Logic Central Online public
[search 0]
More
Download the App!
show episodes
 
Loading …
show series
 
Welcome back, everybody, to New Cyber Frontier. In today's world-changing episode, we have Guest Sagi Brody who is Chief Technology of Opti9 and Technical Advisor of Cyviation along with our host Dr Gorog. Mr. Brody has been in the digital infrastructure for about twenty-five years where he became Co-founder and Chief Technology & Product Officer a…
  continue reading
 
Welcome back, everybody, to New Cyber Frontier. In today’s Episode we have guest Eslam Tawfik Ph.D. .Dr Tawfik. studied advanced technology in Egypt. Cybersecurity is frequently used to describe the defense of digital networks, systems, and data against harm, unwanted access, and attacks. On the other hand, protecting the hardware and infrastructur…
  continue reading
 
Welcome back, everybody, to New Cyber Frontier. In today's episode, we have guest Cory O Daniel, C.E.O. and co-founder at MassDriver, who works in DevOps. Mr. Daniel has a background in physics and architecture but switched his career path and started to focus on healthcare information systems and computer science. Mr. Daniel is a self-proclaimed s…
  continue reading
 
Welcome back, to the New Cyber Frontier Podcast with our hosts Tim Montgomery and Dr. Gorog. In the final episode of the eight-part series, Tim provides a direct inquisitive dialog with Dr. Gorog regarding his dissertation work in distributed trust. What distribution of trust means to the average person is a bit Shakey as the coining of Zero-trust …
  continue reading
 
Welcome back everybody to the New Cyber Frontier Podcast with our hosts Tim Montgomery and Dr. Gorog. In this seventh episode, we will continue on the next-generation post digital transformation philosophy looking at the lifecycle of our data. The discussion centers on the use of data and its importance to you as the owner/creator vs what your data…
  continue reading
 
Hello Everybody, welcome back to New Cyber Frontier. We will continue to the sixth episode of this series with Tim Montgomery and Dr. Gorog covering how the world transforms digitally. " In the digital world, we are getting to the point where Eighty Percent of peoples' entire lives work effort is virtual, and this is just going to grow." Dr. Gorog …
  continue reading
 
Welcome back everybody to New Cyber Frontier. In this episode, we have our three hosts Shawn Murray, Tim Montgomery, and Dr. Gorog recapping this last year and discussing the plans for 2024. Dr. Murray covers what he sees as the key events in 2023 with significant legislation for privacy in a variety of states and more definement around responses t…
  continue reading
 
Hello Everybody, welcome back to the New Cyber Frontier podcast. We continue with the series' fifth episode with Tim Montgomery and Dr. Gorog, Looking over these past years of work in distributed trust. The normalization of today's society is that we trust these large-scale businesses with our data and goods because they are the only safe options w…
  continue reading
 
We continue the Fourth in the Eight-episode series with Tim Montgomery and Dr. Gorog. In this episode, we look at some driving forces for the next-generation research into distributed trust. Around 2016, Dr. Gorog, working with the State of Colorado, started the first work into trust for digital records for citizens' data held by the state. At the …
  continue reading
 
Welcome back, everybody, to the New Cyber Frontier Podcast. We continue the Third in the Eight-episode series with Tim Montgomery and Dr. Gorog. In this episode, we discuss the nature of newly evolving open markets in comparison to human historical examples of frontiers. The digital and virtual frontier has infinite possibilities that we barely hav…
  continue reading
 
Welcome back, everybody, to New Cyber Frontier. We continue the Second in the Eight-episode series with Tim Montgomery and Dr. Gorog. Our discussion focuses on the nature of disruption in any market, identifying the critical result of disruption is a change of philosophy. When an entire old way of doing something goes away based on technology, not …
  continue reading
 
Happy New Year, everybody, and welcome back to New Cyber Frontier! To start 2024, we have an eight-episode series with Tim Montgomery and Dr. Gorog, Ph.D. CISSP is unveiling a new philosophy for Cybersecurity. Dr. Gorog elaborates with our host how working on the recently released work for the last seven years has progressed to a potential game cha…
  continue reading
 
