Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
mnemonic security podcast - Cryptology

Cryptology

10/25/23 • 39 min

mnemonic security podcast

Cryptology is fundamental for the way the internet works today. But what exactly is modern cryptology, and what are the most common areas in which it’s being used?

To guide us through this complex area, Robby’s joined by Bor de Kock, PhD. in Cryptology and Assistant Professor at NTNU.

They talk about some of the main challenges to cryptology these days, encryption security and its limitations, and how Bor expects quantum computing to affect cryptology.

Bor also shares what makes him both optimistic and pessimistic when it comes to the future of internet security.

Send us a text

plus icon
bookmark

Cryptology is fundamental for the way the internet works today. But what exactly is modern cryptology, and what are the most common areas in which it’s being used?

To guide us through this complex area, Robby’s joined by Bor de Kock, PhD. in Cryptology and Assistant Professor at NTNU.

They talk about some of the main challenges to cryptology these days, encryption security and its limitations, and how Bor expects quantum computing to affect cryptology.

Bor also shares what makes him both optimistic and pessimistic when it comes to the future of internet security.

Send us a text

Previous Episode

undefined - Physical Penetration Testing / Red Teaming

Physical Penetration Testing / Red Teaming

Physical penetration testing | ISACA series

For this episode that is part of our ISACA series, we’re joined by Rob Shapland, Ethical Hacker/Head of Cyber Innovation at Falanx Cyber.

Rob talks about what he’s learned from his 15 years of testing physical and cyber security for his clients, including more than 200 building intrusions assignments. He explains how these kind of testing assignments work, what usually does work – and what happened the one time he actually didn’t get in.

Robby and Rob talk about the evolution of security testing, and how testing techniques have had to adapt and become more subtle especially the last five years. They also go into the importance of training after assignments like these.

Send us a text

Next Episode

undefined - Digging into State Directed Cyber

Digging into State Directed Cyber

Last year, threat researchers all over the world got a sneak peek into the inner workings of the Russian defence contractor NTC Vulkan.
The Vulkan files leak provided an interesting behind the scenes look at Russian cyber capabilities and scalability, and the ways state sponsored organisation work.
Joe Slowik, managing threat intelligence at the cybersecurity company Huntress, joins Robby to talk about how he worked through the hundreds of pages of data from the leak, and what he learned from them.

Send us a text

Episode Comments

Featured in these lists

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/mnemonic-security-podcast-242077/cryptology-35481061"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to cryptology on goodpods" style="width: 225px" /> </a>

Copy