This week on Cyber Frontiers Christian and Jim are joined by special guest Jeremy Krach to provide the 2016 cybersecurity forecast. We first wrap-up 2015 by discussing the latest hack challenges and cybersecurity breaches, and then dive into what tools, technologies, and challenges will shape the evolution of cybersecurity over the next year. We also look at how the cybersecurity threat space will change and whether or not corporations and individuals are prepared to combat it. It’s a holiday special you won’t want to miss!
Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does.
Please leave a REVIEW (iPhone or iPad) – https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewContentsUserReviews?id=857124890&type=Podcast&ls=1&mt=1
Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy
You can contact us via email at email@example.com or call in your questions or comments to be played on the show at (402) 478-8450
Full show notes and video at http://theAverageGuy.tv/cf027
- Latest and greatest from SANS annual Holiday Hack team
- Heavy traffic or actual attack?
- Caching issue allows viewing of other accounts
- More details
James Clapper, the director of national intelligence, said the biggest emerging threat to national security is “cyber operations that will change or manipulate electronic information in order to compromise its integrity instead of deleting or disrupting access to it.”
–Thanks for the heads up Randy Cantrell
-Rise of machine to machine attacks
-Use of ghostware to conceal attacks
-The emergence of “headless” malware
- The privacy tug-of-war between individuals and organizations has become a tug with no war.
- Exponential growth in the Internet of Things over the past two years creates a larger cyberattack surface, but consumers have yet to prove they want or will pay for a more secure IoT device
- The digital economy is growing more complex while a lack of highly trained security workers persists worldwide
- Cyber espionage shows no sign of abating
-Strategic data manipulation and disruption
-Increasing attacks on application service providers
-Hacktivism and the attack surface
-Industrial control systems pushed to the breaking point
-Shake-out of the security industry
Jim’s Twitter: http://twitter.com/#!/jcollison
Contact Christian: firstname.lastname@example.org
Contact the show at email@example.com
Find this and other great Podcasts from the Average Guy Network at http://theaverageguy.tv