Welcome back, everybody, to New Cyber Frontier. Our host, Chris Gorog, partnered with the Smalls Podcast on this episode with Dennis Kater and Nate Moser! The Smalls Podcast started in 2017 and deals with The Government Contractor Ecosystem, which aims towards Manufacturers, Service Providers, and Small Government Contractors. The primary audience …
  continue reading
 
Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is act…
  continue reading
 
Welcome back, everybody, to NewCyberFrontier. In today's episode, guest Andrew Ginter, Vice President of Industrial Security and Waterfall Security. Mr Ginter is also the author of a book titled, "Engineering Grade OT Security: A Managers Guide." He defines his book as sitting at the intersection of industrial systems and Engineering. These systems…
  continue reading
 
On today's episode of New Cyber Frontier, our host, Christopher Gorog, gives a special presentation on Blockframe at the Edge Symposium in Niskayuna, New York. Edge St, Bronx, NY 10465, " Amplifying profitable value from deployed IoT products," we learn to use Cybersecurity as a catalyst for profit. Gorog explains using a distributed trust to bring…
  continue reading
 
Hello, Everybody, and welcome back to NewCyberFrontier. On today’s episode, we have guest Aviv Grafi, who is the CTO and founder of Votiro. Mr. Grafi talks about Weaponizing Documents and how they are getting more common and more dangerous, popping up in PDF files and Zip files. The best way to try to understand these attacks is to think like a hac…
  continue reading
 
On today's show, Samual Hill from Cyolo Security and Tim discuss High-Risk Access and the trends of corporations toward a more secure virtual ecosystem. With a background in the Emergency Room and an M.A. in Strategic Leadership, Samuel is passionate about helping organizations grow and protect themselves effectively in industries such as manufactu…
  continue reading
 
Welcome back to NewCyberFrontier. In this video, we have guest Patrick Clawson CEO of an API Security Platform Called Resurface Labs. Mr. Clawson has extensive knowledge of Cybersecurity with twenty-plus years of experience. In this episode, we will review API modules and how only 11% are in the marketplace, leaving a gap for encrypted security. We…
  continue reading
 
On today's show, Fausto Lendeborg and Tim discuss Cloud Platforms, Cloud migration, the speed of business objectives, and the organization's perspective. Fausto is the Co-Founder and CEO of Secberus, a Cloud Security Governance Platform designed to manage cloud risk at scale. With over 20 years of experience in cybersecurity, Fausto has been an int…
  continue reading
 
Welcome back to the show! Today we have guest Amit Serper Director of Security Research at Sternum. At Sternum, Mr. Serper is tasked with researching hardware or "Hardware Hacking," where he takes apart specific devices to gain access to them. Mr. Serpers say's, "Our approach to security at Sternum is, we know those devices are vulnerable for vario…
  continue reading
 
Welcome back to the show! Our Guest, Justin Beals, CEO and co-founder at Strike Graph, a 20+ year veteran, Background in Telco, and four different startups. Today we talk about a new era of turning security tools into a business value proposition, turning the advertising of security posture into marketing goods and services. Tune into this week's p…
  continue reading
 
I hope everyone enjoyed the break! In today's episode, we have guest Scott Schober, President and CEO of Berkeley Varitronics Systems and a Cyber Expert who has published three books on Cybersecurity. Mr. Schober has had multiple altercations with getting hacked and has extensive knowledge of this matter, saying, "I call it the Digital footprint; t…
  continue reading
 
Welcome back to the show! In today's episode, we are accompanied by host Tim Montgomery and guest Chris Gorog, the CEO of Blockframe, a Blockchain company that uses Blockchain technology for privacy. In this episode, we will review the relationship of trust within the Internet, Cybersecurity, and the CIA. With millions of people, systems, and devic…
  continue reading
 
Write Up Welcome back to the show; today our host, Tim Montgomery, presents us with the release of the Executive Order of Cybersecurity and Critical infrastructure of Zero Trust. "Within agencies, they refer to zero trust to provide collections of concepts and ideas to minimize uncertainty, inforcing accuracy per request of access to information." …
  continue reading
 
