Couverture de The Connected Frontier

The Connected Frontier

The Connected Frontier

De : Three Kat Lane
Écouter gratuitement

3 mois pour 0,99 €/mois

Après 3 mois, 9.95 €/mois. Offre soumise à conditions.

À propos de ce contenu audio

A Three Kat Lane podcast where we explore the cutting edge of technology and its impact on our world.

© 2025 The Connected Frontier
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !
    Épisodes
    • Zero Trust: Why “Never Trust, Always Verify” Is the New Security Reality
      Dec 23 2025

      Send us a text

      Today, we’re diving into a concept that gets mentioned everywhere in cybersecurity conversations, vendor decks, and government strategy documents—but is still widely misunderstood.

      That concept is Zero Trust.

      Zero Trust isn’t a product. It’s not a single tool. And despite the name, it’s not about distrusting everyone all the time.

      Instead, it’s a fundamental shift in how we think about access, identity, and risk in a world where the old network perimeter has basically disappeared.

      In this episode, we’re going to unpack what Zero Trust actually means, why it emerged, and how it works in practice—from user identity and device trust to adaptive access and continuous verification.

      Whether you’re deeply technical or just Zero Trust–curious, my goal is that you walk away understanding why this model matters—and why it’s becoming foundational to modern cybersecurity.

      #ZTA #ZTNA #MFA #Cybersecurity

      Support the show

      Afficher plus Afficher moins
      12 min
    • The Core Pillars of 6G: Unpacking the New Architecture
      Nov 14 2025

      Send us a text

      Now, 6G is still emerging in research and standardization — but already, industry players are articulating what they believe the architecture must deliver, and how it should be designed. So in this episode we’ll cover:

      • what 6G is setting out to achieve (the use-cases and demands driving it),

      • the high-level architectural shifts compared with 5G,

      • and then drill into five (or so) core pillars of the 6G architecture — what they are, why they matter, and what they mean in practice.

      Finally we’ll look at some of the challenges and what to watch for as 6G moves toward commercial reality.

      Support the show

      Afficher plus Afficher moins
      21 min
    • Harvest Now, Decrypt Later (HNDL): Your Roadmap for Post-Quantum Defense
      Oct 24 2025

      Send us a text

      Today, we dive into the silent, long-term threat known as "Harvest Now, Decrypt Later" (HNDL), an active operational strategy used by sophisticated threat actors, including state-sponsored groups. This isn't a hack happening now; it's a "time bomb" where adversaries are stealing and stockpiling vast amounts of encrypted data—like financial records, trade secrets, and classified communications—with no intention of breaking it today.

      The Core Vulnerability: Current Public-Key Cryptography (PKC) relies on mathematical problems that are secure against classical computers. However, the arrival of a Cryptographically Relevant Quantum Computer (CRQC), capable of running Shor's Algorithm, will render this encryption trivial to break, turning all that archived data into "a devastatingly decrypted treasure". The moment this quantum leap arrives—known as Q-Day or Y2Q—any data that needs to remain secret for five, ten, or twenty years is already compromised.

      The Defense and the Urgency: We break down Mosca's Inequality ($X + Y > Z$) to quantify this time-based risk, showing that a system fails if the data's confidentiality duration ($X$) plus the time it takes to migrate to new encryption ($Y$) exceeds the Quantum Threat Horizon ($Z$). The solution is the global adoption of new Post-Quantum Cryptography (PQC) standards, finalized by NIST, which are secure against both classical and quantum computers.

      Organizations are urged to begin an urgent, phased transition using hybrid cryptography—layering PQC with classical algorithms—to ensure defense. Learn the key steps for your Quantum-Readiness Roadmap, including Preparation and Inventory and implementing Crypto-Agility, to prevent the data being harvested today from destroying your organization a decade from now.

      Support the show

      Afficher plus Afficher moins
      15 min
    Aucun commentaire pour le moment