Data Privacy

The Urgent Need for Tokenizing Personally Identifiable Information
If we want privacy, trust and resilience in our digital infrastructure, tokenization is no longer optional. It’s essential. ...
Security Boulevard

US Border Searches and Protesting in the Surveillance Age
Tom Eston | | Civil Liberties, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Device Confiscation, Digital Privacy, Electronic Device Search, Episodes, government surveillance, Information Security, Infosec, Meshtastic, Podcast, Podcasts, Privacy, Protest, Protest Communication, Protest Safety, Protesting in the Surveillance Age, secure communication, security, Smartphone Security, surveillance, Surveillance Self Defense, technology, Travel Tips, Travel Warning, US Border Searches, Weekly Edition
Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and ...

Microsoft Moves Forward With Controversial Recall Feature
Microsoft a year ago was about to launch Recall, a Windows feature for Copilot+ PCs that takes regular screenshots of users' systems and stores them so they can be searched for later ...
Security Boulevard

Top 9 User Authentication Methods to Stay Secure in 2025
Discover the top authentication methods shaping digital security in 2025. From passwordless login and adaptive MFA to biometrics and secure passkeys, learn how to protect your digital identities effectively. Strengthen security and ...

Authentication vs Authorization: What’s the Difference?
Authentication and authorization are often confused but play very different roles in cybersecurity. This blog breaks down what each term means, why authentication always comes first, and how both work together to ...

The 23andMe Collapse, Signal Gate Fallout
Tom Eston | | 23andMe, Bankruptcy, Cyber Security, cyber threat, Cybersecurity, data deletion, Data Privacy, data retention, Data Security, Digital Privacy, DNA, DNA Privacy, Episodes, Genetic Testing, Government Accountability, Information Security, Infosec, Legal Challenges, Military Protocol, personal data, Podcast, Podcasts, Privacy, security, signal, Signal Gate, technology, Weekly Edition
In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin ...

Guide to Authentication Methods & Choosing the Right One
Choosing the right authentication method can impact security, compliance, and user experience. This blog breaks down various authentication types and factors to consider in 2025 and also portrays how LoginRadius makes secure, ...

Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy
Tom Eston | | AI, AI and Privacy, AI models, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, Digital Surveillance, EBay, eBay Privacy Policy, Episodes, Information Security, Infosec, LLM, Podcast, Podcasts, Privacy, security, Smart Privacy, Tech Podcast, Tech Policy, technology, Weekly Edition
In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage ...

What is Token Authentication and How Does It Work?
As digital systems evolve toward APIs and microservices, traditional access methods no longer cut it. Token-based authentication—fast, scalable, and secure—has emerged as the standard, especially after OAuth 2.0's release in 2012. This ...

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover ...