Cyber Frontiers

Exploring Big Data Through the Twitterverse – CF013

This week Ashton and Christian begin an exciting, multi-part series on how to leverage big data technologies to learn new skills in data analytics using one of the world’s cheapest and largest value data sources – tweets! We take a look at the Twitter Streaming API, techniques for collecting and storing these data sets, and basic visualization exercises in Java and HTML5. We also take a look at some automated Twitter interactions using Python scripting and basic rule sets. This is a great show to follow along with on our video feed if you typically are an audio-only listener. We’ll pick-up with how this project integrates with the data analytics sandbox we built and discussed in previous episodes. There is something for everyone in this conversation. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Listen Mobile:   This week Christian, Ashton, and their host Jim take a look at some of the opportunities to process Tweets using real time #160; Demonstrations include a letter count for tweets as well as a geolocation application, illustrating a small example of how Tweets can be used to create interesting pictures of the world around us. Register an application here so that you can gain access to the API. The Java library to interface with the Twitter API. This article was particularly helpful in coming up with the storm topology.   Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Cyber Frontiers

Space Networks & Cybersecurity in Healthcare with Special Guest Jay Ellis – CF011

This week we are joined by Jay Ellis, Senior Information Security Engineer and Program Manager at Stinger Ghaffarian Technologies (SGT), to talk about space networks, healthcare IT, and the networks and cybersecurity methodologies that run them. Jim, Christian, and Ashton keep the questions rolling in what promises to be a packed hour of content based on Jay’s experiences in the field. Mr. Ellis is a seasoned information technology professional with over 25 years of professional experience in the analysis, design, development, project management, and security of information systems. He currently holds several industry-standard information technology certifications, and has a proven and effective track record for designing and implementing secure systems on-time and under budget. His areas of expertise include information security, healthcare information technology, technical project management, database design/ implementation/ administration, web-based development, and multi-tier application architecture. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Listen Mobile:     Make sure to tweet out your thoughts about this show using the hashtag “#cyberFrontiers”! SGSS Overview SGSS company page nCircle/IP360 Application 2012 CMS Cybersecurity Innovation Award Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: /  Some links may contain affiliate codes that benefit the Average Guy Podcast Network. Ashton Webster, Christian Johnson, Cloud, containers, docker, Jim Collison, Security, VM’s
Continue Reading »
Cyber Frontiers

Building a Big Data Development Environment on the Cheap, Virtualization Tech & SDN, and the Big Bad ShellShock – CF009

This week on Cyber Frontiers, Christian Johnson and Ashton Webster, joined by Jim Collison, talk about how to setup a multi-node distributed Hadoop cluster on a single box. The discussion on the technology quickly dives into newer technology in virtualization in SDN, and we even get a little bit of time to talk about the relevancy of the shellshock news to our big data research on the show. This should be a treat to newcomers in the big data space as well as veteran data geeks! Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Listen Mobile:     CYBERSECURITY Why the internet is broken The actual code which you can use (if you have shell access) to test a machine for the vulnerability Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: /  Some links may contain affiliate codes that benefit the Average Guy Podcast Network.
Continue Reading »
Home Gadget Geeks

Amber Gott from LastPass, Heartbleed Checker Tool, Multi-Factor Authenication Options, New Android App – HGG173

