Podcast

US Border Searches and Protesting in the Surveillance Age
Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and ...

The 23andMe Collapse, Signal Gate Fallout
In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin ...

Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy
In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage ...

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover ...

Breaking Down Risks in Cybersecurity
Cyber Crime Junkies podcast Breaking Down Risks in Cybersecurity – A great conversation on the Cyber Crime Junkies podcast with David Mauro! We covered so many different topics that the CISOs are ...

Tackling Data Overload: Strategies for Effective Vulnerability Remediation
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and ...
How to address AI in your cyber security program
Artificial intelligence (AI) is rapidly changing the way we design our cyber security programs, creating both new opportunities and challenges for security managers. As AI-driven threats ...

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes
In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation ...

What makes cyber security training boring and how to improve it
Cybersecurity training is essential, but let’s face it—it often ends up being dull and forgettable. In our latest panel discussion, security experts tackled this challenge head-on, ...

Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on ...