This browser doesn't support Spotify Web Player. Switch browsers or download Spotify for your desktop.

Cyber Frontiers

By Jim Collison

Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!

  1. 1.
    Zero Trust Security In a Pandemic Mindset – CF06309/05/2020
    1:00:41
  2. 2.
    Identity Theft Protection in 2020 – CF06204/23/2020
    1:09:24
  3. 3.
    COVID-19 Data Analytics – CF06103/26/2020
    1:08:17
  4. 4.
    Adversarial Machine Learning – CF06002/15/2020
    16:15
  5. 5.
    Security Education with Cyber Skyline – CF05912/17/2019
    59:37
  6. 6.
    Quantum Supremacy and the Cryptology Time Machine – CF05811/10/2019
    59:16
  7. 7.
    Cyber Anecdotes: A Tale of Worms, Shared Security, and More – CF05708/22/2019
    58:05
  8. 8.
    The Manifestation of New Exploitation – CF05606/22/2019
    1:11:35
  1. 9.
    Data Breach SecOps, Reputations, and IoT Security – CF05505/04/2019
    1:03:25
  2. 10.
    Quantum, Cyber, Oh My! The Best of RSA 2019 – CF05403/13/2019
    1:10:46
  3. 11.
    Containers Gone Wild – CF05302/23/2019
    50:15
  4. 12.
    AI Rising – CF05202/09/2019
    1:08:58
  5. 13.
    Crypto and Blockchain: Enablers of the Future – CF05111/17/2018
    1:14:00
  6. 14.
    Computing Without the B.S. – CF05010/17/2018
    1:07:16
  7. 15.
    Kill The Ancient Authenticator! – CF04909/27/2018
    1:03:24
  8. 16.
    AI In Everyday Life: Is It Ready for the Limelight? – CF04809/15/2018
    51:56
  9. 17.
    Highlights from DEFCON 26 – CF04708/21/2018
    55:28
  10. 18.
    The Modern Turing Test: A Brief History in ML and Some Cyber Anecdotes – CF04607/11/2018
    1:04:37
  11. 19.
    Difference between AI and ML, and How Does IoT Fit In Again? – CF04506/27/2018
    1:10:23
  12. 20.
    GDPR – What You Need to Know, RSA Conference Recap and Crypto Mining Update – CF04406/16/2018
    1:04:47
  13. 21.
    An Update on Meltdown and Spectre, ATM JackPotting and Christian Talks Crypto Currency – CF04302/10/2018
    1:04:44
  14. 22.
    Meltdown and Spectre: A Tear at the Foundation of Computer Security – CF04201/09/2018
    1:10:58
  15. 23.
    2018 Frontier Trends in Cybersecurity and Data Science – CF04112/22/2017
    1:08:33
  16. 24.
    Mobile Security Matters: Dissecting the Dangers of Mobile Malware – CF04011/29/2017
    1:21:25
  17. 25.
    DEFCON 2017 Recap and Macbook Wizardry – CF03908/17/2017
    50:04
  18. 26.
    Honey Haven: Creating Research HoneyPots In the Cloud – CF03808/05/2017
    54:44
  19. 27.
    Cyber Exploitation with SSRF & CMS Swiss Cheese – CF03707/18/2017
    1:05:04
  20. 28.
    On Cybersecurity and Ransomware – CF03606/30/2017
    1:07:05
  21. 29.
    Essential Cybersecurity Science with Josiah Dykstra – CF03502/21/2017
    54:36
  22. 30.
    2017 Cybersecurity Outlook and 2016 Reflections – CF03401/02/2017
    1:02:21
  23. 31.
    A Case Study in Webserver Malware for Admins and Users Alike – CF03312/03/2016
    1:06:13
  24. 32.
    Reflection on Cyber Culture: Societal Impact and Living (In)Securely In the Modern Age – CF03209/16/2016
    57:31
  25. 33.
    DEFCON 24 – CF03108/17/2016
    55:25
  26. 34.
    IPv6 and What is Coming in the Future – CF03008/07/2016
    1:06:45
  27. 35.
    Hands on with the Anonabox Pro – CF02906/29/2016
    1:02:06
  28. 36.
    Tor and Anonymity: An Academic Introduction to the Dark Web – CF02806/08/2016
    56:08
  29. 37.
    Cybersecurity Outlook for 2016, Emerging Threats, and the Era of Darwinian Security – CF02712/31/2015
    1:02:29
  30. 38.
    Online Affairs, Female Chatbots, and A Mildly Unrelated DDoS Conversation – CF02609/05/2015
    55:22
  31. 39.
    Windows 10 Privacy Snafus, Cloud Security Dilemmas, and the birth of Mr. Robot – CF02508/23/2015
    55:29
  32. 40.
    Visualizing Cyberspace, Hacking Cars, and the Takeover of the Internet of Things – CF02408/01/2015
    54:58
  33. 41.
    Data Breaches of the 21st Century – OPM Ripples through the FedGov – CF02307/22/2015
    44:57
  34. 42.
    Open Everything: Adopting Cloud in the Enterprise w/ OpenSource, OpenStack, and OpenFlow – CF02206/04/2015
    1:04:55
  35. 43.
    Where is Big Data Headed Next on the Information Superhighway – CF02105/31/2015
    1:03:52
  36. 44.
    Data & Compute Challenges in Enterprise IT Environments – CF02005/03/2015
    1:01:10
  37. 45.
    Innovative Hacker Marathons: Bitcamp 2015 – CF01904/17/2015
    43:04
  38. 46.
    Cyber Roundtable with ACES Cybersecurity Students at UMD – CF01802/21/2015
    51:36
  39. 47.
    Cyber Legislation, Education, and A Healthy Dose of Realism with Special Guest Dr. Jim Purtilo – CF01701/22/2015
    1:09:56
  40. 48.
    Using Big Data and Graph Theory to Map the WWW – CF01601/08/2015
    1:00:24
  41. 49.
    Sony Hackers, Cyber Attackers, Data Breaches of 2014 and Sentiment Analysis Code To Let Us Know How Everyone Else Feels About It All – CF01512/26/2014
    1:05:43
  42. 50.
    Part 2: Exploring Big Data Through the Twitterverse – CF01412/13/2014
    1:01:03

Listen to Cyber Frontiers now.

Listen to Cyber Frontiers in full in the Spotify app