Episodes
Wednesday Jan 24, 2024
NCF-340 It Takes a Community to Build Next-Gen Cyber
Wednesday Jan 24, 2024
Wednesday Jan 24, 2024
We continue the Fourth in the Eight-episode series with Tim Montgomery and Dr. Gorog. In this episode, we look at some driving forces for the next-generation research into distributed trust. Around 2016, Dr. Gorog, working with the State of Colorado, started the first work into trust for digital records for citizens' data held by the state. At the time technology for distributed ledgers was thought promising but was not economical. Prototypes for state programs found that one year's cloud storage data costs ten times more than the state budgeted. So many people have envisioned blockchain and distributed ledger to solve societal problems, but the truth is that they did not work because they were cost-inhibiting. Large-scale adoption of businesses has found similar technology limitations. Join today to hear more about how the state of Colorado sponsorship has supported and funded exciting work using many Cybersecurity institutions and Universities in Colorado as a test bed. Teams of students, companies, international organizations, and industry professionals worked together to solve some of these challenging problems. Dr. Gorog discusses some of these campaigns, such as Privacy for the People and IEEE Digital Privacy Initiative. Tune into this episode of New Cyber Frontier.
Monday Jan 15, 2024
NCF-339 New Frontier of Individual Empowerment
Monday Jan 15, 2024
Monday Jan 15, 2024
Welcome back, everybody, to the New Cyber Frontier Podcast. We continue the
Third in the Eight-episode series with Tim Montgomery and Dr. Gorog. In this
episode, we discuss the nature of newly evolving open markets in comparison
to human historical examples of frontiers. The digital and virtual frontier
has infinite possibilities that we barely have scratched the surface of,
raising the question, How far can we go? In this digital realm, numerous companies have grown over the years to become the largest entities in the
world with an entire virtual presence. Over the next few years, many more
are anticipated to make a digital transformation. Participation in the
post-digital transformation era has been mostly restricted to large
entities; these large companies are difficult to compete with if you are new
or entering markets because small businesses and individuals are unknown and
untrusted. The individual is relatively uninvolved in this digital
transformation; their efforts and digital works are the currency of large
entrenched companies. The individual is unprotected. Dr. Gorog explains,
"Should the right tools to protect the individual exist, the value of the
individual to enter is high, the cost is low, and the entry is instant." The
potential is high if the tools existed to do it." Heading in a direction
where the individual protects their data, not the company, is a new frontier
today. We are looking towards empowering individuals in this technical and
virtual era. Tune in to today's episode of New Cyber Frontier.
Monday Jan 08, 2024
NCF-338 Disrupting Markets by Cybersecurity Economics
Monday Jan 08, 2024
Monday Jan 08, 2024
Welcome back, everybody, to New Cyber Frontier. We continue the Second in the Eight-episode series with Tim Montgomery and Dr. Gorog. Our discussion focuses on the nature of disruption in any market, identifying the critical
result of disruption is a change of philosophy. When an entire old way of doing something goes away based on technology, not only business changes, but society changes. If we go back to early 2000, there's a shift in the market, which is overseas manufacturing. Companies would allow their product to be made overseas, making it a quarter of the price; if you couldn't outsource fast enough, you could not keep up. When products are sent to be manufactured overseas, there is no control over that intellectual property. "A company found out that they would compete with their own products in the marketplace, and now we see that the risk surface for cyber-attacks is uncontrollable because it is not in our jurisdiction to enforce. The disruption of that era caused many of the problems we are facing with supply injection attacks today. (Gorog) Dr. Gorog explains further where things are heading now and how disruption again is surfacing but to regain control. Cybersecurity is the control structure in this new era with positive methods to Identify virtual assets, enforce software and data usage, and individualize every device made. Cybersecurity is the structure we stand on for the post-digital transformation economics, let's look at the future. Join us today and get involved at Logic Central Online – Where Logic meets Life
Monday Jan 01, 2024
NCF-337 Entering a New Year and New Phase for Cybersecurity
Monday Jan 01, 2024
Monday Jan 01, 2024
Happy New Year, everybody, and welcome back to New Cyber Frontier! To start 2024, we have an eight-episode series with Tim Montgomery and Dr. Gorog, Ph.D. CISSP is unveiling a new philosophy for Cybersecurity. Dr. Gorog elaborates with our host how working on the recently released work for the last seven years has progressed to a potential game changer. This first episode provides a kick-off point where the conversation focuses on the current state of the cybersecurity industry as we enter this new year. Dr. Gorog says we are still primarily working toward satisfying compliance, with most new approaches focused on data analysis and AI. (Gorog.) Billions of dollars have been spent on compliance and keeping up with the minimum standards to protect the massive data pool. In the last couple of years, digital transformations have been accelerating. Organizations and employees are spending less of their overall effort working toward physical world objects. In fact, many of us have not done anything that has resulted in physical products or outputs for many years. The conversations prelude to what later episodes will cover. Can we transfer everything to digital? Then, what does the world look like in the post-digital transformation?
Bringing the philosophical dilemma of "When everything becomes chunks of data, our wealth becomes data." How Does AI affect your data? AI is expanding operations, taking GB's worth of information from your email and devices—this information AI steals is thrown back into the data pool. In the future, how will we be able to tell what disinformation AI is starting to produce? Tune in to this episode of New Cyber Frontier. Join us to listen; you will not want to miss this series opener.
