Cyber.RAR is a podcast series from six Harvard Kennedy School students: Michaela Lee, Bethan Saunders, Winnona DeSombre, Danielle Levin, Sophie Faaborg-Andersen, and Grace Park.
While each bring a different lens to the show, they all share a common conviction: the field of cybersecurity is rapidly evolving, yet the national security field is falling behind. In this podcast, they uncover why the U.S. government struggles to build basic cyber infrastructure, explore how to regulate offensive cyber capabilities, debate the meaning and merits of “hacktivism”, and laugh with each other along the way. Tune in to Cyber.RAR for discussions, debates, and expert interviews on the biggest questions, challenges, and opportunities in cybersecurity.
📻 Siste episoder av Cyber.RAR
Her er de nyeste episodene tilgjengelige via RSS-feeden:
Is Big Tech Imploding? Cybersecurity and Content Moderation (00:46:01)
Big Tech, honey, are you doing okay? Whether we like it or not, large technology platforms and the for-profit institutions that make them are here to stay in our society and economy. Governments are s...
Cybersecurity in a National Digital Transformation Effort: An Interview with Minister Cina Lawson of Togo (00:35:49)
Minister Cina Lawson, Togo's Minister of Digital Economy and Transformation, joins Cyber.RaR for a special episode. In her role leading Togo's digital transformation, Minister Lawson oversaw rapid di...
Sharks & Tubes: Submarine Cables and Cybersecurity (00:44:11)
Worried about a nuclear war with Russia? Maybe you SHOULD be worried about beluga whales. Let’s dive in (pun intended) on why. This week on Cyber.RAR, we discuss global infrastructure in the form of u...
Your Data is Oozing: How the US Government Accesses Citizens' Data Using Consumer AdTech (00:35:48)
Bloomberg - FTC Sues Mobile Data Broker Over Abortion Location Data Sale https://www.bloomberg.com/news/articles/2022-08-29/ftc-sues-mobile-data-broker-over-abortion-location-data-sales?sref=P6Q0mxvj&...
Are Turtles War Machines? AI-Enabled Cybersecurity Has an Answer (00:44:27)
AI-enabled security can process data faster and more accurately than humans, but can it tell the difference between turtles and rifles? We answer this question and more as we cover AI-enabled cybersec...
Crypto & Lowrise Jeans: Cybersecurity on the Blockchain (00:48:11)
What do Cryptocurrency and the 90's have in common? Easily exploitable bugs and also Paris Hilton, apparently.We cover the state of regulation and cybersecurity within the blockchain and cryptocurrenc...
State of the Practice - The Chips & Science Act (00:41:28)
Good WashPo article: A new era of industrial policy kicks off with signing of the Chips ActGeneral relationship between semiconductors/cyber: Cybersecurity and Semiconductors: How are they related? He...
Expert Interview: Protecting Vulnerable Populations in Cyberspace (00:46:33)
Michaela dives deeper into the nexus of cyber and vulnerable populations through an interview with Eva Galperin, the Director of Cybersecurity at the Electronic Frontier Foundation (EFF). Listen in on...
Protecting Vulnerable Populations in Cyberspace (00:35:02)
How do we better protect our most vulnerable populations from cyber incidents? Michaela leads the conversation and posits that instead of thinking about it as a domain of war, we should use a climate ...
Expert Interview: Defense Innovation? Walk Before You Run (00:30:25)
Eric Rosenbach, Co-Director of the Belfer Center and Former Chief of Staff of the Pentagon, joins Cyber.RAR to talk about the major roadblocks facing innovation within the Department of Defense. Eric,...
Defense Innovation? Walk Before You Run (00:32:01)
Bethan and Sophie explore why it's so hard to get innovative digital technologies into the Defese Department. The discussion starts with JEDI (and no, not from Star Wars) and covers the challenges fac...
Expert Interviews: Hacktivism (00:26:42)
Grace continues the conversation on so-called hacktivism and the future landscape of cyber activism with Bruce Schneier, author of the book 'Data and Goliath,' and fellow and lecturer at Harvard Kenne...
The Chaos of Political Hacking (00:33:46)
Grace asks the question: Political Hacktivism (Hacking + Activism), chaotic good or chaotic evil? What even counts as activism versus terrorism in cyberspace? Is it simply ideological or is it normati...
Expert Interviews: Cyber Mercenaries (00:50:47)
Winnona continues her exploration of cyber mercenaries by interviewing three experts: Sophia D'Antoine & Dave Aitel, two professionals in the offensive security industry, and Sean McFate - an expert o...
A Tangled Web: Cyber Mercenaries (00:31:18)
Winnona asks: how does one regulate an industry that operates so far in the shadows? This is a major problem in the hack for hire industry, and something we’re going to try and tackle on our podcast e...
Rose/Bud/Thorn: Cyberwar in Ukraine (00:28:19)
Dani asks: how does cyber fit into modern warfare strategies? How have cyber strategies evolved in the last two decades, what can we learn from the uses of cyber capabilities in Russia's invasion of U...
Expert Interviews: Cyberwar (00:44:40)
Dani explores the cyber escalation fallacy and the evolution of cyberwarfare strategies with Erica Lonergan, Assistant Professor in the Army Cyber Institute, Research Scholar at the Saltzman Institute...
Welcome to Cyber.RAR! (00:06:21)
Meet Michaela, Grace, Winnona, Bethan, Sophie, and Danielle and hear why they came together to record a limited podcast series on cyber policy issues. They dive into some nuances and laugh with each o...