This podcast seeks to add context not only to the challenges facing security within the Information and Communications Technology (ICT) Supply Chain, but attempts to give a hybrid framework for any business regardless of size or function to follow when attempting to mitigate threats both to and from within their supply chain.
The CSIAC Podcast
The CSIAC Podcast features discussions with Subject Matter Experts on emerging topics in the fields of cybersecurity, modeling and simulation, software engineering and knowledge management. One-on-one and round-table discussions are held to provide insight into highly technical topics and increase user awareness.
Hackers are becoming progressively more sophisticated. The attacks can take place on companies, businesses, hospitals, government organizations and universities, alike. A non-intentional lack of awareness of basic security practices can easily lead to a ransomware attack with irreparable damage.
This video podcast describes some best practices that can assist in preventing incidents on a network and mitigate the risk in case of a cyber attack.
This multi-part series explores a broad range of aspects regarding fifth generation (5G) wireless networks. In this final episode, 5G-oriented National Cyber Strategies are discussed and future 5G devices are examined.
This episode will discuss new 5G capabilities and applications, this includes mission-critical services, massive Internet of Things (IoT), and enhanced mobile broadband. It also explores potential cybersecurity concerns involving 5G technology and methods to mitigate these issues.
This episode will discuss 5G infrastructure changes and examine the varying properties of different frequencies. Multiple private network architectures as well as INL secure wireless capabilities will be described.
This initial podcast episode will describe the basics of 5G, including the evolution of this wireless technology. It will touch on the potential applications it will enable and examine spectrum issues associated with 5G.
Cyber as a domain and battlespace coincides with the defined attributes of a “wicked problem” with complexity and inter-domain interactions to spare. Since its elevation to domain status, cyber has continued to defy many attempts to explain its reach, importance, and fundamental definition. Corresponding to these intricacies, cyber also presents many interlaced attributes with other…
In this episode of the CSIAC podcast, Charlie Merulla explains the evolution of peer to peer file sharing systems. Man has had the need to share information since the beginning of time and today is no exception. This podcast looks into the technical details of how files are shared today. Trends associated with peer to peer file sharing systems are examined. Lastly, the risks associated with file sharing and how to minimize those risks are presented.
This podcast discusses the distinguishing characteristics common to an APT – describing the individual phases of the typical APT life-cycle and the respective challenges each poses to securing an organization’s integrity.
This podcast features a roundtable discussion centered around challenges and benefits of using a new programming language called “Rust,” which can fundamentally improve resilience and survivability of software intensive systems.