Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
The Evolution of Cyber Talent Screening with Franz Payer, CEO Cyber Skyline – CF067
|
May 13, 2022 |
Guest Ashton Webster and New Compliance Rules for Critical Infrastructure Reporting – CF066
|
Apr 07, 2022 |
2021 Cybersecurity Headlines and a Look Ahead at 2022 – CF065
|
Mar 03, 2022 |
Liviu Arsene from Bitdefender talks Bitdefender Box and Bitdefender Premium VPN – CF064
|
Oct 19, 2020 |
Zero Trust Security In a Pandemic Mindset – CF063
|
Sep 05, 2020 |
Identity Theft Protection in 2020 – CF062
|
Apr 23, 2020 |
COVID-19 Data Analytics – CF061
|
Mar 26, 2020 |
Adversarial Machine Learning – CF060
|
Feb 15, 2020 |
Security Education with Cyber Skyline – CF059
|
Dec 17, 2019 |
Quantum Supremacy and the Cryptology Time Machine – CF058
|
Nov 10, 2019 |
Cyber Anecdotes: A Tale of Worms, Shared Security, and More – CF057
|
Aug 22, 2019 |
The Manifestation of New Exploitation – CF056
|
Jun 22, 2019 |
Data Breach SecOps, Reputations, and IoT Security – CF055
|
May 04, 2019 |
Quantum, Cyber, Oh My! The Best of RSA 2019 – CF054
|
Mar 13, 2019 |
Containers Gone Wild – CF053
|
Feb 23, 2019 |
AI Rising – CF052
|
Feb 09, 2019 |
Crypto and Blockchain: Enablers of the Future – CF051
|
Nov 17, 2018 |
Computing Without the B.S. – CF050
|
Oct 17, 2018 |
Kill The Ancient Authenticator! – CF049
|
Sep 27, 2018 |
AI In Everyday Life: Is It Ready for the Limelight? – CF048
|
Sep 15, 2018 |
Highlights from DEFCON 26 – CF047
|
Aug 21, 2018 |
The Modern Turing Test: A Brief History in ML and Some Cyber Anecdotes – CF046
|
Jul 11, 2018 |
Difference between AI and ML, and How Does IoT Fit In Again? – CF045
|
Jun 27, 2018 |
GDPR – What You Need to Know, RSA Conference Recap and Crypto Mining Update – CF044
|
Jun 16, 2018 |
An Update on Meltdown and Spectre, ATM JackPotting and Christian Talks Crypto Currency – CF043
|
Feb 10, 2018 |
Meltdown and Spectre: A Tear at the Foundation of Computer Security – CF042
|
Jan 09, 2018 |
2018 Frontier Trends in Cybersecurity and Data Science – CF041
|
Dec 22, 2017 |
Mobile Security Matters: Dissecting the Dangers of Mobile Malware – CF040
|
Nov 29, 2017 |
DEFCON 2017 Recap and Macbook Wizardry – CF039
|
Aug 17, 2017 |
Honey Haven: Creating Research HoneyPots In the Cloud – CF038
|
Aug 05, 2017 |
Cyber Exploitation with SSRF & CMS Swiss Cheese – CF037
|
Jul 18, 2017 |
On Cybersecurity and Ransomware – CF036
|
Jun 30, 2017 |
Essential Cybersecurity Science with Josiah Dykstra – CF035
|
Feb 21, 2017 |
2017 Cybersecurity Outlook and 2016 Reflections – CF034
|
Jan 02, 2017 |
A Case Study in Webserver Malware for Admins and Users Alike – CF033
|
Dec 03, 2016 |
Reflection on Cyber Culture: Societal Impact and Living (In)Securely In the Modern Age – CF032
|
Sep 16, 2016 |
DEFCON 24 – CF031
|
Aug 17, 2016 |
IPv6 and What is Coming in the Future – CF030
|
Aug 07, 2016 |
Hands on with the Anonabox Pro – CF029
|
Jun 29, 2016 |
Tor and Anonymity: An Academic Introduction to the Dark Web – CF028
|
Jun 08, 2016 |
Cybersecurity Outlook for 2016, Emerging Threats, and the Era of Darwinian Security – CF027
|
Dec 31, 2015 |
Online Affairs, Female Chatbots, and A Mildly Unrelated DDoS Conversation – CF026
|
Sep 05, 2015 |
Windows 10 Privacy Snafus, Cloud Security Dilemmas, and the birth of Mr. Robot – CF025
|
Aug 23, 2015 |
Visualizing Cyberspace, Hacking Cars, and the Takeover of the Internet of Things – CF024
|
Aug 01, 2015 |
Data Breaches of the 21st Century – OPM Ripples through the FedGov – CF023
|
Jul 22, 2015 |
Open Everything: Adopting Cloud in the Enterprise w/ OpenSource, OpenStack, and OpenFlow – CF022
|
Jun 04, 2015 |
Where is Big Data Headed Next on the Information Superhighway – CF021
|
May 31, 2015 |
Data & Compute Challenges in Enterprise IT Environments – CF020
|
May 03, 2015 |
Innovative Hacker Marathons: Bitcamp 2015 – CF019
|
Apr 17, 2015 |
Cyber Roundtable with ACES Cybersecurity Students at UMD – CF018
|
Feb 21, 2015 |