Gesamtlänge aller Episoden: 2 days 20 hours 19 minutes
This week on Cyber Frontiers Christian and Jim recap security highlights from the past six weeks. We take a dive into the latest security challenges facing Windows 10, review the buzz around the Capital One breach,
This week on Cyber Frontiers we catch up on some of the latest exploitations and availability drops on the web. We kick off with a discussion of the release of the TCP SACK panic as a new mechanism for DDoS via TCP protocol.
This week on Cyber Frontiers Christian and Jim catch up on cyber anecdotes from our listeners! We start with a deep dive on the data breach website haveibeenpwned.com — and discuss ways users can leverage the data and APIs to reduce their surface area ...
This week on Cyber Frontiers Christian and Jim dive into recapping some of the best content from RSA 2019! We pack in a lot of content this show — ranging from a deep-dive into the most pervasive attack techniques in cybersecurity today to a comprehens...
This week Christian and Jim dive into the “doomsday” (dramatic much?) cyber event of 2019 — escaping Docker containers! Formally known as CVE-2019-5736, we dive deep on the technical research undertaken by Dragon Sector to take advantage of Linux names...
This week on Cyber Frontiers we catch up on the lingo defining the technology frontier word cloud in 2019. Everyday we increasingly hear the phrase “we can do this now because of artificial intelligence (AI).” It’s showing up in product literature,
This week on Cyber Frontier Christian dives into the state of affairs in the cryptocurrency battle for adopters and the ultimate future of blockchain. We discuss some of the origins of what made Bitcoin popular and misunderstood,
This week on Cyber Frontiers Christian and Jim discuss the computing industry without the bachelor’s degree (B.S.). We discuss the recently increasing trend of major tech companies doing away with degree requirements for top software engineering positi...
This week Christian is joined by Jim to talk about killing off password security on web and communication platforms, a.k.a. the era of the hardware authenticator! We dive deep into the release of the Yubikey 5, FIDO 2,
This week on Cyber Frontiers Christian is joined by Jim to discuss common AI applications influencing everyday life. We take a look at the latest learning technology in discerning fake news, facial recognition at airports,