This browser doesn't support Spotify Web Player. Switch browsers or download Spotify for your desktop.

Cyber Frontiers (Audio MP3)

By Jim Collison

Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!

  1. 1.
    AI Rising – CF05202/09/2019
    1:08:58
  2. 2.
    Crypto and Blockchain: Enablers of the Future – CF05111/17/2018
    1:14:00
  3. 3.
    Computing Without the B.S. – CF05010/17/2018
    1:07:16
  4. 4.
    Kill The Ancient Authenticator! – CF04909/27/2018
    1:03:24
  5. 5.
    AI In Everyday Life: Is It Ready for the Limelight? – CF04809/15/2018
    51:56
  6. 6.
    Highlights from DEFCON 26 – CF04708/21/2018
    55:28
  7. 7.
    The Modern Turing Test: A Brief History in ML and Some Cyber Anecdotes – CF04607/11/2018
    1:04:37
  8. 8.
    Difference between AI and ML, and How Does IoT Fit In Again? – CF04506/27/2018
    1:10:23
  1. 9.
    GDPR – What You Need to Know, RSA Conference Recap and Crypto Mining Update – CF04406/16/2018
    1:04:47
  2. 10.
    An Update on Meltdown and Spectre, ATM JackPotting and Christian Talks Crypto Currency – CF04302/10/2018
    1:04:44
  3. 11.
    Meltdown and Spectre: A Tear at the Foundation of Computer Security – CF04201/09/2018
    1:10:58
  4. 12.
    2018 Frontier Trends in Cybersecurity and Data Science – CF04112/22/2017
    1:08:33
  5. 13.
    Mobile Security Matters: Dissecting the Dangers of Mobile Malware – CF04011/29/2017
    1:21:25
  6. 14.
    DEFCON 2017 Recap and Macbook Wizardry – CF03908/17/2017
    50:04
  7. 15.
    Honey Haven: Creating Research HoneyPots In the Cloud – CF03808/05/2017
    54:44
  8. 16.
    Cyber Exploitation with SSRF & CMS Swiss Cheese – CF03707/18/2017
    1:05:04
  9. 17.
    On Cybersecurity and Ransomware – CF03606/30/2017
    1:07:05
  10. 18.
    Essential Cybersecurity Science with Josiah Dykstra – CF03502/21/2017
    54:36
  11. 19.
    2017 Cybersecurity Outlook and 2016 Reflections – CF03401/02/2017
    1:02:21
  12. 20.
    A Case Study in Webserver Malware for Admins and Users Alike – CF03312/03/2016
    1:06:13
  13. 21.
    Reflection on Cyber Culture: Societal Impact and Living (In)Securely In the Modern Age – CF03209/16/2016
    57:31
  14. 22.
    DEFCON 24 – CF03108/17/2016
    55:25
  15. 23.
    IPv6 and What is Coming in the Future – CF03008/07/2016
    1:06:45
  16. 24.
    Hands on with the Anonabox Pro – CF02906/29/2016
    1:02:06
  17. 25.
    Tor and Anonymity: An Academic Introduction to the Dark Web – CF02806/08/2016
    56:08
  18. 26.
    Cybersecurity Outlook for 2016, Emerging Threats, and the Era of Darwinian Security – CF02712/31/2015
    1:02:29
  19. 27.
    Online Affairs, Female Chatbots, and A Mildly Unrelated DDoS Conversation – CF02609/05/2015
    55:22
  20. 28.
    Windows 10 Privacy Snafus, Cloud Security Dilemmas, and the birth of Mr. Robot – CF02508/23/2015
    55:29
  21. 29.
    Visualizing Cyberspace, Hacking Cars, and the Takeover of the Internet of Things – CF02408/01/2015
    54:58
  22. 30.
    Data Breaches of the 21st Century – OPM Ripples through the FedGov – CF02307/22/2015
    44:57
  23. 31.
    Open Everything: Adopting Cloud in the Enterprise w/ OpenSource, OpenStack, and OpenFlow – CF02206/04/2015
    1:04:55
  24. 32.
    Where is Big Data Headed Next on the Information Superhighway – CF02105/31/2015
    1:03:52
  25. 33.
    Data & Compute Challenges in Enterprise IT Environments – CF02005/03/2015
    1:01:10
  26. 34.
    Innovative Hacker Marathons: Bitcamp 2015 – CF01904/17/2015
    43:04
  27. 35.
    Cyber Roundtable with ACES Cybersecurity Students at UMD – CF01802/21/2015
    51:36
  28. 36.
    Cyber Legislation, Education, and A Healthy Dose of Realism with Special Guest Dr. Jim Purtilo – CF01701/22/2015
    1:09:56
  29. 37.
    Using Big Data and Graph Theory to Map the WWW – CF01601/08/2015
    1:00:24
  30. 38.
    Sony Hackers, Cyber Attackers, Data Breaches of 2014 and Sentiment Analysis Code To Let Us Know How Everyone Else Feels About It All – CF01512/26/2014
    1:05:43
  31. 39.
    Part 2: Exploring Big Data Through the Twitterverse – CF01412/13/2014
    1:01:03
  32. 40.
    Exploring Big Data Through the Twitterverse – CF01311/27/2014
    1:05:38
  33. 41.
    The Future of Cybersecurity Competition and Education with CEO of Cyber Skyline – Franz Payer – CF01211/14/2014
    1:00:47
  34. 42.
    Space Networks & Cybersecurity in Healthcare with Special Guest Jay Ellis – CF01110/30/2014
    1:07:11
  35. 43.
    The Evolution of Cloud Computing and Security – CF01010/19/2014
    1:05:23
  36. 44.
    Building a Big Data Development Environment on the Cheap, Virtualization Tech & SDN, and the Big Bad ShellShock – CF00910/05/2014
    1:04:27
  37. 45.
    Finding a Learning Community in Cybersecurity – CF00809/17/2014
    1:06:34
  38. 46.
    Intrusion Detection, Threat Intelligence, and the Sophisticated Attacks in the Modern Cyber Landscape – CF00709/05/2014
    1:06:34
  39. 47.
    Getting Onboard with HTTPS, Big Data Tech and The Search for Talent in Data Analytics – CF00608/21/2014
    1:06:30
  40. 48.
    Preparing for the Next Generation of the Internet: IPv6 and The Internet of Things – CF00507/02/2014
    1:10:23
  41. 49.
    Cyber Entrepreneurs, Privacy Matters Pt. 2, Encryption Woes and the Controversy of Anonymity – CF00406/17/2014
    1:18:29
  42. 50.
    The Multi-Disciplinary Approach to Cybersecurity, Security Technologies, and the Privacy Issues Surrounding Us All – CF00304/19/2014
    1:05:35

Listen to Cyber Frontiers (Audio MP3) now.

Listen to Cyber Frontiers (Audio MP3) in full in the Spotify app