New Cyber Frontier
by Logic Central OnlineBringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
Copyright: Copyright 2016 All rights reserved.
Episodes
NCF-322 Critical infrastructure of Zero Trust
38m · PublishedWrite Up Welcome back to the show; today our host, Tim Montgomery, presents us with the release of the Executive Order of Cybersecurity and Critical infrastructure of Zero Trust. "Within agencies, they refer to zero trust to provide collections of concepts and ideas to minimize uncertainty, inforcing accuracy per request of access to information." (Montgomery.) Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic? Tune in to the episode of NewCyberFrontier.
Visit our sponsors:
BlockFrame Inc.
IEEE Digital Privacy
NCF-321 Part 2 of Zero Trust
9m · PublishedWelcome back to the show. We are continuing our series of Zero Trust where we take interviews and get people's impressions at the Rocky Mountain Cyberspace symposium. Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Enjoy this episode of NewCyberFrontier
Visit our sponsors:
BlockFrame Inc.
IEEE Digital Privacy
NCF-320 Zero Trust
29m · PublishedWelcome back to the show. Today we have our three hosts, Tim Montgomery, Chris Gorog, and Dr. Shawn Murray, going over "Zero Trust." Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "How do we trust someone we are doing e-commerce with, on the other side of the planet? How do we trust another company? How do we trust data is authentic?" (Chris Gorog.) On a Federal level, Zero Trust is defined into five pillars, "Identity," "Device," "Network Environment," "Application Workload," and "data." Dr. Shawn Murray Defines these five pillars as "This is a Cybersecurity paradigm focused on resources, protection, and the premise trust is never granted implicitly." (Dr. Murray) Stay tuned for the other half of this episode, where we take interviews and get people's impressions on Zero trust at the Rocky Mountain Cyberspace symposium. Enjoy today's episode.
Visit our sponsors:
BlockFrame Inc.
IEEE Digital Privacy
NCF-319 Cloud Security with Kubernetes
34m · PublishedToday's NewCyberFrontier, guest Dr. Brian Smith, has founded several companies, TippingPoint Technologies Click Security, and most recently Spyderbat. Spyderbat is pioneer in cloud security using “Kubernetes which they believe is the latest step in the evolution of cloud” ( Brian Smith.) Kubernetes use short life cycle cloud containers monitoring the behavior of the container to determine when malicious activity might be enacted. The pretense is, by knowing the normal behavior we can spot the abnormal operations and thus the malicious activity. “Kubernetes have allowed us to change how we think about security systems.” (Brian Smith.) In the past, we try to detect viruses and malware threats and prevent them the best way we could, but there might just be a better way to secure software better than we thought. Tune in to today's episode of NewCyberFrontier, and check out today’s sponsor https://www.spyderbat.com
Visit our sponsors:
BlockFrame Inc.
IEEE Digital Privacy
NCF-IEEE12 Global Efforts in Digital Privacy
30m · PublishedWelcome back to this episode of NewCyberFrontier. We Continue our IEEE series and the Initiative over Digital Privacy. Today our guest speaker is Dr. Stefano Zanero, a Cybersecurity Professor, a member of the ISSA Board of Directors, and a founding member of the Blackhat conference series. In today's discussion, why privacy? Dr. Zanero answers, "Authentication is the building block in the first chapter of any textbook, so we would think it is solved, but it's not." (Zanero.) Dr. Zanero stresses that we still need to improve imperfect solutions to breaches in the Digital Privacy world and with sharing data. In society, the average person is aware of their digital privacy but needs the tools and education necessary to handle their data. Dr. Zanero says, "Having this initiative to gather and generate momentum around this subject is very important." Be an informed listener by tuning into this continuing series of Digital privacy.
Visit our sponsors:
BlockFrame Inc.
IEEE Digital Privacy
NCF-318 Security Orchestration Automation and Response
33m · PublishedIn today’s episode, we are back with our three hosts, Tim Montgomery, Chris Gorog, and Dr. Shawn Murray. “The amount of data going into SIMS is too vast for humans to keep up with” (Murray). In addition, the sophistication of some cyber attacks outwits the human eye needing specific tools to catch in the programming languages. Enjoy today’s episode of NewCyberFrontier.
NCF-317 Cybersecurity Buzz words
31m · PublishedWelcome back to this episode of Just Talking! We have our two hosts, Tim Montgomery, and Chris Gorog. This episode covers many topics, including Cloud services and Buzz Words in the Cyber security industry. With cloud technology constantly evolving, giant companies like Amazon and Microsoft must keep them secure and invulnerable. "By 2025, 50% of data will be in the cloud between thousands of businesses and companies. Enjoy today's episode of Buzz Words!
Visit our sponsors:
BlockFrame Inc.
IEEE Digital Privacy
Murray Security Services
NCF-316 Recapping What We heard from our Guest in 2022
32m · PublishedIn this week's post, we are unpacking all the information we have heard from all our guests this past year, with our hosts Tim Montgomery and Chris Gorog. One topic we discuss in today’s podcast is whether businesses and organizations prioritize security as their primary focus. “ The role of the chief information security officer has come a long way in the past twenty-five years.” (Montgomery.) Businesses inform consumers that they have security in their products, software, and devices for security reasons and are marketing strategies to keep up with competitors. Join us In today’s episode of NewCyberFrontier.
Visit our sponsors:
BlockFrame Inc.
IEEE Digital Privacy
Murray Security Services
NCF-315 FAA Grounding Incident
34m · PublishedWelcome back to the show! We are brought to you by our three hosts, Chris Gorog, Tim Montgomery, and Shawn Murray. In today's episode, we are talking about the FAA incident earlier this week. “The FAA announced and grounded all flights in the United States due to a corrupted database file.” (Murray.) This was not a Cyber attack; instead just a corrupted file. It is reported that two contractors working for the FAA changed the system that was not scheduled nor implemented correctly, having to reboot the system and get everything back online. This deals with Business Continuity Disaster Recovery and Critical Infrastructure. Join us in today's episode of NewCyberFrontier
Visit our sponsors:
BlockFrame Inc.
IEEE Digital Privacy
Murray Security Services
NCF-314 Status of Cybersecurity for Critical Infrastructure
30m · PublishedIn today’s Episode of New Cyber Frontier, we are going over the status of Critical Infrastructure. With thousands of new systems and devices all over the country in play over the last couple of decades, with little to no security, what does this mean for the future? These could include Air conditioning, heating, ventilation, Control systems, HVAC Systems, and much more that are interconnected in some way. Join us In this week's post.
Visit our sponsors:
BlockFrame Inc.
IEEE Digital Privacy
Murray Security Services
New Cyber Frontier has 150 episodes in total of non- explicit content. Total playtime is 114:35:38. The language of the podcast is English. This podcast has been added on October 26th 2022. It might contain more episodes than the ones shown here. It was last updated on May 22nd, 2024 19:11.