Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
A Three Kat Lane podcast where we explore the cutting edge of technology and its impact on our world.... more
FAQs about The Connected Frontier:How many episodes does The Connected Frontier have?The podcast currently has 23 episodes available.
August 25, 2025Cybersecurity Toolbox: What is NDR?Send us a text On this episode of The Connected Frontier, we dive into Network Detection and Response (NDR), the third pillar of the SOC Visibility Triad. Moving beyond traditional firewalls and signature-based tools, we explore how NDR uses AI and behavioral analytics to detect threats that have already breached the perimeter, including sophisticated zero-day attacks, lateral movement, and insider threats. We also discuss how NDR provides crucial visibility into all network traffic, its synergistic role with Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM), and the key vendors shaping this rapidly growing market. Support the show...more16minPlay
August 17, 2025Cybersecurity Toolbox: What is EDR?Send us a textIn this episode of "The Connected Frontier," we explore a critical topic in modern cybersecurity: Endpoint Detection and Response, or EDR. We break down why traditional antivirus software is no longer enough to protect against today's sophisticated threats and explain how EDR's behavioral-based approach provides a more dynamic and effective defense. We also demystifie the confusing world of cybersecurity acronyms, clarifying the differences between EDR, MDR, and XDR, and discuss how EDR is a foundational component of a Zero Trust security model. Support the show...more10minPlay
August 10, 2025Cybersecurity Toolbox: What is XDR?Send us a textOn this episode of "The Connected Frontier," we dive into the world of modern cybersecurity with a deep-dive into Extended Detection and Response, or XDR. Forget the days of siloed security tools and a constant flood of disconnected alerts. We explore how XDR acts as a strategic command center, using AI and automation to transform overwhelming "alert fatigue" into a single, cohesive narrative of an attack.Using a real-world ransomware scenario, we break down the four key stages of how an XDR platform works, from initial data collection to automated threat containment. You’ll also learn how XDR is different from its predecessors, EDR and SIEM, and why understanding this distinction is crucial for any organization. Finally, we discuss the key strategic choice between Native and Open XDR, offering insights into which model might be right for your business.Tune in to discover how XDR is building a smarter, more resilient defense for the digital age, and why it's the next great leap in protecting what matters most.Support the show...more15minPlay
August 03, 2025Securing The Industrial Internet of Things (IIOT): Essential Resources and Leading Voices for IIoT SecuritySend us a textWelcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Internet of Things, or IIoT.In this episode we dive into the critical and rapidly evolving world of Industrial Internet of Things (IIoT) security. We explore essential learning resources, including formal training programs, key industry standards, and important publications. We also highlight influential thought leaders and premier industry conferences to follow, emphasizing the vital importance of continuous learning and professional growth in this dynamic and impactful field. Support the show...more17minPlay
July 28, 2025Securing The Industrial Internet of Things (IIOT): Securing Industrial IoT with AI and Machine LearningSend us a textWelcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Internet of Things, or IIoT.In this episode of "The Connected Frontier," we explore the critical role of AI and Machine Learning in securing the rapidly expanding Industrial Internet of Things (IIoT). We highlight how traditional cybersecurity falls short against sophisticated, AI-driven threats targeting IIoT's unique vulnerabilities, from legacy systems to insecure APIs. The discussion emphasizes AI/ML's transformative power in enhancing threat detection through anomaly identification and zero-day attack capabilities, automating incident responses for rapid containment, and enabling dynamic access control. The episode also delves into targeted AI/ML solutions for persistent issues like weak passwords and insecure legacy protocols, while acknowledging ongoing challenges such as data quality, integration complexities, and the ethical implications of AI deployment in industrial settings. Support the show...more23minPlay
