This week on Cyber Frontiers Christian and Jim dive into ‘jedi mind tricks’ of AI, better known as adversarial machine learning. We narrate stories that tell tales of fooling the common systems that humans have come to rely on today, from maps to self driving cars, to airport scanners and identification systems. We discuss the… Click for more / Podcast Player>
This week on Cyber Frontiers Christian and Jim interview Franz Payer, CEO of Cyber Skyline (cyberskyline.com) to discuss their platform for training and developing the next generation of security professionals in the industry. We discuss the current challenges in the security education market and explore where Cyber Skyline fills a critical gap across three products… Click for more / Podcast Player>
This week on Cyber Frontiers Christian and Jim recap the latest major development in quantum research with Google’s “Quantum Supremacy” milestone. We review the headline narratives and compare today’s quantum progress with where we and others expected it to be. We delve into the tangentially related topic of cryptography, quickly leading to a walk through… Click for more / Podcast Player>
This week on Cyber Frontiers Christian and Jim recap security highlights from the past six weeks. We take a dive into the latest security challenges facing Windows 10, review the buzz around the Capital One breach, and jump into a variety of new tech from cell phone apps to detect pump skimmers to IBM’s unusual… Click for more / Podcast Player>
This week on Cyber Frontiers we catch up on some of the latest exploitations and availability drops on the web. We kick off with a discussion of the release of the TCP SACK panic as a new mechanism for DDoS via TCP protocol. We then cover a spectrum of relevant security news with the Microsoft… Click for more / Podcast Player>
This week on Cyber Frontiers Christian and Jim catch up on cyber anecdotes from our listeners! We start with a deep dive on the data breach website haveibeenpwned.com -- and discuss ways users can leverage the data and APIs to reduce their surface area and take advantage of security best practice. From here we tangent… Click for more / Podcast Player>