Category: Cyber Frontiers

Crypto and Blockchain: Enablers of the Future – CF051

This week on Cyber Frontier Christian dives into the state of affairs in the cryptocurrency battle for adopters and the ultimate future of blockchain. We discuss some of the origins of what made Bitcoin popular and misunderstood, while re-tracing how it enabled blockchain technology to gain stronger visibility in the eyes of technologists. From here… Click for more / Podcast Player>

Computing Without the B.S. – CF050

This week on Cyber Frontiers Christian and Jim discuss the computing industry without the bachelor’s degree (B.S.). We discuss the recently increasing trend of major tech companies doing away with degree requirements for top software engineering positions. We evaluate the pros and cons of university value propositions, co-ops/work studies, internships, and apprenticeships and discuss which… Click for more / Podcast Player>

Kill The Ancient Authenticator! – CF049

This week Christian is joined by Jim to talk about killing off password security on web and communication platforms, a.k.a. the era of the hardware authenticator! We dive deep into the release of the Yubikey 5, FIDO 2, and Webauthn standards and how these platforms and standards will usher in the next phase of improved… Click for more / Podcast Player>

AI In Everyday Life: Is It Ready for the Limelight? – CF048

This week on Cyber Frontiers Christian is joined by Jim to discuss common AI applications influencing everyday life. We take a look at the latest learning technology in discerning fake news, facial recognition at airports, and driverless cars in the Uber and Lyft fleets. We weigh in on what empirical methods are available for validating… Click for more / Podcast Player>

Highlights from DEFCON 26 – CF047

This week on Cyber Frontiers Christian and Jim get together to talk about the highlights from DEFCON 26. We dive deep into how voicemails and SMS-unlocks are being used to bypass two-factor authentication on common technology platforms -- and how simple attack surfaces are exploited to turn the old tech of voicemails into eye-candy for… Click for more / Podcast Player>