Shared Security Podcast
Exploring the bonds shared between people and technology

US Border Searches and Protesting in the Surveillance Age
Tom Eston | | Civil Liberties, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Device Confiscation, Digital Privacy, Electronic Device Search, Episodes, government surveillance, Information Security, Infosec, Meshtastic, Podcast, Podcasts, Privacy, Protest, Protest Communication, Protest Safety, Protesting in the Surveillance Age, secure communication, security, Smartphone Security, surveillance, Surveillance Self Defense, technology, Travel Tips, Travel Warning, US Border Searches, Weekly Edition
Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and ...

The 23andMe Collapse, Signal Gate Fallout
Tom Eston | | 23andMe, Bankruptcy, Cyber Security, cyber threat, Cybersecurity, data deletion, Data Privacy, data retention, Data Security, Digital Privacy, DNA, DNA Privacy, Episodes, Genetic Testing, Government Accountability, Information Security, Infosec, Legal Challenges, Military Protocol, personal data, Podcast, Podcasts, Privacy, security, signal, Signal Gate, technology, Weekly Edition
In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin ...

Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy
Tom Eston | | AI, AI and Privacy, AI models, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, Digital Surveillance, EBay, eBay Privacy Policy, Episodes, Information Security, Infosec, LLM, Podcast, Podcasts, Privacy, security, Smart Privacy, Tech Podcast, Tech Policy, technology, Weekly Edition
In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage ...

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover ...

Tackling Data Overload: Strategies for Effective Vulnerability Remediation
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and ...

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes
Tom Eston | | Browser Privacy, Canadian Tariffs, cisa, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Firefox Privacy, Government Policy, Information Security, Infosec, internet privacy, Mozilla, online security, Podcast, Podcasts, Privacy, privacy rights, Putin, Russia, Russian Cyber Threat, security, Tech Talk, technology, Technology News, Trump, Trump Administration, US Cyber Command, Weekly Edition
In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation ...

Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors
Tom Eston | | Apple, canada, cisa, Concerns, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, DOGE, economy, encryption, Encryption Backdoor, Episodes, government, Impact, Incompetence, Information Security, Infosec, Jokes, national security, Phishing, Podcast, Podcasts, Privacy, security, technology, Trump, uk, Weekly Edition
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on ...

Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher
Tom Eston | | AI in Cybercrime, Capture the Flag, Cyber Security, cyber threat, Cybercrime Trends, Cybersecurity, cybersecurity education, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, John Hammond, Just Hacking Training, Malware Analysis, online training, Podcast, Podcasts, Privacy, security, Security Researcher, Shared Security Podcast, Snyk Event, social engineering, technology, Web security, Weekly Edition, YouTube
In this episode, we welcome cybersecurity researcher and YouTube legend John Hammond. John shares insights from his career at Huntress and his popular YouTube channel, where he creates educational content on cybersecurity ...

UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking
Tom Eston | | AI chatbots, AI Risks, Apple Privacy, Canada-US Relations, Click Armor, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Deepfake Crimes, Digital Privacy, Employee Cyber Confidence, Encryption Debate, Episodes, Global Issues, Government Backdoors, Information Security, Infosec, Podcast, Podcasts, Privacy, security, social media, Stalking, technology, UK Investigatory Powers Act, Weekly Edition
In this episode, we discuss the UK government’s demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on ...

Careers in Cybersecurity: Myths and Realities with Kathleen Smith
Tom Eston | | Career Advice, Career Challenges, Career Development, Cyber Community, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Careers, Data Privacy, Digital Privacy, Episodes, Hiring Managers, Information Security, Infosec, Job Market, Job search, Job Skills, networking, Podcast, Podcasts, Privacy, professional development, recruiting, Recruitment Strategies, Resume Tips, Salary Transparency, security, technology, Weekly Edition, Workforce Shortage
In this episode we welcome Kathleen Smith, CMO of ClearedJobs.net, to discuss the current state of the cybersecurity job market. Kathleen shares her extensive experience in the field, recounting her tenure in ...