Monday Jan 01, 2024
NCF-335 Small Business Balances Cybersecurity Cost vs Value
Monday Jan 01, 2024
Monday Jan 01, 2024
Welcome back, everybody, to New Cyber Frontier. Our host, Chris Gorog, partnered with the Smalls Podcast on this episode with Dennis Kater and Nate Moser! The Smalls Podcast started in 2017 and deals with The Government Contractor Ecosystem, which aims towards Manufacturers, Service Providers, and Small Government Contractors. The primary audience for The Smalls is business development companies, Owners, and those who want to do business with the Government or Department of Defense. Companies are cautiously getting involved with cybersecurity mainly to implement the measures their contracts require, but not much more. How to identify the best balance for their minimal budgets vs the value they receive is the continued challenge they all experience. Nate and Dennis bring to light some progress in the industry compared with a few years back. Hear the latest from the small business community on cybersecurity; tune in to this week of New Cyber Frontier.
Check out The Smalls Podcast here: Podcast – The Smalls
Tuesday Dec 05, 2023
NCF-336 Confidential Computing Explained
Tuesday Dec 05, 2023
Tuesday Dec 05, 2023
Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.
Monday Nov 13, 2023
NCF-334 Security Engineering for Industrial Systems
Monday Nov 13, 2023
Monday Nov 13, 2023
Welcome back, everybody, to NewCyberFrontier. In today's episode, guest Andrew Ginter, Vice President of Industrial Security and Waterfall Security. Mr Ginter is also the author of a book titled, "Engineering Grade OT Security: A Managers Guide." He defines his book as sitting at the intersection of industrial systems and Engineering. These systems could range from inputs and outputs from computer systems such as power plants, Shoe factories, and high-speed passenger train rails. Mr. Ginter explains his book further by saying, "Small Shoe factories and High-speed train rail switches are very different on the Industrial system spectrum. What determines the difference is worst case consequences of compromise." What would be the worst outcome to a Shoe factory versus Passenger Train Rail switches if all commands to computer systems fail? Shoe factories might have to replace all the equipment and a couple million dollars worth of expenses that insurance could cover, but for the switches on a train, if all computer commands fail, this could result in massive casualties and two trains colliding, which insurance can not cover. These are two diverse examples of industrial systems that need to face different approaches to computer systems. Mr Ginter also explains in his book that Engineering Security is a public safety issue with no room for errors. "In recent years, we have been automating everything, which is not always the best option; we must have fail-safes in place with security and protection." We face many problems and cyber attacks in the engineering world that must be considered today. Thank you for watching NewCyberFrontier.
Tuesday Oct 03, 2023
NCF-333 EDGE Symposium Presentation
Tuesday Oct 03, 2023
Tuesday Oct 03, 2023
On today's episode of New Cyber Frontier, our host, Christopher Gorog, gives a special presentation on Blockframe at the Edge Symposium in Niskayuna, New York. Edge St, Bronx, NY 10465, " Amplifying profitable value from deployed IoT products," we learn to use Cybersecurity as a catalyst for profit. Gorog explains using a distributed trust to bring social and economic value to Blockframe customers, living up to the mission: "to enable customers to create resilient precision ecosystems for sustainable uniform consumption and production." Mr. Gorog describes this address as the day view of the last six years of his Ph.D. work, and we hope you enjoy it also. The talk explains how, in the chaotic industry that is Cybersecurity, businesses are in desperate need of holistic, modular, top-down security that spans across their entire ecosystem. The Blockframe approach implements simplicity. "We solve four significant issues: security for all segments of the Supply Chain, management of deployed devices and their safety, the integration of physical and digital Supply Chain, and lastly, the ability to scale." (Gorog). Blockframe has pioneered a way not to use mining, solving some of the major issues with blockchain and maintaining Carbon neutrality. Thank you for tuning in to this episode! If you have any questions or want to learn more about Blockframe, be sure to contact us on our website, newcyberfrontier.com
Monday Jul 24, 2023
NCF-332 Weaponized Documents and Content
Monday Jul 24, 2023
Monday Jul 24, 2023
Hello, Everybody, and welcome back to NewCyberFrontier. On today’s episode, we have guest Aviv Grafi, who is the CTO and founder of Votiro. Mr. Grafi talks about Weaponizing Documents and how they are getting more common and more dangerous, popping up in PDF files and Zip files. The best way to try to understand these attacks is to think like a hacker would think and try to protect yourself from future attacks by being vigilant of what you open. Learn more today on how you can protect yourself by tuning in to today’s episode.
Check our website NewCyberFrontier
Check out Votiro’s website
Visit our sponsors:
Monday Jun 19, 2023
NCF-330 High-risk is a Reality
Monday Jun 19, 2023
Monday Jun 19, 2023
On today's show, Samual Hill from Cyolo Security and Tim discuss High-Risk Access and the trends of corporations toward a more secure virtual ecosystem. With a background in the Emergency Room and an M.A. in Strategic Leadership, Samuel is passionate about helping organizations grow and protect themselves effectively in industries such as manufacturing, banking, financial services, insurance, and oil and gas. High Risk is still in today's headlines, and companies are starting to understand security. In this episode, we will discuss how that is trending in today's business culture, how security-related tools are or are not beneficial for remote working, and the manufacturing of oil and gas can benefit the most from security in these remote environments. With the idea of remote and the High Risk it brings to IT Systems of today, how can it benefit from understanding and having the experts evaluate security ramifications? Does security matter when using remote established work in a virtual ecosystem?
Visit our sponsors: