Exploring the bonds shared between people and technology
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading

1
Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities
16:20
16:20
Play later
Play later
Lists
Like
Liked
16:20Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize asset and findings data, smarter workflow automation, and enhanced analytics. Guest speakers Dan DeCloss, CTO and founder of PlexTrac, and Sarah Foley…
…
continue reading

1
Centralizing Data and Enhancing Workflows: Inside PlexTrac's New Capabilities
16:20
16:20
Play later
Play later
Lists
Like
Liked
16:20Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize asset and findings data, smarter workflow automation, and enhanced analytics. Guest speakers Dan DeCloss, CTO and founder of PlexTrac, and Sarah Foley…
…
continue reading

1
US Border Searches and Protesting in the Surveillance Age
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and how to protect your personal information, especially when attending protests. Scott Wright joins the discussion to provi…
…
continue reading

1
US Border Searches and Protesting in the Surveillance Age
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and how to protect your personal information, especially when attending protests. Scott Wright joins the discussion to provi…
…
continue reading

1
The 23andMe Collapse, Signal Gate Fallout
21:34
21:34
Play later
Play later
Lists
Like
Liked
21:34In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on the Signal Gate scandal involving top government officials, emphasizing the potential risks and lack of acco…
…
continue reading

1
The 23andMe Collapse, Signal Gate Fallout
21:35
21:35
Play later
Play later
Lists
Like
Liked
21:35In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company's potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on the Signal Gate scandal involving top government officials, emphasizing the potential risks and lack of acco…
…
continue reading

1
Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy
9:57
9:57
Play later
Play later
Lists
Like
Liked
9:57In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how AI is tra…
…
continue reading

1
Understanding Privacy Changes: eBay's AI Policy & The Future of Data Privacy
9:58
9:58
Play later
Play later
Lists
Like
Liked
9:58In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how AI is tra…
…
continue reading

1
From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
22:16
22:16
Play later
Play later
Lists
Like
Liked
22:16In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various data sources, providing customized risk scoring, and enhancing remediation workflows. T…
…
continue reading

1
From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
22:16
22:16
Play later
Play later
Lists
Like
Liked
22:16In this special episode of the Shared Security Podcast, join Tom and Dan DeClos, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various data sources, providing customized risk scoring, and enhancing remediation workflows. The epis…
…
continue reading

1
Tackling Data Overload: Strategies for Effective Vulnerability Remediation
29:38
29:38
Play later
Play later
Lists
Like
Liked
29:38In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac. They share their expertise on the key data and workflow hurdles that security teams face today. From…
…
continue reading

1
Tackling Data Overload: Strategies for Effective Vulnerability Remediation
29:39
29:39
Play later
Play later
Lists
Like
Liked
29:39Welcome to this special episode of the Shared Security Podcast! In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac. They share their expertise on the ke…
…
continue reading

1
Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes
20:21
20:21
Play later
Play later
Lists
Like
Liked
20:21In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox’s privacy policy and what it means for user data. ** Links mentioned on…
…
continue reading

1
Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes
20:21
20:21
Play later
Play later
Lists
Like
Liked
20:21In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox's privacy policy and what it means for user data. Show notes: https://s…
…
continue reading

1
Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors
23:55
23:55
Play later
Play later
Lists
Like
Liked
23:55In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple’s decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightfu…
…
continue reading

1
Cybersecurity Impact of DOGE, Apple's Stand Against Encryption Backdoors
23:55
23:55
Play later
Play later
Lists
Like
Liked
23:55In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple's decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightfu…
…
continue reading

1
Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher
17:08
17:08
Play later
Play later
Lists
Like
Liked
17:08In this episode, we welcome cybersecurity researcher and YouTube legend John Hammond. John shares insights from his career at Huntress and his popular YouTube channel, where he creates educational content on cybersecurity. He introduces his new platform, Just Hacking Training, aimed at providing affordable, high-quality training. John also discusse…
…
continue reading