NCSC Cyber Series
Podcast af National Cyber Security Centre
Denne podcast er gratis at lytte på alle podcastafspillere og Podimo-appen uden abonnement.
Alle episoder
5 episoderWelcome to Artificial Intelligence! In this episode we’re joined by Viscount Camrose, Minister for AI, as we discuss the security and ethical dimensions of AI, its impact on humanity, and the balance of opportunities and risks. Discover how we’re preparing the workforce for AI’s future and upcoming regulations to protect consumers from cyber crime.
It’s a first in the Cyber Series as in this episode we’re joined by Will Middleton, Cyber Director at the FCDO. Together, we delve into the evolving cyber threat landscape, discussing its impacts and future trajectories. Tune in for insights on strategies and actionable steps to combat cyber proliferation.
Welcome to life beyond passwords! In this episode, we explore the significance of passwords and envision a world without them. Despite their drawbacks, why are passwords still pervasive? Listen as we discuss the challenges of transitioning away from passwords and our pragmatic approach to password management best practices. Correction: at 19:37 we stated that a hardware token doesn’t count as a passkey, but this is incorrect – the FIDO alliance would now describe a hardware token as an example of a single-device passkey.
In this episode, we will uncover the crucial role of sharing cyber security insights. From enhancing resilience to fostering collective defence, discover why sharing information is paramount in combating cyber threats.
In our debut episode, we dissect the latest cyber crime trends from our Evolution of Cyber Crime paper [https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ncsc.gov.uk%2Fwhitepaper%2Fransomware-extortion-and-the-cyber-crime-ecosystem&data=05%7C02%7Cabi.v%40ncsc.gov.uk%7C51b036b34a78401c6cf808dc5899ae43%7C14aa5744ece1474ea2d734f46dda64a1%7C0%7C0%7C638482664279690435%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=MAxqkWemj7wsqzF2u6Q%2BhfkiJddy3DzMswDujo5axoo%3D&reserved=0], and unravel the MO behind ransomware attacks. From the attack mechanics themselves to mitigation strategies, join us as we explore the who, what and how of ransomware.
Tilgængelig overalt
Lyt til Podimo på din telefon, tablet, computer eller i bilen!
Et univers af underholdning på lyd
Tusindvis af lydbøger og eksklusive podcasts
Ingen reklamer
Spild ikke tiden på at lytte til reklamepauser, når du lytter til Podimos indhold.