In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on the Signal Gate scandal involving top government officials, emphasizing the potential risks and lack of…
Category: Episodes
AI, AI and Privacy, ai models, cyber security, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, Digital Surveillance, eBay, eBay Privacy Policy, Episodes, Global Security News, Information Security, infosec, LLM, North America, Podcast, Podcasts, privacy, Security, Security Bloggers Network, Smart Privacy, Tech Podcast, Tech Policy, Technology, Weekly Edition
Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy
In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how…
AI, Application Security, Automation in Security, CISO Suite, cyber defense, cyber security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Data Security, Digital Privacy, Episodes, Global Security News, Governance, Risk & Compliance, Information Security, infosec, IT Security Collaboration, Managing Cybersecurity Data, penetration testing, PlexTrac, Podcast, Podcasts, privacy, purple teaming, Red Teaming, Risk Management, risk scoring, Security, security best practices, Security Bloggers Network, Social Engineering, Technology, Threat Intelligence, vulnerability remediation, Weekly Edition
From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various data sources, providing customized risk scoring, and enhancing remediation workflows. The episode offers an insightful…
AI, Application Security, Automation in Security, CISO Suite, cyber defense, cyber security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Data Security, Digital Privacy, Episodes, Global Security News, Governance, Risk & Compliance, Information Security, infosec, IT Security Collaboration, Managing Cybersecurity Data, penetration testing, PlexTrac, Podcast, Podcasts, privacy, purple teaming, Red Teaming, Risk Management, risk scoring, Security, security best practices, Security Bloggers Network, Social Engineering, Technology, Threat Intelligence, vulnerability remediation, Weekly Edition
Tackling Data Overload: Strategies for Effective Vulnerability Remediation
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac. They share their expertise on the key data and workflow hurdles that security teams face today.…
Browser Privacy, Canadian Tariffs, CISA, cyber security, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, Episodes, Firefox Privacy, Global Security News, Government & Policy, Information Security, infosec, internet privacy, mozilla, online security, Podcast, Podcasts, privacy, privacy rights, Putin, Russia, Russian Cyber Threat, Security, Security Bloggers Network, Tech Talk, Technology, Technology News, Trump, Trump Administration, US Cyber Command, Weekly Edition
Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes
In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox’s privacy policy and what it means for user data. **…
Apple, Canada, CISA, Concerns, cyber security, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, doge, economy, encryption, Encryption Backdoor, Endpoint, Episodes, Global Security News, Government, Impact, Incompetence, Information Security, infosec, Jokes, national security, phishing, Podcast, Podcasts, privacy, SBN News, Security, Security Bloggers Network, Technology, Trump, uk, Weekly Edition
Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple’s decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightful discussion on the…
Apple, Canada, CISA, Concerns, cyber security, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, doge, economy, encryption, Encryption Backdoor, Endpoint, Episodes, Global Security News, Government, Impact, Incompetence, Information Security, infosec, Jokes, national security, phishing, Podcast, Podcasts, privacy, SBN News, Security, Security Bloggers Network, Technology, Trump, uk, Weekly Edition
Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple’s decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightful discussion on the…
AI chatbots, AI Risks, Apple Privacy, Canada-US Relations, Click Armor, cyber security, cyber threat, Cybersecurity, Data Privacy, Data Security, Deepfake Crimes, Digital Privacy, Employee Cyber Confidence, Encryption Debate, Episodes, Global Issues, Global Security News, Government Backdoors, Information Security, infosec, Podcast, Podcasts, privacy, Security, Security Bloggers Network, social media, Stalking, Technology, UK Investigatory Powers Act, Weekly Edition
UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking
In this episode, we discuss the UK government’s demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on privacy. We also discuss the first known case where AI chatbots were used in a stalking indictment, highlighting the dangers of technology misuse…
Career Advice, Career Challenges, Career Development, Careers, Cyber Community, cyber security, cyber threat, Cybersecurity, Cybersecurity Careers, Data Privacy, Data Security, Digital Privacy, Episodes, Global Security News, Hiring Managers, Information Security, infosec, Job Market, Job search, Job Skills, Networking, Podcast, Podcasts, privacy, professional development, recruiting, Recruitment Strategies, Resume Tips, Salary Transparency, Security, Security Bloggers Network, Technology, Weekly Edition, Workforce Shortage
Careers in Cybersecurity: Myths and Realities with Kathleen Smith
In this episode we welcome Kathleen Smith, CMO of ClearedJobs.net, to discuss the current state of the cybersecurity job market. Kathleen shares her extensive experience in the field, recounting her tenure in various cybersecurity events and her contributions to job market research and recruiting. She discusses challenges such as distinguishing between genuine workforce shortages and…
AI, AI Risks, Application Security, china, cyber security, cyber threat, Cyberlaw, Cybersecurity, Data Privacy, Data Security, deepseek, DeepSeek AI, DevOps, Digital Drivers Licenses, digital id, Digital Privacy, drivers license, Episodes, Global Security News, Government, Information Security, infosec, law enforcement, open source, Podcast, Podcasts, police, privacy, Security, Security Bloggers Network, Technology, Technology Policy, Weekly Edition
Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI
In this episode, we explore the rollout of digital driver’s licenses in states like Illinois and the potential privacy issues that come with them. Can digital IDs truly enhance convenience without compromising your privacy? We also discuss the new Chinese AI model, DeepSeek, which is affecting U.S. tech companies’ stock prices. Join us as we…
30 Million Data Points, cyber security, cyber threat, Cybersecurity, data broker, Data Privacy, Data Regulation, Data Security, Digital Privacy, Episodes, Global Security News, Gravy Analytics, Gravy Analytics Breach, Information Security, infosec, Location Data Leak, Personal Data Auction, Podcast, Podcasts, privacy, Privacy Legislation, Real-Time Bidding, Security, Security Bloggers Network, Smart Cars Security, subaru, Subaru Starlink Vulnerability, Subaru Vehicle Controls, Technology, Vehicle Hacking, Vulnerability Exploitation, Weekly Edition
Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed
In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in Subaru’s Starlink system that allows unrestricted access to vehicle controls and customer data using just a last name and license plate number. Co-host…
AI, AI Concerns, AI privacy, AI Regulation, AI Trends, Anthropic, ChatGPT, Claude, cyber security, cyber threat, Cybersecurity, Data Privacy, data protection, Data Security, Digital Privacy, Episodes, gemini, generative ai, Global Security News, Information Security, infosec, Podcast, Podcasts, privacy, Privacy Policies, Safety in AI, Security, Security Bloggers Network, Tech Ethics, Tech Podcast, Technology, Weekly Edition
AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude
Do you ever read the privacy policy of your favorite AI tools like ChatGPT, Gemini, or Claude? In this episode, Scott Wright and Tom Eston discuss the critical aspects of these policies, comparing how each AI engine handles your personal data. They explore the implications of data usage, security, and privacy in AI, with insights…
2024, 2025, cyber security, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, Episodes, Global Security News, Happy New Year, Information Security, infosec, New Year, phishing, Podcast, podcasting, Podcasts, Port 83, predictions, privacy, Security, Security Bloggers Network, Social Engineering, Technology, Weekly Edition, Year End Reflections
2024 Year in Review: What We Got Right and Looking to 2025
In the final episode of the Shared Security Podcast for 2024, join us as we recap our predictions for the year, discuss what we got right and wrong, and highlight our top episodes on YouTube. We also extend a heartfelt thank you to our Patreon supporters and special guests. Plus, stay tuned for our predictions…