Episodi

  • Cybersecurity Mesh Architecture: Architecting for a Borderless World
    Jan 19 2026

    Send us a text

    This episode of The Connected Frontier explores Cybersecurity Mesh Architecture (CSMA) as a modern solution to the "tool sprawl" and the disappearance of the traditional network perimeter in a multi-cloud, remote-work world. It breaks down the four foundational layers of the mesh—intelligence, identity, policy, and visibility—while detailing NIST technical standards for service meshes. The discussion highlights how adopting this integrated ecosystem can reduce the financial impact of security incidents by 90% and provides a roadmap for organizations to transition toward an identity-centric security posture.

    Support the show

    Mostra di più Mostra meno
    11 min
  • Zero Trust: Why “Never Trust, Always Verify” Is the New Security Reality
    Dec 23 2025

    Send us a text

    Today, we’re diving into a concept that gets mentioned everywhere in cybersecurity conversations, vendor decks, and government strategy documents—but is still widely misunderstood.

    That concept is Zero Trust.

    Zero Trust isn’t a product. It’s not a single tool. And despite the name, it’s not about distrusting everyone all the time.

    Instead, it’s a fundamental shift in how we think about access, identity, and risk in a world where the old network perimeter has basically disappeared.

    In this episode, we’re going to unpack what Zero Trust actually means, why it emerged, and how it works in practice—from user identity and device trust to adaptive access and continuous verification.

    Whether you’re deeply technical or just Zero Trust–curious, my goal is that you walk away understanding why this model matters—and why it’s becoming foundational to modern cybersecurity.

    #ZTA #ZTNA #MFA #Cybersecurity

    Support the show

    Mostra di più Mostra meno
    12 min
  • The Core Pillars of 6G: Unpacking the New Architecture
    Nov 14 2025

    Send us a text

    Now, 6G is still emerging in research and standardization — but already, industry players are articulating what they believe the architecture must deliver, and how it should be designed. So in this episode we’ll cover:

    • what 6G is setting out to achieve (the use-cases and demands driving it),

    • the high-level architectural shifts compared with 5G,

    • and then drill into five (or so) core pillars of the 6G architecture — what they are, why they matter, and what they mean in practice.

    Finally we’ll look at some of the challenges and what to watch for as 6G moves toward commercial reality.

    Support the show

    Mostra di più Mostra meno
    21 min
  • Harvest Now, Decrypt Later (HNDL): Your Roadmap for Post-Quantum Defense
    Oct 24 2025

    Send us a text

    Today, we dive into the silent, long-term threat known as "Harvest Now, Decrypt Later" (HNDL), an active operational strategy used by sophisticated threat actors, including state-sponsored groups. This isn't a hack happening now; it's a "time bomb" where adversaries are stealing and stockpiling vast amounts of encrypted data—like financial records, trade secrets, and classified communications—with no intention of breaking it today.

    The Core Vulnerability: Current Public-Key Cryptography (PKC) relies on mathematical problems that are secure against classical computers. However, the arrival of a Cryptographically Relevant Quantum Computer (CRQC), capable of running Shor's Algorithm, will render this encryption trivial to break, turning all that archived data into "a devastatingly decrypted treasure". The moment this quantum leap arrives—known as Q-Day or Y2Q—any data that needs to remain secret for five, ten, or twenty years is already compromised.

    The Defense and the Urgency: We break down Mosca's Inequality ($X + Y > Z$) to quantify this time-based risk, showing that a system fails if the data's confidentiality duration ($X$) plus the time it takes to migrate to new encryption ($Y$) exceeds the Quantum Threat Horizon ($Z$). The solution is the global adoption of new Post-Quantum Cryptography (PQC) standards, finalized by NIST, which are secure against both classical and quantum computers.

    Organizations are urged to begin an urgent, phased transition using hybrid cryptography—layering PQC with classical algorithms—to ensure defense. Learn the key steps for your Quantum-Readiness Roadmap, including Preparation and Inventory and implementing Crypto-Agility, to prevent the data being harvested today from destroying your organization a decade from now.

    Support the show

    Mostra di più Mostra meno
    15 min
  • Cybersecurity Toolbox: Policies, Frameworks, and the Like
    Oct 10 2025

    Send us a text

    This podcast episode shifts focus from technical tools to the indispensable non-technical controls that drive cyber resilience, arguing that security must be managed in the boardroom, not just the data center. It explores four core strategic pillars: Governance, Risk, and Compliance (GRC) for establishing policy and accountability; Quantitative Risk Analysis (using the FAIR framework) to translate technical threats into measurable financial loss; engineering a Human Firewall by focusing on culture, motivation, and metrics like Time-to-Report (TTR); and implementing a multidisciplinary Incident Response Plan (IRP) that includes essential crisis communication protocols. Ultimately, the episode emphasizes that effective security requires translating these efforts into business language via executive summaries and maturity scores to secure sustained strategic funding.

    Support the show

    Mostra di più Mostra meno
    14 min
  • Cybersecurity Toolbox: What is a SIEM?
    Oct 6 2025

    Send us a text

    In this week's episode, we discuss the SIEM system - the central security intelligence hub that links disparate events into high-fidelity threat alerts and serves as the essential compliance repository for long-term log retention. Though traditional SIEM suffers from operational complexity and alert fatigue due to false positives, modern, cloud-native solutions leverage AI and User and Entity Behavior Analytics (UEBA) to drastically increase detection accuracy, positioning SIEM as the foundational anchor in the integrated SOC stack alongside SOAR and XDR.



    Support the show

    Mostra di più Mostra meno
    12 min
  • Cybersecurity Toolbox: What is SSE?
    Sep 26 2025

    Send us a text

    This episode discusses why traditional security models like VPNs and on-premise firewalls are insufficient for the modern, cloud-centric workforce. Host Katherine explains that the Secure Service Edge (SSE) is the new industry standard, acting as the security pillar of the broader SASE framework. The episode breaks down the four core SSE components: ZTNA, SWG, CASB, and FWaaS—and explains how their unified approach delivers superior security, simplified management, and improved user experience. Ultimately, the show argues that adopting SSE is a strategic imperative to secure and accelerate the business in a distributed world.

    Support the show

    Mostra di più Mostra meno
    10 min
  • Cybersecurity Toolbox: Email Protection
    Sep 22 2025

    Send us a text

    This episode of "The Connected Frontier" discusses the modern email protection landscape. It highlights how email is a primary entry point for cyber threats like Business Email Compromise (BEC) and phishing attacks. The podcast explains that modern solutions use advanced threat protection (ATP) features, such as behavioral analysis, URL rewriting, and dynamic sandboxing, to defend against these threats. The episode also emphasizes the importance of foundational protocols like SPF, DKIM, and DMARC, as well as the critical role of human awareness and security training in a comprehensive defense strategy.

    Support the show

    Mostra di più Mostra meno
    9 min