July 21, 2025Securing The Industrial Internet of Things (IIOT): Protecting Legacy Systems in the Era of IIOTSend us a textWelcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Internet of Things, or IIoT. In this episode of The Connected Frontier, we dive into the critical challenge of securing the Industrial Internet of Things (IIoT) against cyber-physical attacks. We explain how the convergence of modern IIoT with decades-old industrial control systems (OT/ICS) creates a vast attack surface, emphasizing that unlike IT security, OT security prioritizes physical safety and continuous operations. The episode highlights the persistent vulnerabilities of legacy systems, which were not designed for today's cyber threats, and the difficulty of patching them due to continuous uptime requirements. Support the show...more15minPlay
July 16, 2025Securing The Industrial Internet of Things (IIOT): Building a Digital Fortress - Security by DesignSend us a textWelcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Internet of Things, or IIoT. This episode, "Building a Digital Fortress," explores why a proactive "Security by Design" approach is essential for protecting our increasingly connected industrial systems. Discover how integrating security from the ground up, rather than as an afterthought, can prevent costly breaches, enhance resilience, and build trust. We share engaging stories and break down key principles, challenges, and future trends—including the roles of AI, Machine Learning, and quantum computing—to show how industries can stay one step ahead of cyber threats. Tune in to learn why security isn't just an add-on, but the very foundation of a resilient IIoT future. #iiot #cybersecurity #otsecuritySupport the show...more13minPlay
July 10, 2025Securing The Industrial Internet of Things (IIOT): Defending IIoT from Nation-State APTsSend us a textWelcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Internet of Things, or IIoT. In this episode we explore the "invisible war" waged by nation-state Advanced Persistent Threats (APTs) against Industrial Internet of Things (IIoT) systems. We explain that these sophisticated adversaries, backed by governments, aim for geopolitical advantage, espionage, and physical sabotage of critical infrastructure like energy grids and manufacturing plants. The podcast delves into their methodical attack lifecycle, from reconnaissance to data exfiltration or disruption, highlighting real-world examples like Stuxnet and the Ukrainian power grid attacks. Finally, we discuss advanced defense strategies, emphasizing proactive threat intelligence, holistic security frameworks, Zero Trust Architecture, and robust incident response to protect national security and public safety.Support the show...more31minPlay
July 01, 2025Securing The Industrial Internet of Things (IIOT): Breaching the "Air Gap" MythSend us a textWelcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Internet of Things, or IIoT. In this episode we explore the "air gap" myth, revealing why the traditional security measure for Operational Technology (OT) networks is no longer foolproof. This episode explores the critical reasons behind the inevitable convergence of IT and OT, highlighting the substantial benefits like enhanced efficiency and data-driven decision-making. Discover the inherent risks of this interconnected landscape, from expanded attack surfaces and legacy system vulnerabilities to the "patching paradox" and organizational silos. Most importantly, learn about the multi-faceted solutions required to build cyber resilience in this new era, including unified strategies, robust network segmentation, and a culture of cybersecurity awareness.Support the show...more15minPlay
June 24, 2025Securing The Industrial Internet of Things (IIOT): Supply Chain RisksSend us a textWelcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Internet of Things, or IIoT. In this episode we explore the critical vulnerabilities within the Industrial Internet of Things (IIoT) supply chain. The discussion highlights how the convergence of IT and OT expands the attack surface, making IIoT susceptible to unique threats. The episode uses real-world examples like the "rogue Raspberry Pi" incident and major supply chain attacks such as SolarWinds, Kaseya, and Codecov to illustrate the insidious nature of these vulnerabilities. Katherine emphasizes that third-party vendors are often the biggest supply chain vulnerability, with 59% of organizations experiencing a data breach due to a third party. The episode concludes by outlining three strategic pillars for securing IIoT environments: rigorous vendor vetting, comprehensive component transparency (including Software Bill of Materials and attestations), and robust Third-Party Risk Management. The host stresses that securing the IIoT ecosystem is a strategic business imperative, crucial for protecting critical infrastructure and the modern economy. Support the show...more15minPlay
FAQs about The Connected Frontier:How many episodes does The Connected Frontier have?The podcast currently has 23 episodes available.