Cyber Frontiers

By Jim Collison

Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!

  1. 1.
    Liviu Arsene from Bitdefender talks Bitdefender Box and Bitdefender Premium VPN – CF064
    55:41
  2. 2.
    Zero Trust Security In a Pandemic Mindset – CF063
    1:00:41
  3. 3.
    Identity Theft Protection in 2020 – CF062
    1:09:24
  4. 4.
    COVID-19 Data Analytics – CF061
    1:08:17
  5. 5.
    Adversarial Machine Learning – CF060
    16:15
  6. 6.
    Security Education with Cyber Skyline – CF059
    59:37
  7. 7.
    Quantum Supremacy and the Cryptology Time Machine – CF058
    59:16
  8. 8.
    Cyber Anecdotes: A Tale of Worms, Shared Security, and More – CF057
    58:05
  1. 9.
    The Manifestation of New Exploitation – CF056
    1:11:35
  2. 10.
    Data Breach SecOps, Reputations, and IoT Security – CF055
    1:03:25
  3. 11.
    Quantum, Cyber, Oh My! The Best of RSA 2019 – CF054
    1:10:46
  4. 12.
    Containers Gone Wild – CF053
    50:15
  5. 13.
    AI Rising – CF052
    1:08:58
  6. 14.
    Crypto and Blockchain: Enablers of the Future – CF051
    1:14:00
  7. 15.
    Computing Without the B.S. – CF050
    1:07:16
  8. 16.
    Kill The Ancient Authenticator! – CF049
    1:03:24
  9. 17.
    AI In Everyday Life: Is It Ready for the Limelight? – CF048
    51:56
  10. 18.
    Highlights from DEFCON 26 – CF047
    55:28
  11. 19.
    The Modern Turing Test: A Brief History in ML and Some Cyber Anecdotes – CF046
    1:04:37
  12. 20.
    Difference between AI and ML, and How Does IoT Fit In Again? – CF045
    1:10:23
  13. 21.
    GDPR – What You Need to Know, RSA Conference Recap and Crypto Mining Update – CF044
    1:04:47
  14. 22.
    An Update on Meltdown and Spectre, ATM JackPotting and Christian Talks Crypto Currency – CF043
    1:04:44
  15. 23.
    Meltdown and Spectre: A Tear at the Foundation of Computer Security – CF042
    1:10:58
  16. 24.
    2018 Frontier Trends in Cybersecurity and Data Science – CF041
    1:08:33
  17. 25.
    Mobile Security Matters: Dissecting the Dangers of Mobile Malware – CF040
    1:21:25
  18. 26.
    DEFCON 2017 Recap and Macbook Wizardry – CF039
    50:04
  19. 27.
    Honey Haven: Creating Research HoneyPots In the Cloud – CF038
    54:44
  20. 28.
    Cyber Exploitation with SSRF & CMS Swiss Cheese – CF037
    1:05:04
  21. 29.
    On Cybersecurity and Ransomware – CF036
    1:07:05
  22. 30.
    Essential Cybersecurity Science with Josiah Dykstra – CF035
    54:36
  23. 31.
    2017 Cybersecurity Outlook and 2016 Reflections – CF034
    1:02:21
  24. 32.
    A Case Study in Webserver Malware for Admins and Users Alike – CF033
    1:06:13
  25. 33.
    Reflection on Cyber Culture: Societal Impact and Living (In)Securely In the Modern Age – CF032
    57:31
  26. 34.
    DEFCON 24 – CF031
    55:25
  27. 35.
    IPv6 and What is Coming in the Future – CF030
    1:06:45
  28. 36.
    Hands on with the Anonabox Pro – CF029
    1:02:06
  29. 37.
    Tor and Anonymity: An Academic Introduction to the Dark Web – CF028
    56:08
  30. 38.
    Cybersecurity Outlook for 2016, Emerging Threats, and the Era of Darwinian Security – CF027
    1:02:29
  31. 39.
    Online Affairs, Female Chatbots, and A Mildly Unrelated DDoS Conversation – CF026
    55:22
  32. 40.
    Windows 10 Privacy Snafus, Cloud Security Dilemmas, and the birth of Mr. Robot – CF025
    55:29
  33. 41.
    Visualizing Cyberspace, Hacking Cars, and the Takeover of the Internet of Things – CF024
    54:58
  34. 42.
    Data Breaches of the 21st Century – OPM Ripples through the FedGov – CF023
    44:57
  35. 43.
    Open Everything: Adopting Cloud in the Enterprise w/ OpenSource, OpenStack, and OpenFlow – CF022
    1:04:55
  36. 44.
    Where is Big Data Headed Next on the Information Superhighway – CF021
    1:03:52
  37. 45.
    Data & Compute Challenges in Enterprise IT Environments – CF020
    1:01:10
  38. 46.
    Innovative Hacker Marathons: Bitcamp 2015 – CF019
    43:04
  39. 47.
    Cyber Roundtable with ACES Cybersecurity Students at UMD – CF018
    51:36
  40. 48.
    Cyber Legislation, Education, and A Healthy Dose of Realism with Special Guest Dr. Jim Purtilo – CF017
    1:09:56
  41. 49.
    Using Big Data and Graph Theory to Map the WWW – CF016
    1:00:24
  42. 50.
    Sony Hackers, Cyber Attackers, Data Breaches of 2014 and Sentiment Analysis Code To Let Us Know How Everyone Else Feels About It All – CF015
    1:05:43

Listen to Cyber Frontiers now.

Listen to Cyber Frontiers in full in the Spotify app