New Cyber Frontier - podcast cover

New Cyber Frontier

Logic Central Onlinenewcyberfrontier.podbean.com
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.

Episodes

NCF-336 Confidential Computing Explained

Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access...

Dec 05, 202332 minEp 341Transcript available on Metacast

NCF-334 Security Engineering for Industrial Systems

Welcome back, everybody, to NewCyberFrontier. In today's episode, guest Andrew Ginter, Vice President of Industrial Security and Waterfall Security. Mr Ginter is also the author of a book titled, "Engineering Grade OT Security: A Managers Guide." He defines his book as sitting at the intersection of industrial systems and Engineering. These systems could range from inputs and outputs from computer systems such as power plants, Shoe factories, and high-speed passenger train rails. Mr. Ginter expl...

Nov 13, 202331 minEp 339Transcript available on Metacast

NCF-333 EDGE Symposium Presentation

On today's episode of New Cyber Frontier, our host, Christopher Gorog, gives a special presentation on Blockframe at the Edge Symposium in Niskayuna, New York. Edge St, Bronx, NY 10465, " Amplifying profitable value from deployed IoT products," we learn to use Cybersecurity as a catalyst for profit. Gorog explains using a distributed trust to bring social and economic value to Blockframe customers, living up to the mission: "to enable customers to create resilient precision ecosystems for sustai...

Oct 03, 202320 minEp 338Transcript available on Metacast

NCF-332 Weaponized Documents and Content

Hello, Everybody, and welcome back to NewCyberFrontier. On today’s episode, we have guest Aviv Grafi, who is the CTO and founder of Votiro. Mr. Grafi talks about Weaponizing Documents and how they are getting more common and more dangerous, popping up in PDF files and Zip files. The best way to try to understand these attacks is to think like a hacker would think and try to protect yourself from future attacks by being vigilant of what you open. Learn more today on how you can protect yourself b...

Jul 24, 202333 minEp 337Transcript available on Metacast

NCF-330 High-risk is a Reality

On today's show, Samual Hill from Cyolo Security and Tim discuss High-Risk Access and the trends of corporations toward a more secure virtual ecosystem. With a background in the Emergency Room and an M.A. in Strategic Leadership, Samuel is passionate about helping organizations grow and protect themselves effectively in industries such as manufacturing, banking, financial services, insurance, and oil and gas. High Risk is still in today's headlines, and companies are starting to understand secur...

Jun 19, 202334 minEp 335Transcript available on Metacast

NCF-329 API Marketplace and business opportunities

Welcome back to NewCyberFrontier. In this video, we have guest Patrick Clawson CEO of an API Security Platform Called Resurface Labs. Mr. Clawson has extensive knowledge of Cybersecurity with twenty-plus years of experience. In this episode, we will review API modules and how only 11% are in the marketplace, leaving a gap for encrypted security. We will also be addressing how to start up a business in the cybersecurity world. Starting up a business, Patrick Clawson comes in for growth and focuse...

Jun 13, 202332 minEp 334Transcript available on Metacast

NCF-328 How fast is the Cloud Migration Moving

On today's show, Fausto Lendeborg and Tim discuss Cloud Platforms, Cloud migration, the speed of business objectives, and the organization's perspective. Fausto is the Co-Founder and CEO of Secberus, a Cloud Security Governance Platform designed to manage cloud risk at scale. With over 20 years of experience in cybersecurity, Fausto has been an integral part of multiple successful ventures, including Prolexic and Zenedge; Fausto now focuses on sharing his cloud governance, Security, and complian...

Jun 06, 202334 minEp 333Transcript available on Metacast

NCF-326 Cybersecurity Research

Welcome back to the show! Today we have guest Amit Serper Director of Security Research at Sternum. At Sternum, Mr. Serper is tasked with researching hardware or "Hardware Hacking," where he takes apart specific devices to gain access to them. Mr. Serpers say's, "Our approach to security at Sternum is, we know those devices are vulnerable for various reasons, but when developers write the code, we know they do not have security in mind. Our job is to understand the vulnerability that is on these...

May 15, 202340 minEp 332Transcript available on Metacast

NCF-325 Security as a Business Value Proposition

Welcome back to the show! Our Guest, Justin Beals , CEO and co-founder at Strike Graph, a 20+ year veteran, Background in Telco, and four different startups. Today we talk about a new era of turning security tools into a business value proposition, turning the advertising of security posture into marketing goods and services. Tune into this week's podcast episode. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy...

Apr 25, 202328 minEp 331Transcript available on Metacast

NCF-324 Cybersecurity for Everyone

I hope everyone enjoyed the break! In today's episode, we have guest Scott Schober , President and CEO of Berkeley Varitronics Systems and a Cyber Expert who has published three books on Cybersecurity. Mr. Schober has had multiple altercations with getting hacked and has extensive knowledge of this matter, saying, "I call it the Digital footprint; the more you put out there about yourself, your whereabouts, your likes, it creates a digital profile about you which leaves a trail of breadcrumbs ab...

