duration: N/A

Listed in: Technology

Cyber Anecdotes: A Tale of Worms, Shared Security, and More CF057

Published: Aug. 22, 2019, 11:41 p.m.
Duration: 58 minutes 5 seconds

Listed in: Technology

The Manifestation of New Exploitation CF056

Published: June 22, 2019, 5:13 p.m.
Duration: 1 hour 11 minutes 35 seconds

Listed in: Technology

Data Breach SecOps, Reputations, and IoT Security CF055

Published: May 4, 2019, 12:50 a.m.
Duration: 1 hour 3 minutes 26 seconds

Listed in: Technology

Quantum, Cyber, Oh My! The Best of RSA 2019 CF054

Published: March 13, 2019, 2:08 a.m.
Duration: 1 hour 10 minutes 47 seconds

Listed in: Technology

Containers Gone Wild CF053

Published: Feb. 23, 2019, 2:07 p.m.
Duration: 12 minutes 29 seconds

Listed in: Technology

AI Rising CF052

Published: Feb. 9, 2019, 2:28 a.m.
Duration: 1 hour 8 minutes 59 seconds

Listed in: Technology

Crypto and Blockchain: Enablers of the Future CF051

Published: Nov. 17, 2018, 5:30 p.m.
Duration: 1 hour 14 minutes 1 second

Listed in: Technology

Computing Without the B.S. CF050

Published: Oct. 17, 2018, 12:21 a.m.
Duration: 1 hour 7 minutes 17 seconds

Listed in: Technology

Kill The Ancient Authenticator! CF049

Published: Sept. 27, 2018, 1:38 a.m.
Duration: 1 hour 3 minutes 24 seconds

Listed in: Technology

AI In Everyday Life: Is It Ready for the Limelight? CF048

Published: Sept. 15, 2018, 4:44 p.m.
Duration: 51 minutes 57 seconds

Listed in: Technology

Highlights from DEFCON 26 CF047

Published: Aug. 21, 2018, 8:56 p.m.
Duration: 55 minutes 29 seconds

Listed in: Technology

The Modern Turing Test: A Brief History in ML and Some Cyber Anecdotes CF046

Published: July 11, 2018, 2:11 a.m.
Duration: 1 hour 4 minutes 37 seconds

Listed in: Technology

Difference between AI and ML, and How Does IoT Fit In Again? CF045

Published: June 27, 2018, 1:39 a.m.
Duration: 1 hour 10 minutes 23 seconds

Listed in: Technology

GDPR What You Need to Know, RSA Conference Recap and Crypto Mining Update CF044

Published: June 16, 2018, 1:17 a.m.
Duration: 1 hour 4 minutes 48 seconds

Listed in: Technology

An Update on Meltdown and Spectre, ATM JackPotting and Christian Talks Crypto Currency CF043

Published: Feb. 10, 2018, 10:32 a.m.
Duration: 1 hour 4 minutes 45 seconds

Listed in: Technology

Meltdown and Spectre: A Tear at the Foundation of Computer Security CF042

Published: Jan. 9, 2018, 11:50 p.m.
Duration: 1 hour 10 minutes 59 seconds

Listed in: Technology

2018 Frontier Trends in Cybersecurity and Data Science CF041

Published: Dec. 22, 2017, 12:43 a.m.
Duration: 1 hour 8 minutes 34 seconds

Listed in: Technology

Mobile Security Matters: Dissecting the Dangers of Mobile Malware CF040

Published: Nov. 29, 2017, 4:42 a.m.
Duration: 1 hour 21 minutes 25 seconds

Listed in: Technology

DEFCON 2017 Recap and Macbook Wizardry CF039

Published: Aug. 17, 2017, 4:20 a.m.
Duration: 50 minutes 4 seconds

Listed in: Technology

Honey Haven: Creating Research HoneyPots In the Cloud CF038

Published: Aug. 5, 2017, 10:09 p.m.
Duration: 54 minutes 45 seconds

Listed in: Technology

Cyber Exploitation with SSRF & CMS Swiss Cheese CF037

Published: July 18, 2017, 5:53 a.m.
Duration: 1 hour 5 minutes 5 seconds

Listed in: Technology

On Cybersecurity and Ransomware CF036

Published: June 30, 2017, 4:38 a.m.
Duration: 1 hour 7 minutes 6 seconds

Listed in: Technology

Essential Cybersecurity Science with Josiah Dykstra CF035

Published: Feb. 21, 2017, 12:11 a.m.
Duration: 54 minutes 29 seconds

Listed in: Technology

2017 Cybersecurity Outlook and 2016 Reflections CF034

Published: Jan. 2, 2017, 2:34 a.m.
Duration: 1 hour 2 minutes 22 seconds

Listed in: Technology

A Case Study in Webserver Malware for Admins and Users Alike CF033

Published: Dec. 3, 2016, 6:53 p.m.
Duration: 1 hour 6 minutes 14 seconds

Listed in: Technology

Reflection on Cyber Culture: Societal Impact and Living (In)Securely In the Modern Age CF032