Welcome back to the show. We are continuing our series of Zero Trust where we take interviews and get people's impressions at the Rocky Mountain Cyberspace symposium. Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this pro…
  continue reading
 
Welcome back to the show. Today we have our three hosts, Tim Montgomery, Chris Gorog, and Dr. Shawn Murray, going over "Zero Trust." Zero Trust means looking at all processes in an organization or business to validate one's data, Identity, and security associations while having Zero Trust and going through this process and asking questions like, "H…
  continue reading
 
Today's NewCyberFrontier, guest Dr. Brian Smith, has founded several companies, TippingPoint Technologies Click Security, and most recently Spyderbat. Spyderbat is pioneer in cloud security using “Kubernetes which they believe is the latest step in the evolution of cloud” ( Brian Smith.) Kubernetes use short life cycle cloud containers monitoring t…
  continue reading
 
Welcome back to this episode of NewCyberFrontier. We Continue our IEEE series and the Initiative over Digital Privacy. Today our guest speaker is Dr. Stefano Zanero, a Cybersecurity Professor, a member of the ISSA Board of Directors, and a founding member of the Blackhat conference series. In today's discussion, why privacy? Dr. Zanero answers, "Au…
  continue reading
 
Welcome back to this episode of Just Talking! We have our two hosts, Tim Montgomery, and Chris Gorog. This episode covers many topics, including Cloud services and Buzz Words in the Cyber security industry. With cloud technology constantly evolving, giant companies like Amazon and Microsoft must keep them secure and invulnerable. "By 2025, 50% of d…
  continue reading
 
In this week's post, we are unpacking all the information we have heard from all our guests this past year, with our hosts Tim Montgomery and Chris Gorog. One topic we discuss in today’s podcast is whether businesses and organizations prioritize security as their primary focus. “ The role of the chief information security officer has come a long wa…
  continue reading
 
Welcome back to the show! We are brought to you by our three hosts, Chris Gorog, Tim Montgomery, and Shawn Murray. In today's episode, we are talking about the FAA incident earlier this week. “The FAA announced and grounded all flights in the United States due to a corrupted database file.” (Murray.) This was not a Cyber attack; instead just a corr…
  continue reading
 
In today’s Episode of New Cyber Frontier, we are going over the status of Critical Infrastructure. With thousands of new systems and devices all over the country in play over the last couple of decades, with little to no security, what does this mean for the future? These could include Air conditioning, heating, ventilation, Control systems, HVAC S…
  continue reading
 
Welcome back! We have both hosts, Dr. Shawn Murry and Chris Gorog discussing how Cybersecurity is adapting to the future. "It's been a year since Russia invaded Ukraine, and we are starting to see all the Cyber issues with warfare." (Murray.) Privacy was leaked with drones and personal mobile devices on both sides. As technology increases over the …
  continue reading
 
Happy New Year! We have two guests in today's show: Tamara Hughes, Principal at TMH Ventures, LLC, and Umit Cali, Associate Professor of Energy Informatics ( AI & Blockchain) at NTNU. "The general objectives of a smart contract are to satisfy common contractual conditions such as payment terms and minimize the need for trusted intermediaries," (Tam…
  continue reading
 
Welcome back! In today's episode, we have guest Orlando Lopez, Ph.D., a Certified Project Manager who works for the National Institute of Health and the Department of Health and Human Services. Doctor Lopez works on multiple advanced technologies to help with Therapeutic Planning and Surgical Navigation Systems, along with other fabrication technol…
  continue reading
 
In today's new edition of NewCyberFrontier, we are accompanied by Ryan Johnson, an intern at Murray Security Services. Ryan Johnson went to Pikes Peak Community College for Cybersecurity in Colorado Springs. One research project Mr. Johnson was operating on was a Vulnerability assessment of security issues. These issues range from many devices, app…
  continue reading
 
In this episode, we further our IEEE Blockchain and Transactive Energy series with guest Patrick Phelps, Founder and CEO at WHYGRENE. "The WHYGRENE vision can be distilled into three words; Decarbonized, Decentralized, and Digitized." Mr. Phelps's Incorporation deals with new regulations coming into the market, expressing that the grid has to evolv…
  continue reading
 