Amber Gott (@lastpass), Online Community Managerfor Last Pass () joins Jim (@jcollison) and for show #173 of Home Tech Podcast brought to you by the Average Guy Network, part of community. Amber covers what’s new at LastPass, including a move with new offices and space.  What happen during the Heartbleed outbreak and what you can do to secure your passwords better.  There are also some new Multifactor Options with LastPass and a new Android App as well.  All here on Home Gadget Geeks Support the Average Guy Tech Scholarship Fund: Join us for the show live each Thursday at 8pmC/9E/1UTC at or call in your questions or comments to be played on the show at (402) 478-8450 Listen Mobile:     Get more information on LastPass at and What was Heartbleed – LastPass Heartbleed Checker Tool – Home Tech 155 with LastPass – Rich’s Random Podcast Generator #20 – LastPass Blog – Multifactor Options – Yubico – Toopher – Duo Security – From Amber about Android being able to automatically add your new sites to the vault – To answer your question about saving sites / app logins from the Android – LastPass can’t detect that automatically. So it will have to be added either via the desktop or via the mobile app itself with the manual “add site” option in the menu on the top-right. Home Server Show Meetup in Indy – Sep 20 – register Subscribe to Cyber Frontiers –   Facebook Page:  Facebook Group: If you’d like to subscribe to the show, click on to update your iTunes library, or for other Podcast downloading applications, please click on the RSS Feed and pick your Pod Catcher of choice! Or, you can now stream the show online at at Jim’s Twitter: #!/jcollison Contact the show at Find us on Facebook: Find this and other great Podcasts from the Average Guy Network at Some links may contain affiliate codes that benefit the Average Guy Podcast Network.
Continue Reading »
Home Gadget Geeks

Catching Up with Christian After His First Year at University of Maryland – HT170

Christian Johnson joins Jim (@jcollison) for show #170 of Home Gadget Geeks brought to you by the Average Guy Network, part of   Christian has had a very busy spring and hasn’t been on the show in a while.  News of the data breach broke in February 2014 and Christian was selected to be on the Presidents Task Force on Cyber Security at University of Maryland.  A complete outline of the events can be found at Support the Average Guy Tech Scholarship Fund: Join us for the show live each Thursday at 8pmC/9E/1UTC at or call in your questions or comments to be played on the show at (402) 478-8450 Listen Mobile:   Christian mentioned that the full report from UMD would be out in June. What are we doing with mobile device security?  Security behind IVp6 with Cell Phones and Smart Phones?  Christian says there is plenty of work that needs to be done here in the future.  His big question is who is going to make Cyber Security a black and while solution in a world where things are still many shades of grey. How do you become the most efficient person in your network of influence to those around you? How do we take the human engineering element out of the equation?  Focus on id the human factors ahead of the event. More training and education need to be done with people and not necessarily better systems.  Knowing who the attackers are is more effective in most cases.  Who are the human actors? What was the biggest surprise for Christian this year?  He didn’t expect to get so involved in the Cyber Security issues that were going on at the University of Maryland.  He also liked the fact that he didn’t get pulled into just the technical aspect of Cyber Security.  Being able to learn how the process work and a changing of the playing field around personal security made a difference.  Learning that the privacy laws in the EU are very different than those here in the US was an important lesson.  How did those processes develop so differently? So what can the Average Guy do to improve there cyber security footprint? 1.  Pay attention to Cookies – the managing of cookies in the web browser has become important.  Some browsers and merging the browser settings and combine it to make one large string and create a unique ID for you.  He suggested to see. 2.  There are things that can be done to limit the information that is making its way out via social sharing sites.  GPS tags on pictures were a good example.  Young Americans are using apps like Instagram and Snapchat that shares the exact location.  Profiles can be build from there. We also talked about that the idea that your PII info like Social Security Number and addresses are still private might now be realistic.  Additional systems will need to be put in place to protect yourself knowing that info is most likely already out there. Christian’s favorite class this year?  Brand new buildings are opening at ACES University of Maryland for next year.  Christian however thinks that freshmen should have to spend the first year in the old dorms in order to better appreciate the new facilities.  Laundry rooms and every floor and both social and quite meeting rooms are also a perk. Christian is now working for Gallup as an Software Developer Intern for the summer working with Paul Allen. Show Links: 2014 Home Server Show / Meetup Info – Cyber Frontiers – Presidents Task Force on Cyber Security at University of Maryland – Mock 37 – ACES program at the University of Maryland – and the staff page   Facebook Page:  Facebook Group: If you’d like to subscribe to the show, click on to update your iTunes library, or for other Podcast downloading applications, please click on the RSS Feed and pick your Pod Catcher of choice! Or, you can now stream the show online at at The Show Announcements and Schedule: #!/TheAverageGuyTV Jim’s Twitter: #!/jcollison Contact the show at Find us on Facebook: Find this and other great Podcasts from the Average Guy Network at Some links may contain affiliate codes that benefit the Average Guy Podcast Network.
Continue Reading »
LIVE