Published: Sept. 16, 2016, 2:09 a.m.
Duration: 57 minutes 32 seconds

Listed in: Technology

DEFCON 24 CF031

Published: Aug. 17, 2016, 11:54 p.m.
Duration: 55 minutes 26 seconds

Listed in: Technology

IPv6 and What is Coming in the Future CF030

Published: Aug. 7, 2016, 4:05 p.m.
Duration: 1 hour 6 minutes 45 seconds

Listed in: Technology

Hands on with the Anonabox Pro CF029

Published: June 29, 2016, 2:02 a.m.
Duration: 1 hour 1 minute 57 seconds

Listed in: Technology

Tor and Anonymity: An Academic Introduction to the Dark Web CF028

Published: June 8, 2016, 2:01 a.m.
Duration: 56 minutes 1 second

Listed in: Technology

Cybersecurity Outlook for 2016, Emerging Threats, and the Era of Darwinian Security CF027

Published: Dec. 31, 2015, 3:48 a.m.
Duration: 1 hour 2 minutes 30 seconds

Listed in: Technology

Online Affairs, Female Chatbots, and A Mildly Unrelated DDoS Conversation CF026

Published: Sept. 5, 2015, 8:33 p.m.
Duration: 55 minutes 15 seconds

Listed in: Technology

Windows 10 Privacy Snafus, Cloud Security Dilemmas, and the birth of Mr. Robot CF025

Published: Aug. 23, 2015, 2:49 a.m.
Duration: 55 minutes 22 seconds

Listed in: Technology

Visualizing Cyberspace, Hacking Cars, and the Takeover of the Internet of Things CF024

Published: Aug. 1, 2015, 12:10 a.m.
Duration: 54 minutes 51 seconds

Listed in: Technology

Data Breaches of the 21st Century OPM Ripples through the FedGov CF023

Published: July 22, 2015, 12:48 a.m.
Duration: 44 minutes 51 seconds

Listed in: Technology

Open Everything: Adopting Cloud in the Enterprise w/ OpenSource, OpenStack, and OpenFlow CF022

Published: June 4, 2015, 12:24 a.m.
Duration: 1 hour 4 minutes 47 seconds

Listed in: Technology

Where is Big Data Headed Next on the Information Superhighway CF021

Published: May 31, 2015, 9:41 a.m.
Duration: 1 hour 3 minutes 43 seconds

Listed in: Technology

Data & Compute Challenges in Enterprise IT Environments CF020

Published: May 3, 2015, 2:09 a.m.
Duration: 1 hour 1 minute 2 seconds

Listed in: Technology

Innovative Hacker Marathons: Bitcamp 2015 CF019

Published: April 17, 2015, 12:22 a.m.
Duration: 42 minutes 58 seconds

Listed in: Technology

Cyber Roundtable with ACES Cybersecurity Students at UMD CF018

Published: Feb. 21, 2015, 4:59 p.m.
Duration: 51 minutes 29 seconds

Listed in: Technology

Cyber Legislation, Education, and A Healthy Dose of Realism with Special Guest Dr. Jim Purtilo – CF017

Published: Jan. 22, 2015, 2:26 a.m.
Duration: 1 hour 9 minutes 47 seconds

Listed in: Technology

Using Big Data and Graph Theory to Map the WWW – CF016

Published: Jan. 8, 2015, 5:26 a.m.
Duration: 1 hour 16 seconds

Listed in: Technology

Part 2: Exploring Big Data Through the Twitterverse – CF014

Published: Dec. 13, 2014, 9:23 p.m.
Duration: 1 hour 55 seconds

Listed in: Technology

Exploring Big Data Through the Twitterverse – CF013

Published: Nov. 27, 2014, 1:06 a.m.
Duration: 1 hour 5 minutes 29 seconds

Listed in: Technology

The Future of Cybersecurity Competition and Education with CEO of Cyber Skyline – Franz Payer – CF012

Published: Nov. 14, 2014, 5:50 a.m.
Duration: 1 hour 39 seconds

Listed in: Technology

Space Networks & Cybersecurity in Healthcare with Special Guest Jay Ellis – CF011

Published: Oct. 30, 2014, 1:56 a.m.
Duration: 1 hour 7 minutes 2 seconds

Listed in: Technology