In today's Podcast, we Have Jason Hicks, Field CISO at Coalfire. Jason Hicks has worked on the Technical and Business side at CISO. Mr. Hicks helps people transition from being a technical CISO to being a business leader with skills he has learned and delivers business strategies back to his community and other businesses. Enjoy today's Podcast of …
  continue reading
 
In this episode of New Cyber Frontier, our host Tim Montgomery Speaks with Steve Ginty, Director of Threat Intelligence at RiskIQ. Steve Ginty gives his knowledge of Digital Security and protection against malware across the internet. Additionally, RiskIQ has partnered with Microsoft to work with the vulnerability of their exchange systems. Join us…
  continue reading
 
In this episode of New Cyber Frontier, we have two special guests. Sri Nikhil Gourisetti, master’s in systems engineering, Ph.D. Engineering Science. and Dr. James Kempf, Ph.D. in Systems engineering and Senior Consultant at Kempf and Associates. These professionals elaborate on their experience with IEE, Cybersecurity, Energy systems, Blockchain, …
  continue reading
 
In today's episode, we have Christian Dalton, a professional in Counterintelligence for the United States Department Of Defense. Mr. Dalton gave us new tactics and procedures for Security today. "Tradecraft is limited to the imagination." However, Mr. Dalton expresses that tradecraft and business corporations constantly improve as technology advanc…
  continue reading
 
On today's podcast, we have Tobi Akanbi, UCCS Ph.D. Graduate 2020, who brings a different perspective on getting a Ph.D. with 10 years of experience in Security and Cyber Security. Tobi says “Between the time I joined UCCS to the time I graduated, I saw an extreme amount of Improvement.” Ph.D. Akanbi believe over the next five years this improvemen…
  continue reading
 
In this episode of New Cyber Frontier, our guest Jim Kyung-Soo Liew, Ph.D. | LinkedIn Professor at John Hopkins University talks about Blockchain and CryptoCurrency. Jim expresses his excitement about what he feels is a bright future for Digital Currencies. Jim says, "Some students were already managing over $10 million in CryptoCurrency." The focu…
  continue reading
 
Today's podcast has Tina Williams-Koroma, President and Founder of TCecure, LLC, and skills at https://cyskills.com, who will discuss managing security through minor and significant changes to systems and the business environment. Managing third-party risk can impact your cybersecurity posture and budget, and an excellent risk-based approach to sec…
  continue reading
 
In this episode of New Cyber Frontier, Dr. Shawn Murray changes gears to talk to Ryan Johnson, a cybersecurity intern, to understand the individuals starting out in cyber-security. What aspects of cybersecurity jobs are those starting off most interested in? What brings meaning to the cybersecurity workplace? We answer these questions and more in t…
  continue reading
 
Today on New Cyber Frontier, our host Christopher Gorog talks with today's guests, Nicolae Goga, Cristian Taslitchi, Iuliana Marin, about the future of healthcare infrastructure. Personal healthcare information used for anything but an individual's health is undoubtedly something unwanted, as there is no purpose other than misuse. So how do we secu…
  continue reading
 
Our guest Steve Ginti talks about defense contracting in the cybersecurity landscape. When your company switches to the cloud and hybrid environments, are the tried and true technologies good enough? Or should we look into the emergence of new processes for solving security for the new age? Steve Ginti talks about the process of starting from the o…
  continue reading
 
Improving security without impeding the war fighter's mission is the topic of discussion between our host Dr. Shawn Murray, and today's guest, Patrick Laverty. Today's remarkably candid conversation reveals some high points and exciting deficiencies experienced by our two interlocutors. We hope you enjoyed this show and some insight into what is us…
  continue reading
 
Our guest, Larry Karisny, talks with our host Tim Montgomery about what will become of current security practices once quantum computing capabilities are mainstream. We have explored both sides of this relatively new topic over the past couple of years. Firstly, what things can be broken once quintom computing is around. Secondly, is this something…
  continue reading
 
Loading …

Quick Reference Guide