Podcast cover

Shared Security

Tom Eston, Scott Wright, Kevin Johnson
392 episodes   Last Updated: Apr 21, 25
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strategies, and tools to live confidently and safeguard your digital life.

Episodes

Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize asset and findings data, smarter workflow automation, and enhanced analytics. Guest speakers Dan DeCloss, CTO and founder of PlexTrac, and Sarah Foley, VP of Product at PlexTrac, share insights and demonstrate upcoming features. Learn about PlexTrac's Continuous Threat Exposure Management (CTEM) framework and their exciting plans for RSA. To find out more information about PlexTrac and to get a demo visit: PlexTrac.com/SharedSecurity Show notes: https://sharedsecurity.net/2025/04/21/centralizing-data-and-enhancing-workflows-inside-plextracs-new-capabilities/
Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and how to protect your personal information, especially when attending protests. Scott Wright joins the discussion to provide valuable insights on safeguarding your data. Also covered are newer communication technologies like Meshtastic and advice on physical security measures to consider. Show notes: https://sharedsecurity.net/2025/04/14/us-border-searches-and-protesting-in-the-surveillance-age/
In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company's potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on the Signal Gate scandal involving top government officials, emphasizing the potential risks and lack of accountability. We also touch on the importance of proper communication and document retention in government operations. Stay tuned for insights and steps you can take to protect your data. Show notes: https://sharedsecurity.net/2025/04/07/the-23andme-collapse-signal-gate-fallout/
In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how AI is transforming our understanding of privacy and the potential increase in AI-driven surveillance. Tune in for insights on navigating these evolving challenges and the future of data privacy. Show notes: https://sharedsecurity.net/2025/03/31/understanding-privacy-changes-ebays-ai-policy-and-the-future-of-data-privacy/
In this special episode of the Shared Security Podcast, join Tom and Dan DeClos, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various data sources, providing customized risk scoring, and enhancing remediation workflows. The episode offers an insightful look into PlexTrac’s powerful features, real-world success stories, and how these tools help teams prioritize and act on critical findings efficiently. Don’t miss out on learning how to turn overwhelming data into actionable insights and maintain better data security. PlexTrac provides practitioners with an automated alternative for the most time-consuming parts of vulnerability management, including consolidating data, surfacing insights, prioritizing findings, and managing hand-offs to and from remediation teams. Find out more by visiting plextrac.com/sharedsecurity! Show notes: https://sharedsecurity.net/2025/03/24/from-spreadsheets-to-solutions-how-plextrac-enhances-security-workflows/
Welcome to this special episode of the Shared Security Podcast! In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac. They share their expertise on the key data and workflow hurdles that security teams face today. From managing influxes of scanner data and asset management tools to prioritizing meaningful security actions, this episode offers valuable insights. Learn about the importance of context, the integration of threat intelligence, the future role of automation, and AI, and how these can transform the cybersecurity landscape. Tune in to stay ahead in your security strategies and practices. PlexTrac provides practitioners with an automated alternative for the most time-consuming parts of vulnerability management, including consolidating data, surfacing insights, prioritizing findings, and managing hand-offs to and from remediation teams. Find out more by visiting plextrac.com/sharedsecurity! Show notes: https://sharedsecurity.net/2025/03/17/tackling-data-overload-strategies-for-effective-vulnerability-remediation/
In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox's privacy policy and what it means for user data. Show notes: https://sharedsecurity.net/2025/03/10/trump-administration-and-the-russian-cyber-threat-firefox-privacy-changes/
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple's decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightful discussion on the implications for both government and corporate security. Show notes: https://sharedsecurity.net/2025/03/03/cybersecurity-impact-of-doge-apples-stand-against-encryption-backdoors/
In this episode, we welcome cybersecurity researcher and YouTube legend John Hammond. John shares insights from his career at Huntress and his popular YouTube channel, where he creates educational content on cybersecurity. He introduces his new platform, Just Hacking Training, aimed at providing affordable, high-quality training. John also discusses current trends in cybercrime, the role of AI in attacks, and provides tips on avoiding social engineering. The episode highlights an upcoming Capture the Flag event hosted by Snyk, and how Just Hacking Training offers access to archived CTF challenges for continuous learning. Tune in for an engaging conversation on the state of cybersecurity and practical advice for staying secure. Show notes: https://sharedsecurity.net/2025/02/24/cybersecurity-insights-with-john-hammond-youtube-legend-and-security-researcher/
In this episode, we discuss the UK government's demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on privacy. We also discuss the first known case where AI chatbots were used in a stalking indictment, highlighting the dangers of technology misuse and the challenges it poses for legal systems. Join hosts Tom and Scott as they explore these pressing issues and introduce a new subsegment 'AI Spy' to focus on AI risks. Stay safe, stay secure, and stay informed! Show notes: https://sharedsecurity.net/2025/02/17/uks-secret-apple-backdoor-request-ai-chatbots-used-for-stalking/