Menu
Sign In Search Podcasts Libraries Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Technology Now

Can we protect ourselves from AI-powered cybercrime?

07 May 2026

Transcription

Chapter 1: What is the main topic discussed in this episode?

1.229 - 2.09 Sam Jarrell

Good morning, Michael.

0

2.47 - 6.155 Michael Bird

Good afternoon, Sam. How are you? How are you today?

0

6.175 - 8.397 Sam Jarrell

I am doing pretty well. How are you doing?

0

8.698 - 13.623 Michael Bird

I'm very good. Have you played any games recently? I know you mentioned that you're a gamer on the podcast several times.

0

14.104 - 14.424 Sam Jarrell

Yes.

14.504 - 15.766 Michael Bird

What sort of games do you play, Sam?

16.026 - 26.258 Sam Jarrell

All kinds. I love like cozy games, like a good farming sim from time to time. I used to back in the day be into like MMORPGs, but those are very time consuming games.

26.238 - 39.015 Michael Bird

You got all the right lingo. Anyway, Sam, when you're playing these games, do you feel like you're constantly having to adjust what you're doing to counter the threats or the villains or the enemy or potentially even other players as their gaming style develops?

39.265 - 43.23 Sam Jarrell

Sometimes, yes. I'd say generally, like as you're ramping up into a game, yes.

Chapter 2: What is the current threat landscape in cybersecurity?

872.215 - 893.582 David Hughes

Zero trust is really starting from the other end of nothing can connect to anything and then adding rules to allow access. So it's kind of an additive rather than subtractive approach. Now, as you pointed out, it can be frustrating for users that want to do something new. There may need to be a policy added for them to be able to do that.

0

893.562 - 911.524 David Hughes

But in terms of balancing the experience of the user with the safety of the user, I think people are realizing that in the current environment, it's much more tilted towards better to start with default deny, which is another word for zero trust.

0

913.987 - 920.194 Michael Bird

That was a great interview. Thank you so much, David, for your time. I really enjoyed having you on Technology Now. Now, Sam, what did you think of that?

0

920.242 - 938.855 Sam Jarrell

I honestly quite enjoyed the conversation there at the end about zero trust and starting from the opposite end, which is like default deny to then adding roles. It actually makes me think a little bit about how communications functions. So you don't want something to leak, for example, then You default deny everyone who doesn't need to be working on it. Right.

0

938.895 - 953.05 Sam Jarrell

And then slowly over time, you start to bring in more and more people. The closer you get to announcing something, that way you can keep track of who is in the know about something so that it doesn't go where it's not supposed to. So the zero trust model actually feels very familiar to me.

953.03 - 967.91 Michael Bird

We did an episode a few weeks back. We talked about self-driving networks and it's a really similar conversation. You have to think about your network in a different way. If you start from nobody has access to anything and then add things in. I just want to talk about the threat landscape as it relates to AI and generative AI.

967.93 - 982.75 Michael Bird

You know, one of the things that I thought was really interesting was the fact that we've maybe come from a place where if you wanted to create an attack, you would have to probably write your own piece of code. But we live in the world of vibe coding. You know, you could probably vibe code something like that.

982.882 - 983.703 Sam Jarrell

Yeah, that's true.

Chapter 3: How is AI changing the dynamics of cyber attacks?

983.723 - 999.52 Sam Jarrell

I don't know if you look at the Threat Labs report, it's called In the Wild. I've taken a look through it. And what's interesting to me is like how automated these attack campaigns and deep fakes can become at this stage. So it's almost like the same as like you would try to automate processes within an actual business.

0

999.54 - 1014.056 Sam Jarrell

And that's how a lot of these cybercrime organizations are functioning now is more like a Fortune 500 and less like an underground seedy institution. But use of AI for like deep faking or phishing and things like that. That to me is scary.

0

1014.076 - 1031.998 Sam Jarrell

And I feel as though I've heard stories about like now there's needs to be like more human level security protocols with people because you'll have a person who's being impersonated maybe on the phone calling a lower level person and that person works in finance and they're being directed to do something that they're actually not supposed to do.

0

1032.118 - 1051.515 Sam Jarrell

But they're getting the pressure of I'm the CEO or I'm the CFO. I'm telling you I'm giving permission. But now there need to be more human sort of level protocols where it's like, is there a secret word that only you know and you've spoken verbally? Or how do you prevent the impersonation from threatening your organization? So to me, that's a fascinating conversation.

0

1051.63 - 1069.419 Michael Bird

I've actually had this conversation with family members and I basically said, if you get a call or even a video call from me and I'm asking for money or something that's suspicious, here's what I want you to do. I'm not going to say on this podcast, but to try and add a human element to it, because you're right, even in the last year, it's become so much more sophisticated.

1069.94 - 1075.849 Michael Bird

And I think saying I could recognize a deepfaked video, I think that's potentially a risky thing to do, to rely on that.

1075.829 - 1088.243 Sam Jarrell

It starts to introduce more and more of the need for these analog processes, which used to feel quite outdated in order to protect us from these much more modern attacks, right? So it's funny how it all kind of comes back full circle again.

1088.263 - 1103.541 Michael Bird

Yeah, I think that's quite interesting. Now, Sam, obviously things change incredibly quickly in the world of cybersecurity. However, I did think it was important to leave our interview with a final thought from David about what he thinks people should be doing to stay ahead of the curve when it comes to emerging threats.

1103.774 - 1130.98 David Hughes

There's always been the saying, defense in depth or multi-layer defense. People need to be adopting all the technology they can versus putting all their eggs in one basket and thinking that there's one miracle cure. But what I'd say is that for HPE networking, we are really focused on making sure our customers are able to use their network as part of an overall security solution, making sure that

Comments

There are no comments yet.

Please log in to write the first comment.