Player FM - Internet Radio Done Right
99 subscribers
Checked 2d ago
Menambahkan ten tahun yang lalu
Konten disediakan oleh Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Player FM - Aplikasi Podcast
Offline dengan aplikasi Player FM !
Offline dengan aplikasi Player FM !
Shared Security Podcast
Tandai semua (belum/sudah) diputar ...
Manage series 59213
Konten disediakan oleh Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strategies, and tools to live confidently and safeguard your digital life.
…
continue reading
508 episode
Tandai semua (belum/sudah) diputar ...
Manage series 59213
Konten disediakan oleh Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strategies, and tools to live confidently and safeguard your digital life.
…
continue reading
508 episode
Semua episode
×S
Shared Security Podcast

1 Mark Zuckerberg’s Vision: AI Companions and the Loneliness Epidemic 20:49
20:49
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai20:49
In this episode, we explore Mark Zuckerberg’s bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update listeners on the recent developments in the 23andMe bankruptcy case and what it means for former customers. Joining the conversation is co-host Scott Wright, who shares his insights on AI, social media, privacy, and a thought-provoking book on the potential for a future US civil war. We touch on the eerie predictions of AI companionship and what this might entail for societal norms. Tune in for a stimulating discussion on technology, privacy, and the shifting landscape of human interaction. ** Links mentioned on the show ** The Next Civil War: Dispatches from the American Future https://www.amazon.com/Next-Civil-War-Dispatches-American/dp/1982123214 Zuckerberg’s Grand Vision: Most of Your Friends Will Be AI https://www.msn.com/en-us/technology/artificial-intelligence/zuckerberg-s-grand-vision-most-of-your-friends-will-be-ai/ar-AA1EjI6Q https://tech.yahoo.com/social-media/articles/zuckerberg-says-response-loneliness-epidemic-161345202.html 23andMe customers notified of bankruptcy and potential claims — deadline to file is July 14 https://techcrunch.com/2025/05/11/23andme-customers-notified-of-bankruptcy-and-potential-claims-deadline-to-file-is-july-14/ ** Watch this episode on YouTube ** https://youtu.be/bpMXQL7WXEg ** Become a Shared Security Supporter ** Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity ** Thank you to our sponsors! ** SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. Click Armor To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post Mark Zuckerberg’s Vision: AI Companions and the Loneliness Epidemic appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009 57:30
57:30
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai57:30
Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting vulnerabilities, and a pivotal Canadian privacy ruling involving Facebook. Gain insights into social media security from the past and see how much has (or hasn’t) changed. Don’t miss out on this informative episode on web application security, user privacy, and the efforts to keep social media safe. ** Links mentioned on the show ** Original show notes from episode 2 of the “Social Media Security Podcast” https://sharedsecurity.net/2009/09/27/social-media-security-podcast-2-month-of-facebook-bugs-what-is-xss-canadian-privacy-ruling/ ** Watch this episode on YouTube ** https://youtu.be/kRyhQmTVYiA ** Become a Shared Security Supporter ** Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity ** Thank you to our sponsors! ** SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. Click Armor To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009 appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development 24:55
24:55
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai24:55
Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like ‘vibe coding’ — a novel, behavior-focused development approach, and ‘MCP’ (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of ‘slopsquatting,’ a new type of threat involving AI-generated package names. Our co-hosts Scott Wright and Kevin Johnson discuss these topics, share personal insights, and ponder the future of coding in the AI era. Additionally, we draw some intriguing parallels between AI advancements and past practices, highlighting the need for oversight and security in this evolving landscape. ** Links mentioned on the show ** What is “vibe coding”? https://www.geeksforgeeks.org/what-is-vibe-coding/ https://www.forbes.com/sites/nishatalagala/2025/03/30/what-is-vibe-coding-and-why-should-you-care/ What is Model Context Protocol (MCP)? https://modelcontextprotocol.io/introduction https://www.anthropic.com/news/model-context-protocol https://en.wikipedia.org/wiki/Model_Context_Protocol AI hallucinations lead to a new cyber threat: Slopsquatting https://www.csoonline.com/article/3961304/ai-hallucinations-lead-to-new-cyber-threat-slopsquatting.html ** Watch this episode on YouTube ** https://youtu.be/vi7a9ciHPjg ** Become a Shared Security Supporter ** Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity ** Thank you to our sponsors! ** SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. Click Armor To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order 20:34
20:34
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai20:34
What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the cybersecurity industry, and the recent launch of the CVE Foundation. We also discuss the Trump Administration’s executive order that revoked the security clearance of former CISA Director Chris Krebs, following his declaration that the 2020 election was the most secure in history. Join us as we unpack the impact of these events on the cybersecurity landscape and what it means for the future. ** Links mentioned on the show ** Uncle Sam kills funding for CVE program. Yes, that CVE program https://www.theregister.com/2025/04/16/homeland_security_funding_for_cve/ CISA extends MITRE-backed CVE contract hours before its lapse https://www.nextgov.com/cybersecurity/2025/04/cisa-extends-mitre-backed-cve-contract-hours-its-lapse/404601/ Trump orders probe of former cybersecurity chief for declaring 2020 election secure https://www.usatoday.com/story/news/politics/2025/04/09/trump-orders-probe-krebs-2020-election/83016002007/ Where to buy Tom’s “Enjoy CyberCrime” t-shirt https://dustrial.net/ ** Watch this episode on YouTube ** https://youtu.be/y7RZdLYSXSc ** Become a Shared Security Supporter ** Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity ** Thank you to our sponsors! ** SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. Click Armor To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities 16:20
16:20
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai16:20
Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize asset and findings data, smarter workflow automation, and enhanced analytics. Guest speakers Dan DeCloss, CTO and founder of PlexTrac, and Sarah Foley, VP of Product at PlexTrac, share insights and demonstrate upcoming features. Learn about PlexTrac’s Continuous Threat Exposure Management (CTEM) framework and their exciting plans for RSA. To find out more information about PlexTrac and to get a demo visit: PlexTrac.com/SharedSecurity ** Links mentioned on the show ** PlexTrac Series Part 1 – Tackling Data Overload: Strategies for Effective Vulnerability Remediation https://sharedsecurity.net/2025/03/17/tackling-data-overload-strategies-for-effective-vulnerability-remediation/ PlexTrac Series Part 2 – From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows https://sharedsecurity.net/2025/03/24/from-spreadsheets-to-solutions-how-plextrac-enhances-security-workflows/ Connect with Dan DeCloss https://www.linkedin.com/in/ddecloss/ Connect with Sara Foley https://www.linkedin.com/in/sara-foley-aa991a3/ Find out more about PlexTrac https://plextrac.com/sharedsecurity ** Watch this episode on YouTube ** https://youtu.be/9rfZ1UMLH2U ** Become a Shared Security Supporter ** Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity ** Thank you to our sponsors! ** SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. Click Armor To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 US Border Searches and Protesting in the Surveillance Age 20:26
20:26
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai20:26
Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and how to protect your personal information, especially when attending protests. Scott Wright joins the discussion to provide valuable insights on safeguarding your data. Also covered are newer communication technologies like Meshtastic and advice on physical security measures to consider. ** Links mentioned on the show ** So you want to go to the USA? Are you sure? Here’s how to prepare your machines for Trumpistan https://www.theguardian.com/commentisfree/picture/2025/apr/07/so-you-want-to-go-to-the-usa-are-you-sure-heres-how-to-prepare-your-machines-for-trumpistan Canada warns travelers of US border agents’ authority to search electronic devices https://edition.cnn.com/2025/04/05/world/canada-travel-advisory-us-electronic-devices-intl-latam/index.html The Protesters’ Guide to Smartphone Security https://www.privacyguides.org/articles/2025/01/23/activists-guide-securing-your-smartphone/ EFF’s Surveillance Self-Defense – Attending a Protest https://ssd.eff.org/module/attending-protest Meshtastic – An open source, off-grid, decentralized, mesh network built to run on affordable, low-power devices https://meshtastic.org/docs/introduction/ ** Watch this episode on YouTube ** https://youtu.be/N7yMtsW8NBo ** Become a Shared Security Supporter ** Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity ** Thank you to our sponsors! ** SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. Click Armor To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post US Border Searches and Protesting in the Surveillance Age appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 The 23andMe Collapse, Signal Gate Fallout 21:34
21:34
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai21:34
