NCSC Cyber Series
Podcast door National Cyber Security Centre
Deze podcast is gratis te beluisteren op alle podcastplatformen en de Podimo-app zonder abonnement.
Alle afleveringen
5 afleveringenWelcome to Artificial Intelligence! In this episode we’re joined by Viscount Camrose, Minister for AI, as we discuss the security and ethical dimensions of AI, its impact on humanity, and the balance of opportunities and risks. Discover how we’re preparing the workforce for AI’s future and upcoming regulations to protect consumers from cyber crime.
It’s a first in the Cyber Series as in this episode we’re joined by Will Middleton, Cyber Director at the FCDO. Together, we delve into the evolving cyber threat landscape, discussing its impacts and future trajectories. Tune in for insights on strategies and actionable steps to combat cyber proliferation.
Welcome to life beyond passwords! In this episode, we explore the significance of passwords and envision a world without them. Despite their drawbacks, why are passwords still pervasive? Listen as we discuss the challenges of transitioning away from passwords and our pragmatic approach to password management best practices. Correction: at 19:37 we stated that a hardware token doesn’t count as a passkey, but this is incorrect – the FIDO alliance would now describe a hardware token as an example of a single-device passkey.
In this episode, we will uncover the crucial role of sharing cyber security insights. From enhancing resilience to fostering collective defence, discover why sharing information is paramount in combating cyber threats.
In our debut episode, we dissect the latest cyber crime trends from our Evolution of Cyber Crime paper [https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ncsc.gov.uk%2Fwhitepaper%2Fransomware-extortion-and-the-cyber-crime-ecosystem&data=05%7C02%7Cabi.v%40ncsc.gov.uk%7C51b036b34a78401c6cf808dc5899ae43%7C14aa5744ece1474ea2d734f46dda64a1%7C0%7C0%7C638482664279690435%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=MAxqkWemj7wsqzF2u6Q%2BhfkiJddy3DzMswDujo5axoo%3D&reserved=0], and unravel the MO behind ransomware attacks. From the attack mechanics themselves to mitigation strategies, join us as we explore the who, what and how of ransomware.
Overal beschikbaar
Luister naar Podimo op je telefoon, tablet, computer of auto!
Een universum van audio-entertainment
Duizenden luisterboeken en exclusieve podcasts
Geen advertenties
Verspil geen tijd met het luisteren naar reclameblokken wanneer je luistert naar de exclusieve shows van Podimo.