Tag: Cyber Frontiers

Cyber Fronters Podcast Logo

Adversarial Machine Learning – CF060

This week on Cyber Frontiers Christian and Jim dive into ‘jedi mind tricks’ of AI, better known as adversarial machine learning. We narrate stories that tell tales of fooling the common systems that humans have come to rely on today, from maps to self driving cars, to airport scanners and identification systems. We discuss the… Click for more / Podcast Player>
Cyber Fronters Podcast Logo

Security Education with Cyber Skyline – CF059

This week on Cyber Frontiers Christian and Jim interview Franz Payer, CEO of Cyber Skyline (cyberskyline.com) to discuss their platform for training and developing the next generation of security professionals in the industry. We discuss the current challenges in the security education market and explore where Cyber Skyline fills a critical gap across three products… Click for more / Podcast Player>
Cyber Fronters Podcast Logo

Quantum Supremacy and the Cryptology Time Machine – CF058

This week on Cyber Frontiers Christian and Jim recap the latest major development in quantum research with Google’s “Quantum Supremacy” milestone. We review the headline narratives and compare today’s quantum progress with where we and others expected it to be. We delve into the tangentially related topic of cryptography, quickly leading to a walk through… Click for more / Podcast Player>

Cyber Anecdotes: A Tale of Worms, Shared Security, and More – CF057

This week on Cyber Frontiers Christian and Jim recap security highlights from the past six weeks. We take a dive into the latest security challenges facing Windows 10, review the buzz around the Capital One breach, and jump into a variety of new tech from cell phone apps to detect pump skimmers to IBM’s unusual… Click for more / Podcast Player>

Data Breach SecOps, Reputations, and IoT Security – CF055

This week on Cyber Frontiers Christian and Jim catch up on cyber anecdotes from our listeners! We start with a deep dive on the data breach website haveibeenpwned.com -- and discuss ways users can leverage the data and APIs to reduce their surface area and take advantage of security best practice. From here we tangent… Click for more / Podcast Player>