Ken Carnes from OPPD talks about Leveraging the New Cybersecurity Framework – Infotec 2014

  Jim Collison is an employee of Gallup Inc. in Omaha Nebraska. Find out more about Gallup Careers at , and start your strengths journey at These videos were created in partnership with AIM, Gallup and Kenneth Carnes from Omaha Public Power District intends to get you questioning how you plan and communicate cyber response and risk. By converging risk management, incident response and organizational communication into the recently released Cybersecurity Framework he feels you can manage it all. Ken will focus on cyber risk from the practitioner to the board room, and ask the question “Is it time to consider a ‘counter-blitz’ of how we look at and perform risk management, incident response and communication of your cyber program?” Ken is an IT professional that has spent his career designing and implementing technology to enable business. Ken has made the full cycle through IT roles on his route to Cybersecurity, he currently manages Cybersecurity at Omaha Public Power District. Ken spent his career focused in the utility business spending time at both the state’s nuclear generation facilities. He currently focuses on organizational cyber risk by keeping a business perspective on all cyber controls. OPPD has regulatory oversight from various entities including PCI (Payment Card Industry), NERC (North American Electric Reliability Corporation) and NRC (Nuclear Regulatory Commission) as a significant support system for various other CPI (Critical Physical Infrastructure) OPPD focuses on service delivery and quality of service. OPPD is constantly looking for methods to improve security as the threat scope finds new avenues to be destructive or damaging. Jim’s Twitter: #!/jcollison Contact Jim at
Continue Reading »
Cyber Frontiers

The Multi-Disciplinary Approach to Cybersecurity, Security Technologies, and the Privacy Issues Surrounding Us All – CF003

Christian Johnson joins Jim (@jcollison) for show #3 of Cyber Frontiers brought to you by the Average Guy Network. Attention: This is the last time Cyber Frontiers will be the Home Gadget Geeks feed.  Subscribe on iTunes at or RSS at or on Stitcher at Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does.  Never on a schedule, but always up to date! You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Listen Mobile:   Special Guest: Dr. Jim Purtilo – Associate Professor of Computer Science at the University of Maryland, College Park While Dr. Purtilo is an associate professor of computer science, he is also an expert in privacy interests, and other academic programs in business Highlights from the Show: – What are the multi-disciplinary aspects of cybersecurity? Where are the overlaps in academic disciplines that are relevant to answering modern challenges in cybersecurity? – Crowd sourcing, software engineering, and how it pertains to cybersecurity. – Big data – how does it relate to cybersecurity, and how is it shaping the privacy issues in the modern tech era? – What is the value of journalism in privacy and cybersecurity? What role does journalism play in influencing privacy law in the Tools for Privacy on the Web from Dr. Purtilo Ad-block Plus for Firefox – – Gives you more than blocking adds, but allows filtering other objects of the DOM (Document Object Model) which might be hiding in web pages you visit. Block Site for Firefox – There are tools to help you with proxy servers – not interested in naming any in particular – but generally you should have care not to trust such servers unless they are ones you run for yourself. On top of that, User Agent Switcher is probably the simplest I’ve found for toying with browser signatures. Try avoiding a browser entirely sometimes – For example, some Python scripting with excellent packages like Beautiful Soup will let you manipulate traffic from a variety of hosts not necessarily where you happen to be sitting. They take some getting used to in order to manage sessions and track cookies, but a bit of investment of effort to learn how that works can pay off. All that becomes even more useful if you do it through tunnels – but know the limits of those too, since you can slip just ONCE accessing the wrong site, using a standard browser on local machine which will supply your regular host signatures, and it won’t matter what tunnel, VPN or other bit of tasteful indirection you once enjoyed, you’ve left a breadcrumb that connects new traffic to the old in a way that anyone examining a log – in particular some trace tool – can see immediately. Support the Average Guy Tech Scholarship Fund: Facebook Page:  Facebook Group: Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »