Shared Security Podcast-logo

Shared Security Podcast

Technology Podcasts

Exploring the bonds shared between people and technology

Location:

United States

Description:

Exploring the bonds shared between people and technology

Twitter:

@sharedsec

Language:

English

Contact:

613-693-0997


Episodes
Ask host to enable sharing for playback control

Cybersecurity Talent Shortage: Myth, Mismatch, or Reality?

6/30/2025
Is there really a cybersecurity talent shortage, or are we just looking in all the wrong places? This week on the Shared Security Podcast, we tackle the buzz around the so-called cybersecurity skills gap. Host Tom Eston welcomes Katie Soper, Senior Consultant at Avetix Cyber and co-founder of the CyberVault Podcast, to discuss the challenges […] The post Cybersecurity Talent Shortage: Myth, Mismatch, or Reality? appeared first on Shared Security Podcast.

Duration:00:28:02

Ask host to enable sharing for playback control

Kids Online Safety Act (KOSA): Protecting Kids or Censorship?

6/23/2025
In this episode, we explore the Kids Online Safety Act (KOSA), a controversial bill aimed at protecting children online. Joined by co-host Scott Wright, we discuss the potential implications of KOSA, including concerns about censorship, mass surveillance, and the impact on free expression and online privacy. We also touch on the broad support for the […] The post Kids Online Safety Act (KOSA): Protecting Kids or Censorship? appeared first on Shared Security Podcast.

Duration:00:16:21

Ask host to enable sharing for playback control

Cities of the Future or Hacker’s Paradise? The Cybersecurity Risks of Smart Cities

6/16/2025
Join us as we explore the concept of smart cities—municipalities enhanced by connected technology like sensors, cameras, and automated systems to improve services and infrastructure. We discuss the inherent vulnerabilities that come with these advancements, including cybersecurity threats and real-life incidents such as hacked crosswalk signals featuring voices of tech moguls. Our discussion covers how […] The post Cities of the Future or Hacker’s Paradise? The Cybersecurity Risks of Smart Cities appeared first on Shared Security Podcast.

Duration:00:18:26

Ask host to enable sharing for playback control

Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths

6/9/2025
Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and how new mobile IDs fit into the TSA’s plans. We also discuss the broader implications for identity surveillance and who truly benefits from […] The post Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths appeared first on Shared Security Podcast.

Duration:00:24:14

Ask host to enable sharing for playback control

Invasion of Privacy: The Hidden Camera Dilemma

6/2/2025
Ever worried about hidden cameras in Airbnb rentals? You’re not alone! In this episode, we explore the unsettling rise of hidden cameras in personal spaces, the inadequacy of current laws, and practical tips to detect surveillance devices. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they share insights and discuss the implications of […] The post Invasion of Privacy: The Hidden Camera Dilemma appeared first on Shared Security Podcast.

Duration:00:20:17

Ask host to enable sharing for playback control

When AI Fights Back: Threats, Ethics, and Safety Concerns

5/26/2025
In this episode, we explore an incident where Anthropic’s AI, Claude, didn’t just resist shutdown but allegedly blackmailed its engineers. Is this a glitch or the beginning of an AI uprising? Along with co-host Kevin Johnson, we reminisce about past episodes, discuss AI safety and ethics, and examine the implications of AI mimicking human behaviors […] The post When AI Fights Back: Threats, Ethics, and Safety Concerns appeared first on Shared Security Podcast.

Duration:00:17:33

Ask host to enable sharing for playback control

Mark Zuckerberg’s Vision: AI Companions and the Loneliness Epidemic

5/19/2025
In this episode, we explore Mark Zuckerberg’s bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update listeners on the recent developments in the 23andMe bankruptcy case and what it means for former customers. Joining the conversation is co-host Scott […] The post Mark Zuckerberg’s Vision: AI Companions and the Loneliness Epidemic appeared first on Shared Security Podcast.

Duration:00:20:49

Ask host to enable sharing for playback control

Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009

5/12/2025
Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting vulnerabilities, and a pivotal Canadian privacy ruling involving Facebook. Gain insights into social media security from the past and see […] The post Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009 appeared first on Shared Security Podcast.

Duration:00:57:30

Ask host to enable sharing for playback control

What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development

5/5/2025
Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like ‘vibe coding’ — a novel, behavior-focused development approach, and ‘MCP’ (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of ‘slopsquatting,’ a new type of threat involving AI-generated […] The post What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development appeared first on Shared Security Podcast.

Duration:00:24:55

Ask host to enable sharing for playback control

The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order

4/28/2025
What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the cybersecurity industry, and the recent launch of the CVE Foundation. We also discuss the Trump Administration’s executive order that revoked the security […] The post The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order appeared first on Shared Security Podcast.

Duration:00:20:34

Ask host to enable sharing for playback control

Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities

4/21/2025
Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize asset and findings data, smarter workflow automation, and enhanced analytics. Guest speakers Dan DeCloss, CTO and founder of PlexTrac, and Sarah Foley, VP of […] The post Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities appeared first on Shared Security Podcast.

Duration:00:16:20

Ask host to enable sharing for playback control

US Border Searches and Protesting in the Surveillance Age

4/14/2025
Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and how to protect your personal information, especially when attending protests. Scott Wright joins the discussion to provide valuable insights on safeguarding your data. […] The post US Border Searches and Protesting in the Surveillance Age appeared first on Shared Security Podcast.

Duration:00:20:26

Ask host to enable sharing for playback control

The 23andMe Collapse, Signal Gate Fallout

4/7/2025
In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on the Signal Gate scandal involving top government officials, emphasizing the potential risks and lack of […] The post The 23andMe Collapse, Signal Gate Fallout appeared first on Shared Security Podcast.

Duration:00:21:34

Ask host to enable sharing for playback control

Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy

3/31/2025
In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how […] The post Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy appeared first on Shared Security Podcast.

Duration:00:09:57

Ask host to enable sharing for playback control

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows

3/24/2025
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various data sources, providing customized risk scoring, and enhancing remediation workflows. The episode offers an insightful […] The post From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows appeared first on Shared Security Podcast.

Duration:00:22:16

Ask host to enable sharing for playback control

Tackling Data Overload: Strategies for Effective Vulnerability Remediation

3/17/2025
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac. They share their expertise on the key data and workflow hurdles that security teams face today. […] The post Tackling Data Overload: Strategies for Effective Vulnerability Remediation appeared first on Shared Security Podcast.

Duration:00:29:38

Ask host to enable sharing for playback control

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes

3/10/2025
In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox’s privacy policy and what it means for user data. ** […] The post Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes appeared first on Shared Security Podcast.

Duration:00:20:21

Ask host to enable sharing for playback control

Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors

3/3/2025
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple’s decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightful discussion on the […] The post Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors appeared first on Shared Security Podcast.

Duration:00:23:55

Ask host to enable sharing for playback control

Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher

2/24/2025
In this episode, we welcome cybersecurity researcher and YouTube legend John Hammond. John shares insights from his career at Huntress and his popular YouTube channel, where he creates educational content on cybersecurity. He introduces his new platform, Just Hacking Training, aimed at providing affordable, high-quality training. John also discusses current trends in cybercrime, the role […] The post Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher appeared first on Shared Security Podcast.

Duration:00:17:08

Ask host to enable sharing for playback control

UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking

2/17/2025
In this episode, we discuss the UK government’s demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on privacy. We also discuss the first known case where AI chatbots were used in a stalking indictment, highlighting the dangers of technology misuse […] The post UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking appeared first on Shared Security Podcast.

Duration:00:16:06