NCSC Cyber Series
Podcast by National Cyber Security Centre
This podcast is free to listen on all podcast players and the Podimo App without a subscription.
All episodes
5 episodesWelcome to Artificial Intelligence! In this episode we’re joined by Viscount Camrose, Minister for AI, as we discuss the security and ethical dimensions of AI, its impact on humanity, and the balance of opportunities and risks. Discover how we’re preparing the workforce for AI’s future and upcoming regulations to protect consumers from cyber crime.
It’s a first in the Cyber Series as in this episode we’re joined by Will Middleton, Cyber Director at the FCDO. Together, we delve into the evolving cyber threat landscape, discussing its impacts and future trajectories. Tune in for insights on strategies and actionable steps to combat cyber proliferation.
Welcome to life beyond passwords! In this episode, we explore the significance of passwords and envision a world without them. Despite their drawbacks, why are passwords still pervasive? Listen as we discuss the challenges of transitioning away from passwords and our pragmatic approach to password management best practices. Correction: at 19:37 we stated that a hardware token doesn’t count as a passkey, but this is incorrect – the FIDO alliance would now describe a hardware token as an example of a single-device passkey.
In this episode, we will uncover the crucial role of sharing cyber security insights. From enhancing resilience to fostering collective defence, discover why sharing information is paramount in combating cyber threats.
In our debut episode, we dissect the latest cyber crime trends from our Evolution of Cyber Crime paper [https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ncsc.gov.uk%2Fwhitepaper%2Fransomware-extortion-and-the-cyber-crime-ecosystem&data=05%7C02%7Cabi.v%40ncsc.gov.uk%7C51b036b34a78401c6cf808dc5899ae43%7C14aa5744ece1474ea2d734f46dda64a1%7C0%7C0%7C638482664279690435%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=MAxqkWemj7wsqzF2u6Q%2BhfkiJddy3DzMswDujo5axoo%3D&reserved=0], and unravel the MO behind ransomware attacks. From the attack mechanics themselves to mitigation strategies, join us as we explore the who, what and how of ransomware.
Available everywhere
Listen to Podimo on your phone, tablet, computer or car!
A universe of audio entertainment
Thousands of audiobooks and exclusive podcasts
No ads
Don't waste time listening to ad breaks when listening to Podimo's content.