In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on the Signal Gate scandal involving top government officials, emphasizing the potential risks and lack of accountability. We also touch on the importance of proper communication and document retention in government operations. Stay tuned for insights and steps you can take to protect your data. ** Links mentioned on the show ** What happens to your data if 23andMe collapses? https://news.harvard.edu/gazette/story/2025/03/what-happens-to-your-genetic-data-if-23andme-collapses/ https://www.linkedin.com/posts/jenniferminella_updated-privacy-psa-23andme-is-filing-activity-7309933153299693568-rNBF John Oliver Responds To Signal Group Chat Leak With His Own Emojis: “Go F— Yourselves, A–holes, Love America” https://deadline.com/2025/03/john-oliver-last-week-tonight-signal-group-chat-emoji-trump-1236354365/ https://www.theatlantic.com/politics/archive/2025/03/trump-administration-accidentally-texted-me-its-war-plans/ ** Watch this episode on YouTube ** https://youtu.be/Rv5GVfv4TeQ ** Become a Shared Security Supporter ** Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity ** Thank you to our sponsors! ** SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. Click Armor To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post The 23andMe Collapse, Signal Gate Fallout appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy 9:57
9:57
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai9:57
In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how AI is transforming our understanding of privacy and the potential increase in AI-driven surveillance. Tune in for insights on navigating these evolving challenges and the future of data privacy. ** Links mentioned on the show ** If you use eBay (new privacy changes) , toggle “AI training” preference off. https://www.reddit.com/r/privacy/comments/1je9wlk/if_you_use_ebay_new_privacy_changes_toggle_ai/ AI is slowly making privacy for “normal” people obsolete. https://www.reddit.com/r/privacy/comments/1jdmpea/ai_is_slowly_making_privacy_for_normal_people/ ** Watch this episode on YouTube ** https://youtu.be/6wN1v4KnMW0 ** Become a Shared Security Supporter ** Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity ** Thank you to our sponsors! ** SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. Click Armor To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows 22:16
22:16
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai22:16
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various data sources, providing customized risk scoring, and enhancing remediation workflows. The episode offers an insightful look into PlexTrac’s powerful features, real-world success stories, and how these tools help teams prioritize and act on critical findings efficiently. Don’t miss out on learning how to turn overwhelming data into actionable insights and maintain better data security. PlexTrac provides practitioners with an automated alternative for the most time-consuming parts of vulnerability management, including consolidating data, surfacing insights, prioritizing findings, and managing hand-offs to and from remediation teams. Find out more by visiting plextrac.com/sharedsecurity ! ** Links mentioned on the show ** PlexTrac Series Part 1 – Tackling Data Overload: Strategies for Effective Vulnerability Remediation https://sharedsecurity.net/2025/03/17/tackling-data-overload-strategies-for-effective-vulnerability-remediation/ Connect with Dan DeCloss https://www.linkedin.com/in/ddecloss/ Find out more about PlexTrac https://plextrac.com/sharedsecurity ** Watch this episode on YouTube ** ** Become a Shared Security Supporter ** Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity ** Thank you to our sponsors! ** PlexTrac PlexTrac provides practitioners with an automated alternative for the most time-consuming parts of vulnerability management, including consolidating data, surfacing insights, prioritizing findings, and managing hand-offs to and from remediation teams. Find out more by visiting plextrac.com/sharedsecurity ! SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. Click Armor To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Tackling Data Overload: Strategies for Effective Vulnerability Remediation 29:38
29:38
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai29:38
In part one of our three part series with PlexTrac , we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac. They share their expertise on the key data and workflow hurdles that security teams face today. From managing influxes of scanner data and asset management tools to prioritizing meaningful security actions, this episode offers valuable insights. Learn about the importance of context, the integration of threat intelligence, the future role of automation, and AI, and how these can transform the cybersecurity landscape. Tune in to stay ahead in your security strategies and practices. PlexTrac provides practitioners with an automated alternative for the most time-consuming parts of vulnerability management, including consolidating data, surfacing insights, prioritizing findings, and managing hand-offs to and from remediation teams. Find out more by visiting plextrac.com/sharedsecurity ! ** Links mentioned on the show ** Connect with Dahvid Schloss https://www.linkedin.com/in/dahvidschloss/ Connect with Dan DeCloss https://www.linkedin.com/in/ddecloss/ Find out more about PlexTrac https://plextrac.com/sharedsecurity ** Watch this episode on YouTube ** ** Become a Shared Security Supporter ** Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity ** Thank you to our sponsors! ** PlexTrac PlexTrac provides practitioners with an automated alternative for the most time-consuming parts of vulnerability management, including consolidating data, surfacing insights, prioritizing findings, and managing hand-offs to and from remediation teams. Find out more by visiting plextrac.com/sharedsecurity ! SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. Click Armor To find out how gamification of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post Tackling Data Overload: Strategies for Effective Vulnerability Remediation appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes 20:21