Apr 18, 202339 minEp 330Transcript available on Metacast

NCF-323 Psychology of Trust Digitally

Welcome back to the show! In today's episode, we are accompanied by host Tim Montgomery and guest Chris Gorog, the CEO of Blockframe, a Blockchain company that uses Blockchain technology for privacy. In this episode, we will review the relationship of trust within the Internet, Cybersecurity, and the CIA. With millions of people, systems, and devices, we must have an efficient method to understand trust digitally. A mystery is where "We have to trust millions of devices without a human attachmen...

Apr 03, 202333 minEp 329Transcript available on Metacast

NCF-322 Critical infrastructure of Zero Trust

Write Up Welcome back to the show; today our host, Tim Montgomery, presents us with the release of the Executive Order of Cybersecurity and Critical infrastructure of Zero Trust. "Within agencies, they refer to zero trust to provide collections of concepts and ideas to minimize uncertainty, inforcing accuracy per request of access to information." (Montgomery.) Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations whi...

Mar 28, 202339 minEp 328Transcript available on Metacast

NCF-321 Part 2 of Zero Trust

Welcome back to the show. We are continuing our series of Zero Trust where we take interviews and get people's impressions at the Rocky Mountain Cyberspace symposium. Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another compan...

Mar 23, 20239 minEp 327Transcript available on Metacast

NCF-320 Zero Trust

Welcome back to the show. Today we have our three hosts, Tim Montgomery, Chris Gorog, and Dr. Shawn Murray, going over "Zero Trust." Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authent...

Mar 14, 202330 minEp 326Transcript available on Metacast

NCF-319 Cloud Security with Kubernetes

Today's NewCyberFrontier, guest Dr. Brian Smith , has founded several companies, TippingPoint Technologies Click Security, and most recently Spyderbat. Spyderbat is pioneer in cloud security using “Kubernetes which they believe is the latest step in the evolution of cloud” ( Brian Smith .) Kubernetes use short life cycle cloud containers monitoring the behavior of the container to determine when malicious activity might be enacted. The pretense is, by knowing the normal behavior we can spot the ...

Mar 07, 202334 minEp 325Transcript available on Metacast

NCF-IEEE12 Global Efforts in Digital Privacy

Welcome back to this episode of NewCyberFrontier. We Continue our IEEE series and the Initiative over Digital Privacy. Today our guest speaker is Dr. Stefano Zanero, a Cybersecurity Professor, a member of the ISSA Board of Directors, and a founding member of the Blackhat conference series. In today's discussion, why privacy? Dr. Zanero answers, "Authentication is the building block in the first chapter of any textbook, so we would think it is solved, but it's not." (Zanero.) Dr. Zanero stresses ...

Feb 28, 202331 minEp 324Transcript available on Metacast

NCF-317 Cybersecurity Buzz words

Welcome back to this episode of Just Talking! We have our two hosts, Tim Montgomery, and Chris Gorog. This episode covers many topics, including Cloud services and Buzz Words in the Cyber security industry. With cloud technology constantly evolving, giant companies like Amazon and Microsoft must keep them secure and invulnerable. "By 2025, 50% of data will be in the cloud between thousands of businesses and companies. Enjoy today's episode of Buzz Words! Visit our sponsors: BlockFrame Inc. IEEE ...

Feb 07, 202331 minEp 322Transcript available on Metacast

NCF-316 Recapping What We heard from our Guest in 2022

In this week's post, we are unpacking all the information we have heard from all our guests this past year, with our hosts Tim Montgomery and Chris Gorog. One topic we discuss in today’s podcast is whether businesses and organizations prioritize security as their primary focus. “ The role of the chief information security officer has come a long way in the past twenty-five years.” (Montgomery.) Businesses inform consumers that they have security in their products, software, and devices for secur...

Jan 31, 202332 minEp 321Transcript available on Metacast

NCF-315 FAA Grounding Incident

Welcome back to the show! We are brought to you by our three hosts, Chris Gorog, Tim Montgomery, and Shawn Murray. In today's episode, we are talking about the FAA incident earlier this week. “The FAA announced and grounded all flights in the United States due to a corrupted database file.” (Murray.) This was not a Cyber attack; instead just a corrupted file. It is reported that two contractors working for the FAA changed the system that was not scheduled nor implemented correctly, having to reb...

Jan 25, 202334 minEp 320Transcript available on Metacast

NCF-314 Status of Cybersecurity for Critical Infrastructure

In today’s Episode of New Cyber Frontier, we are going over the status of Critical Infrastructure. With thousands of new systems and devices all over the country in play over the last couple of decades, with little to no security, what does this mean for the future? These could include Air conditioning, heating, ventilation, Control systems, HVAC Systems, and much more that are interconnected in some way. Join us In this week's post. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murra...

Jan 18, 202331 minEp 319Transcript available on Metacast

NCF-313 The Future of Cybersecurity

Welcome back! We have both hosts, Dr. Shawn Murry and Chris Gorog discussing how Cybersecurity is adapting to the future. "It's been a year since Russia invaded Ukraine, and we are starting to see all the Cyber issues with warfare." (Murray.) Privacy was leaked with drones and personal mobile devices on both sides. As technology increases over the next couple of centuries, the internet and Cybersecurity will have to expand to protect personal data. Enjoy this Episode with our hosts and their int...

