The Shared Security Show
Exploring the bonds shared between people and technology

Tackling Data Overload: Strategies for Effective Vulnerability Remediation
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and ...

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes
Tom Eston | | Browser Privacy, Canadian Tariffs, cisa, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Firefox Privacy, Government Policy, Information Security, Infosec, internet privacy, Mozilla, online security, Podcast, Podcasts, Privacy, privacy rights, Putin, Russia, Russian Cyber Threat, security, Tech Talk, technology, Technology News, Trump, Trump Administration, US Cyber Command, Weekly Edition
In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation ...

Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors
Tom Eston | | Apple, canada, cisa, Concerns, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, DOGE, economy, encryption, Encryption Backdoor, Episodes, government, Impact, Incompetence, Information Security, Infosec, Jokes, national security, Phishing, Podcast, Podcasts, Privacy, security, technology, Trump, uk, Weekly Edition
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on ...

Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher
Tom Eston | | AI in Cybercrime, Capture the Flag, Cyber Security, cyber threat, Cybercrime Trends, Cybersecurity, cybersecurity education, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, John Hammond, Just Hacking Training, Malware Analysis, online training, Podcast, Podcasts, Privacy, security, Security Researcher, Shared Security Podcast, Snyk Event, social engineering, technology, Web security, Weekly Edition, YouTube
In this episode, we welcome cybersecurity researcher and YouTube legend John Hammond. John shares insights from his career at Huntress and his popular YouTube channel, where he creates educational content on cybersecurity ...

UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking
Tom Eston | | AI chatbots, AI Risks, Apple Privacy, Canada-US Relations, Click Armor, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Deepfake Crimes, Digital Privacy, Employee Cyber Confidence, Encryption Debate, Episodes, Global Issues, Government Backdoors, Information Security, Infosec, Podcast, Podcasts, Privacy, security, social media, Stalking, technology, UK Investigatory Powers Act, Weekly Edition
In this episode, we discuss the UK government’s demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on ...

Careers in Cybersecurity: Myths and Realities with Kathleen Smith
Tom Eston | | Career Advice, Career Challenges, Career Development, Cyber Community, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Careers, Data Privacy, Digital Privacy, Episodes, Hiring Managers, Information Security, Infosec, Job Market, Job search, Job Skills, networking, Podcast, Podcasts, Privacy, professional development, recruiting, Recruitment Strategies, Resume Tips, Salary Transparency, security, technology, Weekly Edition, Workforce Shortage
In this episode we welcome Kathleen Smith, CMO of ClearedJobs.net, to discuss the current state of the cybersecurity job market. Kathleen shares her extensive experience in the field, recounting her tenure in ...
Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI
Tom Eston | | AI, AI Risks, china, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Data Security, DeepSeek, DeepSeek AI, Digital Drivers Licenses, digital id, Digital Privacy, drivers license, Episodes, government, Information Security, Infosec, law enforcement, open source, Podcast, Podcasts, police, Privacy, security, technology, Technology Policy, Weekly Edition
In this episode, we explore the rollout of digital driver’s licenses in states like Illinois and the potential privacy issues that come with them. Can digital IDs truly enhance convenience without compromising ...

Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed
Tom Eston | | 30 Million Data Points, Cyber Security, cyber threat, Cybersecurity, Data Broker, Data Privacy, Data Regulation, Digital Privacy, Episodes, Gravy Analytics, Gravy Analytics Breach, Information Security, Infosec, Location Data Leak, Personal Data Auction, Podcast, Podcasts, Privacy, Privacy Legislation, Real-Time Bidding, security, Smart Cars Security, Subaru, Subaru Starlink Vulnerability, Subaru Vehicle Controls, technology, Vehicle Hacking, Vulnerability Exploitation, Weekly Edition
In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in ...

Meta Ditches Fact-Checking for Community Notes, RedNote and the TikTok Ban
Tom Eston | | AI, AI News, AI privacy, Community Notes, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, ed tech, Episodes, Fact Checking, facts, Freedom of speech, Gen Z, Government Policy, Information Security, Infosec, journalism, Media Manipulation, Meta, Misinformation, Ottawa, Podcast, Podcasts, Privacy, RedNote, security, social media, social networking, technology, TikTok, TikTok Ban, Weekly Edition, Youth Trends
In this episode, we explore Meta’s recent decision to replace traditional fact-checking with community notes and its potential impact on misinformation. We also discuss the implications of a TikTok ban in the ...

AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude
Tom Eston | | AI, AI Concerns, AI privacy, AI Regulation, AI Trends, Anthropic, ChatGPT, Claude, Cyber Security, cyber threat, Cybersecurity, Data Privacy, data protection, Data Security, Digital Privacy, Episodes, Gemini, generative AI, Information Security, Infosec, Podcast, Podcasts, Privacy, Privacy Policies, Safety in AI, security, Tech Ethics, Tech Podcast, technology, Weekly Edition
Do you ever read the privacy policy of your favorite AI tools like ChatGPT, Gemini, or Claude? In this episode, Scott Wright and Tom Eston discuss the critical aspects of these policies, ...