Épisodes

  • Zero Trust: Why “Never Trust, Always Verify” Is the New Security Reality
    Dec 23 2025

    Send us a text

    Today, we’re diving into a concept that gets mentioned everywhere in cybersecurity conversations, vendor decks, and government strategy documents—but is still widely misunderstood.

    That concept is Zero Trust.

    Zero Trust isn’t a product. It’s not a single tool. And despite the name, it’s not about distrusting everyone all the time.

    Instead, it’s a fundamental shift in how we think about access, identity, and risk in a world where the old network perimeter has basically disappeared.

    In this episode, we’re going to unpack what Zero Trust actually means, why it emerged, and how it works in practice—from user identity and device trust to adaptive access and continuous verification.

    Whether you’re deeply technical or just Zero Trust–curious, my goal is that you walk away understanding why this model matters—and why it’s becoming foundational to modern cybersecurity.

    #ZTA #ZTNA #MFA #Cybersecurity

    Support the show

    Afficher plus Afficher moins
    12 min
  • The Core Pillars of 6G: Unpacking the New Architecture
    Nov 14 2025

    Send us a text

    Now, 6G is still emerging in research and standardization — but already, industry players are articulating what they believe the architecture must deliver, and how it should be designed. So in this episode we’ll cover:

    • what 6G is setting out to achieve (the use-cases and demands driving it),

    • the high-level architectural shifts compared with 5G,

    • and then drill into five (or so) core pillars of the 6G architecture — what they are, why they matter, and what they mean in practice.

    Finally we’ll look at some of the challenges and what to watch for as 6G moves toward commercial reality.

    Support the show

    Afficher plus Afficher moins
    21 min
  • Harvest Now, Decrypt Later (HNDL): Your Roadmap for Post-Quantum Defense
    Oct 24 2025

    Send us a text

    Today, we dive into the silent, long-term threat known as "Harvest Now, Decrypt Later" (HNDL), an active operational strategy used by sophisticated threat actors, including state-sponsored groups. This isn't a hack happening now; it's a "time bomb" where adversaries are stealing and stockpiling vast amounts of encrypted data—like financial records, trade secrets, and classified communications—with no intention of breaking it today.

    The Core Vulnerability: Current Public-Key Cryptography (PKC) relies on mathematical problems that are secure against classical computers. However, the arrival of a Cryptographically Relevant Quantum Computer (CRQC), capable of running Shor's Algorithm, will render this encryption trivial to break, turning all that archived data into "a devastatingly decrypted treasure". The moment this quantum leap arrives—known as Q-Day or Y2Q—any data that needs to remain secret for five, ten, or twenty years is already compromised.

    The Defense and the Urgency: We break down Mosca's Inequality ($X + Y > Z$) to quantify this time-based risk, showing that a system fails if the data's confidentiality duration ($X$) plus the time it takes to migrate to new encryption ($Y$) exceeds the Quantum Threat Horizon ($Z$). The solution is the global adoption of new Post-Quantum Cryptography (PQC) standards, finalized by NIST, which are secure against both classical and quantum computers.

    Organizations are urged to begin an urgent, phased transition using hybrid cryptography—layering PQC with classical algorithms—to ensure defense. Learn the key steps for your Quantum-Readiness Roadmap, including Preparation and Inventory and implementing Crypto-Agility, to prevent the data being harvested today from destroying your organization a decade from now.

    Support the show

    Afficher plus Afficher moins
    15 min
  • Cybersecurity Toolbox: Policies, Frameworks, and the Like
    Oct 10 2025

    Send us a text

    This podcast episode shifts focus from technical tools to the indispensable non-technical controls that drive cyber resilience, arguing that security must be managed in the boardroom, not just the data center. It explores four core strategic pillars: Governance, Risk, and Compliance (GRC) for establishing policy and accountability; Quantitative Risk Analysis (using the FAIR framework) to translate technical threats into measurable financial loss; engineering a Human Firewall by focusing on culture, motivation, and metrics like Time-to-Report (TTR); and implementing a multidisciplinary Incident Response Plan (IRP) that includes essential crisis communication protocols. Ultimately, the episode emphasizes that effective security requires translating these efforts into business language via executive summaries and maturity scores to secure sustained strategic funding.

    Support the show

    Afficher plus Afficher moins
    14 min
  • Cybersecurity Toolbox: What is a SIEM?
    Oct 6 2025

    Send us a text

    In this week's episode, we discuss the SIEM system - the central security intelligence hub that links disparate events into high-fidelity threat alerts and serves as the essential compliance repository for long-term log retention. Though traditional SIEM suffers from operational complexity and alert fatigue due to false positives, modern, cloud-native solutions leverage AI and User and Entity Behavior Analytics (UEBA) to drastically increase detection accuracy, positioning SIEM as the foundational anchor in the integrated SOC stack alongside SOAR and XDR.



    Support the show

    Afficher plus Afficher moins
    12 min
  • Cybersecurity Toolbox: What is SSE?
    Sep 26 2025

    Send us a text

    This episode discusses why traditional security models like VPNs and on-premise firewalls are insufficient for the modern, cloud-centric workforce. Host Katherine explains that the Secure Service Edge (SSE) is the new industry standard, acting as the security pillar of the broader SASE framework. The episode breaks down the four core SSE components: ZTNA, SWG, CASB, and FWaaS—and explains how their unified approach delivers superior security, simplified management, and improved user experience. Ultimately, the show argues that adopting SSE is a strategic imperative to secure and accelerate the business in a distributed world.

    Support the show

    Afficher plus Afficher moins
    10 min
  • Cybersecurity Toolbox: Email Protection
    Sep 22 2025

    Send us a text

    This episode of "The Connected Frontier" discusses the modern email protection landscape. It highlights how email is a primary entry point for cyber threats like Business Email Compromise (BEC) and phishing attacks. The podcast explains that modern solutions use advanced threat protection (ATP) features, such as behavioral analysis, URL rewriting, and dynamic sandboxing, to defend against these threats. The episode also emphasizes the importance of foundational protocols like SPF, DKIM, and DMARC, as well as the critical role of human awareness and security training in a comprehensive defense strategy.

    Support the show

    Afficher plus Afficher moins
    9 min
  • Cybersecurity Toolbox: What is NAC?
    Sep 15 2025

    Send us a text

    In this episode of "The Connected Frontier," we explain why Network Access Control (NAC) is a critical cybersecurity tool in today's digital landscape. NAC acts as a digital security team at every door, asking three vital questions of every user and device: "Who are you?", "Are you supposed to be here?", and "Are you a security risk?". The episode provides a story of a major retail data breach to illustrate how NAC's "least privilege" principle could have prevented the lateral movement of a threat. Furthermore, it highlights NAC's role in managing BYOD devices by performing automatic health checks and isolating non-compliant devices. Finally, the episode summarizes key features businesses should look for in a NAC solution, including integration with other security tools, both agent-based and agentless deployment, granular policy enforcement, and scalability.

    Support the show

    Afficher plus Afficher moins
    12 min