Category: Cyber Frontiers

Innovative Hacker Marathons: Bitcamp 2015 – CF019

This week on Cyber Frontiers, Christian is joined by Ashton, Jim, and special guest Jeremy Krach live from the floor of Bitcamp - one of the largest hackathons on college campuses in the USA. Albeit technical difficulties, we get behind the scenes access to Bitcamp and covered the opening of the event. If you've never… Click for more / Podcast Player>

Cyber Roundtable with ACES Cybersecurity Students at UMD – CF018

This week on cyber frontiers Jim Collison comes to D.C. to join Christian and Ashton for a cyber roundtable conversation. We chat with students in the ACES cybersecurity program at the University of Maryland to gain their perspective on the state of the industry, educating students in the field, and potential future career paths for… Click for more / Podcast Player>

Cyber Legislation, Education, and A Healthy Dose of Realism with Special Guest Dr. Jim Purtilo – CF017

This week on Cyber Frontiers Christian, Ashton, and Jim catch up with Dr. Jim Purtilo (guest from Episode 3) to discuss historical and trending topics in cyber legislation, as well as many of the central issues surrounding cyber education in industry and academia. We explore some of the driving factors behind changes in mentality on… Click for more / Podcast Player>

Using Big Data and Graph Theory to Map the WWW – CF016

This week Ashton and Christian kick off the new year by discussing plans to launch the first major cybersecurity research project on the development sandbox: mapping the internet with traceroute, distributed Nmap, and Hadoop. We discuss strategies and design challenges that will be present early on in development and potential solutions that may be employed.… Click for more / Podcast Player>

Sony Hackers, Cyber Attackers, Data Breaches of 2014 and Sentiment Analysis Code To Let Us Know How Everyone Else Feels About It All – CF015

This week on Cyber Frontiers Ashton, Christian, and Jim have the conversation everyone else has been - Sony! We talk about what the Sony breach means for the cybersecurity field, and how it compares and contrasts to breaches of the past. We have some great conversation around what constitutes "damage" in a cyber breach, how… Click for more / Podcast Player>

Part 2: Exploring Big Data Through the Twitterverse – CF014

This week Ashton and Christian continue their exploration of Big Data through tweets around the world using Twitter's Streaming API. In particular, Christian walks through improvements to his starter kit, showing how to manipulate and filter tweets, as well as do the classic Word Count example using tweets and hashtags. Ashton walks us through how… Click for more / Podcast Player>