The Connected Frontier
A Three Kat Lane podcast where we explore the cutting edge of technology and its impact on our world.
Episodes
35 episodes
Architecture Before Tools: Turning AI & Security Strategy into Reality
In this episode of The Connected Frontier, "Architecture Before Tools," we discuss a common pitfall in digital transformation: the rush to purchase technology before establishing a structural foundation. We explain how starting with to...
Who Actually Owns This: Turning AI & Security Strategy into Reality
In this episode of The Connected Frontier, "Who Actually Owns This?", we explore the critical challenge of ownership in the age of AI and modern security. We examine how shared responsibility often leads to an "ownership illusion...
The Execution Gap: Turning AI & Security Strategy into Reality
This first episode of our series on The Execution Gap: Turning AI & Security Strategy into Reality is here. It explores why even the most compelling AI and security strategies often fail during implementation. We...
AI and the Autonomous Enterprise: The Autonomous Enterprise - Bringing It All Together
This final episode of our AI and the Autonomous Enterprise series brings together the core concepts of the series to define the Autonomous Enterprise as a new operating model driven by decision-making rather than simple automation. We ou...
AI and the Autonomous Enterprise: AI Meets the Network - The Rise of Cognitive Connectivity
This episode of The Connected Frontier explores the shift from static, human-managed networks to cognitive networking, where AI is embedded directly into the network fabric to enable real-time adaptation and predictive optimizat...
AI and the Autonomous Enterprise: Governing Autonomous Decisions
This episode of The Connected Frontier explores the critical shift from manual decision approval to automated decision authorization frameworks within the autonomous enterprise. We discuss how organizations can maintain accountab...
AI and the Autonomous Enterprise: When AI Attacks AI
In Episode 5 of The Connected Frontier, we explore the shift from human-led cyber conflict to a new era where autonomous systems both attack and defend in real time. The episode examines how AI accelerates the "decision loop" for attac...
AI and the Autonomous Enterprise: The Autonomous SOC
This episode of The Connected Frontier explores the transition from traditional, alert-heavy security operations to the Autonomous SOC, where AI handles the initial layers of threat investigation and response at machine speed. W...
AI and the Autonomous Enterprise: Securing AI - The Most Dangerous Attack Surface
This episode of The Connected Frontier explores the shift of AI from a peripheral tool to mission-critical infrastructure, creating a "most dangerous" new attack surface for enterprises. We detail unique risks such as data poisoning, m...
AI and the Autonomous Enterprise: AI-Native Security Architecture
This episode of The Connected Frontier explores the shift from AI-enhanced security, which merely assists humans, to AI-native security architecture where systems independently evaluate context and drive defensive decisions at m...
AI and the Autonomous Enterprise: The Autonomous Enterprise Arrives
In the first episode of our 10 part series on "AI and the Autonomous Enterprise," we explore the pivotal shift from traditional automation to the era of the autonomous enterprise. The discussion breaks down how modern organizations are moving b...
Cybersecurity Mesh Architecture: Architecting for a Borderless World
This episode of The Connected Frontier explores Cybersecurity Mesh Architecture (CSMA) as a modern solution to the "tool sprawl" and the disappearance of the traditional network perimeter in a multi-cloud, remote-work world. It ...
Zero Trust: Why “Never Trust, Always Verify” Is the New Security Reality
Today, we’re diving into a concept that gets mentioned everywhere in cybersecurity conversations, vendor decks, and government strategy documents—but is still widely misunderstood.That concept is Zero Trust.Zero Trust isn’t a pr...
The Core Pillars of 6G: Unpacking the New Architecture
Now, 6G is still emerging in research and standardization — but already, industry players are articulating what they believe the architecture must deliver, and how it should be designed. So in this episode we’ll cover:what...
Harvest Now, Decrypt Later (HNDL): Your Roadmap for Post-Quantum Defense
Today, we dive into the silent, long-term threat known as "Harvest Now, Decrypt Later" (HNDL), an active operational strategy used by sophisticated threat actors, including state-sponsored groups. This isn't a hack happening now; it's a ...
Cybersecurity Toolbox: Policies, Frameworks, and the Like
This podcast episode shifts focus from technical tools to the indispensable non-technical controls that drive cyber resilience, arguing that security must be managed in the boardroom, not just the data center. It explores four core strategic pi...
Cybersecurity Toolbox: What is a SIEM?
In this week's episode, we discuss the SIEM system - the central security intelligence hub that links disparate events into high-fidelity threat alerts and serves as the essential compliance repository for long-term log retention. Though tradit...
Cybersecurity Toolbox: What is SSE?
This episode discusses why traditional security models like VPNs and on-premise firewalls are insufficient for the modern, cloud-centric workforce. Host Katherine explains that the Secure Service Edge (SSE) is the new industry stand...
Cybersecurity Toolbox: Email Protection
This episode of "The Connected Frontier" discusses the modern email protection landscape. It highlights how email is a primary entry point for cyber threats like Business Email Compromise (BEC) and phishing attacks. The podcast explains t...
Cybersecurity Toolbox: What is NAC?
In this episode of "The Connected Frontier," we explain why Network Access Control (NAC) is a critical cybersecurity tool in today's digital landscape. NAC acts as a digital security team at every door, asking three vital questions of every use...
Cybersecurity Toolbox: What is IAM?
In this episode of the Connected Frontier, we explore why Identity and Access Management (IAM) is no longer just a technical tool but the foundational backbone of modern cybersecurity. With the old "castle-and-moat" security model ...
Cybersecurity Toolbox: The Firewall
In this episode of "The Connected Frontier," we explore the evolution of the firewall from a simple "castle-and-moat" gatekeeper to an intelligent, dynamic, and essential part of modern cybersecurity. The episode details how the Next-Ge...
Cybersecurity Toolbox: What is NDR?
On this episode of The Connected Frontier, we dive into Network Detection and Response (NDR), the third pillar of the SOC Visibility Triad. Moving beyond traditional firewalls and signature-based tools, we explore how NDR uses AI and beha...
Cybersecurity Toolbox: What is EDR?
In this episode of "The Connected Frontier," we explore a critical topic in modern cybersecurity: Endpoint Detection and Response, or EDR. We break down why traditional antivirus software is no longer enough to protect against today's sophistic...
Cybersecurity Toolbox: What is XDR?
On this episode of "The Connected Frontier," we dive into the world of modern cybersecurity with a deep-dive into Extended Detection and Response, or XDR. Forget the days of siloed security tools and a constant flood of disconnected alerts. We ...