<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Conscia UK</provider_name><provider_url>https://conscia.com/uk</provider_url><author_name>Liam James</author_name><author_url>https://conscia.com/uk/blog/author/lcjconscia-com/</author_url><title>Episode 03&#xA0;- Zero Trust</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="YF272angVs"&gt;&lt;a href="https://conscia.com/uk/videos/episode-03-zero-trust/"&gt;Episode 03&#xA0;&#x2013; Zero Trust&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://conscia.com/uk/videos/episode-03-zero-trust/embed/#?secret=YF272angVs" width="600" height="338" title="&#x201C;Episode 03&#xA0;&#x2013; Zero Trust&#x201D; &#x2014; Conscia UK" data-secret="YF272angVs" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><thumbnail_url>https://conscia.com/uk/wp-content/uploads/2025/03/podcast_thumb_03.jpg</thumbnail_url><thumbnail_width>1500</thumbnail_width><thumbnail_height>1500</thumbnail_height><description>Zero Trust is becoming a core pillar of cyber security for many organisations &#x2013; and with good reason. We break down the concept into its simplest parts, and step through exactly how it differs from the more traditional approaches that came before it. We&#x2019;ll review how its adoption in the public sector has helped protect critical systems and data, as well as how it can help insulate organisations from risks such as those posed by third-party suppliers and endpoint devices. We take a high-level view of how to get started with Zero Trust, before ending on the potential user impacts that implementation can have, and how to mitigate any suboptimal user experiences.</description></oembed>