Jan 10, 202332 minEp 318Transcript available on Metacast

NCF-IEEE11 Applying Smart Contracts to the Energy Space.

Happy New Year! We have two guests in today's show: Tamara Hughes, Principal at TMH Ventures, LLC, and Umit Cali, Associate Professor of Energy Informatics ( AI & Blockchain) at NTNU. "The general objectives of a smart contract are to satisfy common contractual conditions such as payment terms and minimize the need for trusted intermediaries," (Tamara Huges.)This quote is the basis of Smart contracts and, to an extent, how they function. A smart contract is computer code; when given commands, it...

Jan 02, 202336 minEp 317Transcript available on Metacast

NCF-IEEE10 Advancements of Health Technology and Cybersecurity

Welcome back! In today's episode, we have guest Orlando Lopez, Ph.D., a Certified Project Manager who works for the National Institute of Health and the Department of Health and Human Services. Doctor Lopez works on multiple advanced technologies to help with Therapeutic Planning and Surgical Navigation Systems, along with other fabrication technologies which can help the production of personal devices that can be used at the operating table. With technology advancing, Cyber Security is needed f...

Dec 30, 202233 minEp 316Transcript available on Metacast

NCF-312 Understanding Those Starting in Cybersecurity.

In today's new edition of NewCyberFrontier, we are accompanied by Ryan Johnson, an intern at Murray Security Services. Ryan Johnson went to Pikes Peak Community College for Cybersecurity in Colorado Springs. One research project Mr. Johnson was operating on was a Vulnerability assessment of security issues. These issues range from many devices, apps, properties, and more. For example, apps can have malware with unsafe databases if installed, and security devices on homes can be taken advantage o...

Dec 13, 202234 minEp 315Transcript available on Metacast

NCF-IEEE9 Blockchain Security and Energy Transition

In this episode, we further our IEEE Blockchain and Transactive Energy series with guest Patrick Phelps, Founder and CEO at WHYGRENE. "The WHYGRENE vision can be distilled into three words; Decarbonized, Decentralized, and Digitized." Mr. Phelps's Incorporation deals with new regulations coming into the market, expressing that the grid has to evolve. These regulations are in play because of the government's demand for clean energy resources instead of finite fossil fuels. With plenty of challeng...

Dec 06, 202232 minEp 314Transcript available on Metacast

NCF-311 Business Strategies with CISO

In today's Podcast, we Have Jason Hicks, Field CISO at Coalfire. Jason Hicks has worked on the Technical and Business side at CISO. Mr. Hicks helps people transition from being a technical CISO to being a business leader with skills he has learned and delivers business strategies back to his community and other businesses. Enjoy today's Podcast of New Cyber Frontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services...

Nov 29, 202234 minEp 313Transcript available on Metacast

NCF-310 Security of Digital Footprints

In this episode of New Cyber Frontier, our host Tim Montgomery Speaks with Steve Ginty, Director of Threat Intelligence at RiskIQ. Steve Ginty gives his knowledge of Digital Security and protection against malware across the internet. Additionally, RiskIQ has partnered with Microsoft to work with the vulnerability of their exchange systems. Join us on today's episode of New Cyber Frontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy Murray Security Services...

Nov 22, 202229 minEp 312Transcript available on Metacast

NCF-IEEE8 Fielded Blockchain Energy Demonstrations

In this episode of New Cyber Frontier, we have two special guests. Sri Nikhil Gourisetti, master’s in systems engineering, Ph.D. Engineering Science. and Dr. James Kempf, Ph.D. in Systems engineering and Senior Consultant at Kempf and Associates. These professionals elaborate on their experience with IEE, Cybersecurity, Energy systems, Blockchain, and much more. In addition, these demonstrations touch on the international level of the value of the blockchain initiative. Sri gives insight into pr...

Nov 15, 202235 minEp 311Transcript available on Metacast

NCF-309 Department Of Defense Agent Conveys Security is Essential.

In today's episode, we have Christian Dalton, a professional in Counterintelligence for the United States Department Of Defense. Mr. Dalton gave us new tactics and procedures for Security today. "Tradecraft is limited to the imagination." However, Mr. Dalton expresses that tradecraft and business corporations constantly improve as technology advances and becomes more complicated. As these enhance, Security is an essential part of the process. Visit our sponsors: BlockFrame Inc. IEEE Digital Priv...

Nov 08, 202232 minEp 310Transcript available on Metacast

NCF-308 UCCS Ph.D. Graduate describes his Mastery of CyberSecurity

On today's podcast, we have Tobi Akanbi, UCCS Ph.D. Graduate 2020, who brings a different perspective on getting a Ph.D. with 10 years of experience in Security and Cyber Security. Tobi says “Between the time I joined UCCS to the time I graduated, I saw an extreme amount of Improvement.” Ph.D. Akanbi believe over the next five years this improvement will continue. He will also give us some tips and tricks on how to complete your Ph.D. program along the way. So join us as we embark on a journey t...

Nov 01, 202242 minEp 309Transcript available on Metacast
New Cyber Frontier podcast - Listen or read transcript on Metacast