20:21
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai20:21
In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox’s privacy policy and what it means for user data. ** […] The post Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors 23:55
23:55
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai23:55
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple’s decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightful discussion on the […] The post Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher 17:08
17:08
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai17:08
In this episode, we welcome cybersecurity researcher and YouTube legend John Hammond. John shares insights from his career at Huntress and his popular YouTube channel, where he creates educational content on cybersecurity. He introduces his new platform, Just Hacking Training, aimed at providing affordable, high-quality training. John also discusses current trends in cybercrime, the role […] The post Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking 16:06
16:06
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai16:06
In this episode, we discuss the UK government’s demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on privacy. We also discuss the first known case where AI chatbots were used in a stalking indictment, highlighting the dangers of technology misuse […] The post UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Careers in Cybersecurity: Myths and Realities with Kathleen Smith 24:00
24:00
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai24:00
In this episode we welcome Kathleen Smith, CMO of ClearedJobs.net, to discuss the current state of the cybersecurity job market. Kathleen shares her extensive experience in the field, recounting her tenure in various cybersecurity events and her contributions to job market research and recruiting. She discusses challenges such as distinguishing between genuine workforce shortages and […] The post Careers in Cybersecurity: Myths and Realities with Kathleen Smith appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI 25:29
25:29
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai25:29
In this episode, we explore the rollout of digital driver’s licenses in states like Illinois and the potential privacy issues that come with them. Can digital IDs truly enhance convenience without compromising your privacy? We also discuss the new Chinese AI model, DeepSeek, which is affecting U.S. tech companies’ stock prices. Join us as we […] The post Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed 18:29
18:29
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai18:29
In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in Subaru’s Starlink system that allows unrestricted access to vehicle controls and customer data using just a last name and license plate number. Co-host […] The post Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Meta Ditches Fact-Checking for Community Notes, RedNote and the TikTok Ban 19:28
19:28
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai19:28
In this episode, we explore Meta’s recent decision to replace traditional fact-checking with community notes and its potential impact on misinformation. We also discuss the implications of a TikTok ban in the U.S., with users migrating to similar apps like RedNote. The conversation covers the challenges of maintaining reliable information in social media and the […] The post Meta Ditches Fact-Checking for Community Notes, RedNote and the TikTok Ban appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude 25:07
25:07
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai25:07
Do you ever read the privacy policy of your favorite AI tools like ChatGPT, Gemini, or Claude? In this episode, Scott Wright and Tom Eston discuss the critical aspects of these policies, comparing how each AI engine handles your personal data. They explore the implications of data usage, security, and privacy in AI, with insights […] The post AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Reflecting on Y2K: Lessons for the Next Tech Crisis and AI Safety 21:43
21:43
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai21:43
Join us as we reminisce about Y2K, the panic, the preparations, and the lessons learned 25 years later. We also discuss the implications for future technology like AI and potential cybersecurity crises. Plus, in our ‘Aware Much’ segment, Scott shares tips on protecting your data if your phone is stolen. Happy New Year and welcome […] The post Reflecting on Y2K: Lessons for the Next Tech Crisis and AI Safety appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 2024 Year in Review: What We Got Right and Looking to 2025 26:34
