Tag: Cyber Security

Computing Without the B.S. – CF050

This week on Cyber Frontiers Christian and Jim discuss the computing industry without the bachelor’s degree (B.S.). We discuss the recently increasing trend of major tech companies doing away with degree requirements for top software engineering positions. We evaluate the pros and cons of university value propositions, co-ops/work studies, internships, and apprenticeships and discuss which… Continue reading

2018 Frontier Trends in Cybersecurity and Data Science – CF041

This week on Cyber Frontiers Jim and Christian discuss the upcoming predictions for where the cybersecurity and data science communities trend in 2018. What trends are new on the horizon, and which will only naturally accelerate trends already started? Will passwords finally bite the dust as MFA rules the day? Will AI march closer to… Continue reading

Cyber Legislation, Education, and A Healthy Dose of Realism with Special Guest Dr. Jim Purtilo – CF017

This week on Cyber Frontiers Christian, Ashton, and Jim catch up with Dr. Jim Purtilo (guest from Episode 3) to discuss historical and trending topics in cyber legislation, as well as many of the central issues surrounding cyber education in industry and academia. We explore some of the driving factors behind changes in mentality on… Continue reading

Using Big Data and Graph Theory to Map the WWW – CF016

This week Ashton and Christian kick off the new year by discussing plans to launch the first major cybersecurity research project on the development sandbox: mapping the internet with traceroute, distributed Nmap, and Hadoop. We discuss strategies and design challenges that will be present early on in development and potential solutions that may be employed.… Continue reading

Sony Hackers, Cyber Attackers, Data Breaches of 2014 and Sentiment Analysis Code To Let Us Know How Everyone Else Feels About It All – CF015

This week on Cyber Frontiers Ashton, Christian, and Jim have the conversation everyone else has been - Sony! We talk about what the Sony breach means for the cybersecurity field, and how it compares and contrasts to breaches of the past. We have some great conversation around what constitutes "damage" in a cyber breach, how… Continue reading