The Connected Frontier
A Three Kat Lane podcast where we explore the cutting edge of technology and its impact on our world.
Episodes
22 episodes
The Core Pillars of 6G: Unpacking the New Architecture
Now, 6G is still emerging in research and standardization — but already, industry players are articulating what they believe the architecture must deliver, and how it should be designed. So in this episode we’ll cover:what...
•
Season 3
•
Episode 2
•
21:15
Harvest Now, Decrypt Later (HNDL): Your Roadmap for Post-Quantum Defense
Today, we dive into the silent, long-term threat known as "Harvest Now, Decrypt Later" (HNDL), an active operational strategy used by sophisticated threat actors, including state-sponsored groups. This isn't a hack happening now; it's a ...
•
Season 3
•
Episode 1
•
14:41
Cybersecurity Toolbox: Policies, Frameworks, and the Like
This podcast episode shifts focus from technical tools to the indispensable non-technical controls that drive cyber resilience, arguing that security must be managed in the boardroom, not just the data center. It explores four core strategic pi...
•
Season 2
•
Episode 10
•
14:05
Cybersecurity Toolbox: What is a SIEM?
In this week's episode, we discuss the SIEM system - the central security intelligence hub that links disparate events into high-fidelity threat alerts and serves as the essential compliance repository for long-term log retention. Though tradit...
•
Season 2
•
Episode 9
•
12:22
Cybersecurity Toolbox: What is SSE?
This episode discusses why traditional security models like VPNs and on-premise firewalls are insufficient for the modern, cloud-centric workforce. Host Katherine explains that the Secure Service Edge (SSE) is the new industry stand...
•
Season 2
•
Episode 8
•
10:29
Cybersecurity Toolbox: Email Protection
This episode of "The Connected Frontier" discusses the modern email protection landscape. It highlights how email is a primary entry point for cyber threats like Business Email Compromise (BEC) and phishing attacks. The podcast explains t...
•
Season 2
•
Episode 7
•
8:30
Cybersecurity Toolbox: What is NAC?
In this episode of "The Connected Frontier," we explain why Network Access Control (NAC) is a critical cybersecurity tool in today's digital landscape. NAC acts as a digital security team at every door, asking three vital questions of every use...
•
Season 2
•
Episode 6
•
11:34
Cybersecurity Toolbox: What is IAM?
In this episode of the Connected Frontier, we explore why Identity and Access Management (IAM) is no longer just a technical tool but the foundational backbone of modern cybersecurity. With the old "castle-and-moat" security model ...
•
Season 2
•
Episode 5
•
11:28
Cybersecurity Toolbox: The Firewall
In this episode of "The Connected Frontier," we explore the evolution of the firewall from a simple "castle-and-moat" gatekeeper to an intelligent, dynamic, and essential part of modern cybersecurity. The episode details how the Next-Ge...
•
Season 2
•
Episode 4
•
12:05
Cybersecurity Toolbox: What is NDR?
On this episode of The Connected Frontier, we dive into Network Detection and Response (NDR), the third pillar of the SOC Visibility Triad. Moving beyond traditional firewalls and signature-based tools, we explore how NDR uses AI and beha...
•
Season 2
•
Episode 3
•
15:49
Cybersecurity Toolbox: What is EDR?
In this episode of "The Connected Frontier," we explore a critical topic in modern cybersecurity: Endpoint Detection and Response, or EDR. We break down why traditional antivirus software is no longer enough to protect against today's sophistic...
•
Season 2
•
Episode 2
•
9:30
Cybersecurity Toolbox: What is XDR?
On this episode of "The Connected Frontier," we dive into the world of modern cybersecurity with a deep-dive into Extended Detection and Response, or XDR. Forget the days of siloed security tools and a constant flood of disconnected alerts. We ...
•
Season 2
•
Episode 1
•
14:27
Securing The Industrial Internet of Things (IIOT): Essential Resources and Leading Voices for IIoT Security
Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Interne...
•
Season 1
•
Episode 10
•
16:13
Securing The Industrial Internet of Things (IIOT): Securing Industrial IoT with AI and Machine Learning
Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Interne...
•
Season 1
•
Episode 9
•
22:38
Securing The Industrial Internet of Things (IIOT): Protecting Legacy Systems in the Era of IIOT
Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Interne...
•
Season 1
•
Episode 8
•
14:54
Securing The Industrial Internet of Things (IIOT): Building a Digital Fortress - Security by Design
Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Interne...
•
Season 1
•
Episode 7
•
12:19
Securing The Industrial Internet of Things (IIOT): Defending IIoT from Nation-State APTs
Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Interne...
•
Season 1
•
Episode 6
•
30:32
Securing The Industrial Internet of Things (IIOT): Breaching the "Air Gap" Myth
Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Interne...
•
Season 1
•
Episode 5
•
14:44
Securing The Industrial Internet of Things (IIOT): Supply Chain Risks
Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Interne...
•
Season 1
•
Episode 4
•
14:01
Securing The Industrial Internet of Things (IIOT): The Human Element
Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Interne...
•
Season 1
•
Episode 3
•
16:15
Securing The Industrial Internet of Things (IIOT): Beyond the Firewall
Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Interne...
•
Season 1
•
Episode 2
•
20:34
Securing The Industrial Internet of Things (IIOT): An Overview
Welcome to "The Connected Frontier," where we explore the cutting edge of technology and its impact on our world. In this episode, we delve into the critical topic of securing the Industrial Internet of Things (IIoT), a rapidly expanding landsc...
•
Season 1
•
Episode 1
•
11:50