technology

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover ...

Google’s $32B Wiz Acquisition: A Watershed Moment in Cloud Security M&A
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Cybersecurity, future, SBN News, technology
Google acquires cloud security leader Wiz for $32B—the largest cybersecurity deal ever. This historic purchase boosts Google Cloud's security offerings, enhances its multicloud capabilities, and intensifies competition with Microsoft and AWS in ...

Tackling Data Overload: Strategies for Effective Vulnerability Remediation
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and ...

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes
Tom Eston | | Browser Privacy, Canadian Tariffs, cisa, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Firefox Privacy, Government Policy, Information Security, Infosec, internet privacy, Mozilla, online security, Podcast, Podcasts, Privacy, privacy rights, Putin, Russia, Russian Cyber Threat, security, Tech Talk, technology, Technology News, Trump, Trump Administration, US Cyber Command, Weekly Edition
In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation ...

The Rise of Digital Passports: Navigating the Security Implications
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | AI (Artificial Intelligence), Awareness, Digital Identity, future, technology
Delve into the world of digital passports, understanding their benefits, security challenges, and how they're transforming identity verification and travel experiences ...

Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors
Tom Eston | | Apple, canada, cisa, Concerns, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, DOGE, economy, encryption, Encryption Backdoor, Episodes, government, Impact, Incompetence, Information Security, Infosec, Jokes, national security, Phishing, Podcast, Podcasts, Privacy, security, technology, Trump, uk, Weekly Edition
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on ...

Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension
Imagine that your AI transcriber tool shapeshifts into your password manager, then your crypto wallet and finally into your banking app — all without your knowledge. This is exactly what polymorphic extensions can do ...

Mozilla’s Data Practices and Privacy Evolution: Recent Developments
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Awareness, data protection, Data Security, Privacy, SBN News, technology
Dive into Mozilla's controversial 2025 privacy changes, including removed 'no data sale' guarantees and Git repository security upgrades. Understand the balance between legal compliance, AI integration, and user trust in Firefox's evolving ...

Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher
Tom Eston | | AI in Cybercrime, Capture the Flag, Cyber Security, cyber threat, Cybercrime Trends, Cybersecurity, cybersecurity education, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, John Hammond, Just Hacking Training, Malware Analysis, online training, Podcast, Podcasts, Privacy, security, Security Researcher, Shared Security Podcast, Snyk Event, social engineering, technology, Web security, Weekly Edition, YouTube
In this episode, we welcome cybersecurity researcher and YouTube legend John Hammond. John shares insights from his career at Huntress and his popular YouTube channel, where he creates educational content on cybersecurity ...

The Evolution and Impact of AI-Powered Deep Search Tools in 2025
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | AI (Artificial Intelligence), AI and B2B SaaS growth, Artificial Intelligence, future, search, technology
AI-powered deep search tools are transforming 2025's digital landscape. This analysis covers advancements in NLP, enterprise solutions, ethical AI challenges, and their impact across industries. Learn how autonomous agents and multimodal systems ...