This week on Cyber Frontiers Christian and Jim talk about the zero trust security paradigm and how COVID-19 has drawn this security model into focus for the enterprise. As corporations accelerate technology adoption timelines to meet the demands of a remote workforce, cybersecurity practices and investments are evolving to secure employees and corporate assets in… Click for more / Podcast Player>
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) -… Click for more / Podcast Player>
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) -… Click for more / Podcast Player>
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) -… Click for more / Podcast Player>
Listen Mobile: Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Please leave a REVIEW (iPhone or iPad) -… Click for more / Podcast Player>
Listen Mobile: This week on Cyber Frontiers Christian and Jim are joined by special guest Jeremy Krach to provide the 2016 cybersecurity forecast. We first wrap-up 2015 by discussing the latest hack challenges and cybersecurity breaches, and then dive into what tools, technologies, and challenges will shape the evolution of cybersecurity over the next year.… Click for more / Podcast Player>