26:34
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai26:34
In the final episode of the Shared Security Podcast for 2024, join us as we recap our predictions for the year, discuss what we got right and wrong, and highlight our top episodes on YouTube. We also extend a heartfelt thank you to our Patreon supporters and special guests. Plus, stay tuned for our predictions […] The post 2024 Year in Review: What We Got Right and Looking to 2025 appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Digital License Plate Vulnerabilities, How to Avoid New Text Message Scams 18:17
18:17
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai18:17
In this episode Tom, Scott, and Kevin discuss the vulnerabilities of digital license plates and the potential for hackers to exploit them. They explain what digital license plates are and how they work. The ‘Aware Much?’ segment covers the topic of suspicious text messages and why you should avoid responding to unknown senders. The team […] The post Digital License Plate Vulnerabilities, How to Avoid New Text Message Scams appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Hack-for-Hire Campaign Targeting Climate Activists, Government Hypocrisy on Encryption 21:02
21:02
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai21:02
In Episode 359 of the Shared Security Podcast, the team examines a shocking hack-for-hire operation alleged to target over 500 climate activists and journalists, potentially involving corporate sponsorship by ExxonMobil. They explore the intricate layers of this multifaceted campaign and the broader implications on security risk assessments. Additionally, Scott discusses the massive Salt Typhoon hacking […] The post Hack-for-Hire Campaign Targeting Climate Activists, Government Hypocrisy on Encryption appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book 27:16
27:16
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai27:16
Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security. Learn how her new book goes deeper into secure coding practices, backed by her […] The post Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Australia Bans Social Media for Kids, Holiday Vishing Scams 19:43
19:43
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai19:43
In this episode, we discuss Australia’s new legislation banning social media for users under 16 and its potential impact. Our hosts also explore the issue of vishing (voicemail phishing), why it’s escalating, particularly during the holiday season, and how to protect yourself against these scams. Plus, we celebrate a milestone on our YouTube channel and […] The post Australia Bans Social Media for Kids, Holiday Vishing Scams appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Deepfake Fraud, Data Brokers Tracking Military Personnel 17:54
17:54
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai17:54
In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue […] The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Shared Security Podcast .…
S
Shared Security Podcast

In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for leaving Twitter, including how to archive and delete tweets, and evaluates alternative platforms such as Bluesky, Mastodon, and Threads for cybersecurity professionals seeking […] The post Why It’s Time to Leave Twitter appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password 13:22
13:22
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai13:22
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring the rise of teenage hackers responsible for major breaches. The episode also covers a notable Okta vulnerability that allowed someone to login without […] The post Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know 17:30
17:30
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai17:30
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin. We explore the implications of this significant breach and whether paying ransoms is a viable solution. In […] The post Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know appeared first on Shared Security Podcast .…
S
Shared Security Podcast

1 Internet Archive Hacked, Introducing The AI Toilet Camera 19:53
19:53
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai19:53
In this episode, we discuss the significant data breach at the Internet Archive, affecting 33 million users. We also examine the introduction of an AI-integrated toilet camera by Throne, designed for health monitoring by analyzing bodily waste, and the ensuing privacy concerns. We explore these technological advancements alongside other unusual tech innovations, touching upon security […] The post Internet Archive Hacked, Introducing The AI Toilet Camera appeared first on Shared Security Podcast .…
Selamat datang di Player FM!
Player FM memindai web untuk mencari podcast berkualitas tinggi untuk Anda nikmati saat ini. Ini adalah aplikasi podcast terbaik dan bekerja untuk Android, iPhone, dan web. Daftar untuk menyinkronkan langganan di seluruh perangkat.