Exploring the bonds shared between people and technology
…
continue reading
Tom Eston Scott Wright Kevin Johnson Podcasts
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
1
Meet NEO 1X: The Robot That Does Chores and Spies on You?
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48The future of home robotics is here — and it’s a little awkward. Meet the NEO 1X humanoid robot, designed to help with chores but raising huge cybersecurity and privacy questions. We discuss what it can actually do, the risks of having an always-connected humanoid in your home, and why it’s definitely not the “Robot Rosie” we were promised. ** Link…
…
continue reading
1
Meet NEO 1X: The Robot That Does Chores and Spies on You?
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48The future of home robotics is here — and it's a little awkward. Meet the NEO 1X humanoid robot, designed to help with chores but raising huge cybersecurity and privacy questions. We discuss what it can actually do, the risks of having an always-connected humanoid in your home, and why it's definitely not the "Robot Rosie" we were promised. Show no…
…
continue reading
1
OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy
15:13
15:13
Play later
Play later
Lists
Like
Liked
15:13In this episode, we explore OpenAI’s groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterprise security, and the risks it poses to privacy. Join hosts Tom Eston and Scott Wright as they discuss everything from the browser’s memory function to v…
…
continue reading
1
OpenAI's ChatGPT Atlas: What It Means for Cybersecurity and Privacy
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14In this episode, we explore OpenAI's groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterprise security, and the risks it poses to privacy. Join hosts Tom Eston and Scott Wright as they discuss everything from the browser's memory function to v…
…
continue reading
1
It’s Always DNS: Lessons from the AWS Outage
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touches on the need for tested business continuity plans, the implications of DNS failures, and the misconceptions around cloud infrastructure’s automatic f…
…
continue reading
1
It's Always DNS: Lessons from the AWS Outage
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touches on the need for tested business continuity plans, the implications of DNS failures, and the misconceptions around cloud infrastructure's automatic f…
…
continue reading
1
Is Sora 2 the Future of Video? AI, Copyright, and Privacy Issues
22:41
22:41
Play later
Play later
Lists
Like
Liked
22:41OpenAI’s Sora 2 is here — and it’s not just another AI toy. This episode explores how Sora 2 works, how users can insert almost anything into generated content, and why that’s raising alarms about privacy, identity, and copyright. We walk you through the initial opt-out copyright controversy, the backlash from studios and creators, and how OpenAI i…
…
continue reading
1
Is Sora 2 the Future of Video? AI, Copyright, and Privacy Issues
22:41
22:41
Play later
Play later
Lists
Like
Liked
22:41OpenAI's Sora 2 is here — and it's not just another AI toy. This episode explores how Sora 2 works, how users can insert almost anything into generated content, and why that's raising alarms about privacy, identity, and copyright. We walk you through the initial opt-out copyright controversy, the backlash from studios and creators, and how OpenAI i…
…
continue reading
1
Age Verification Laws: A Privacy Disaster in the Making
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30In this episode, we discuss the surge of age verification laws spreading across the US, including the recent implementation in Ohio. These laws intend to shield children but come at a significant cost to privacy and cybersecurity. We’ll explore how third-party ID verification companies operate, the risks associated with these systems, and the broad…
…
continue reading
1
Age Verification Laws: A Privacy Disaster in the Making
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30In this episode, we discuss the surge of age verification laws spreading across the US, including the recent implementation in Ohio. These laws intend to shield children but come at a significant cost to privacy and cybersecurity. We'll explore how third-party ID verification companies operate, the risks associated with these systems, and the broad…
…
continue reading
Phishing simulations have been a cornerstone of security awareness training for years. But do they actually change user behavior, or are they just creating frustration and fatigue? In this episode, Tom Eston and Scott Wright (CEO of ClickArmor) debate whether simulated phishing attacks are still valuable in 2025. We cover the benefits, challenges, …
…
continue reading
1
Are Phishing Simulations Still Worth It in 2025?
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51Phishing simulations have been a cornerstone of security awareness training for years. But do they actually change user behavior, or are they just creating frustration and fatigue? In this episode, Tom Eston and Scott Wright (CEO of ClickArmor) debate whether simulated phishing attacks are still valuable in 2025. We cover the benefits, challenges, …
…
continue reading
1
Milestone Episode 400: Reflecting on 16 Years of Shared Security
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37Episode 400! In this special milestone edition of the Shared Security Podcast, we look back at 16 years of conversations on security, privacy, and technology. From our very first episodes in 2009 to today’s AI-driven threats, we cover the topics that defined each era, the surprises along the way, and the lessons that still matter. Plus, we share li…
…
continue reading
1
Milestone Episode 400: Reflecting on 16 Years of Shared Security
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38Episode 400! In this special milestone edition of the Shared Security Podcast, we look back at 16 years of conversations on security, privacy, and technology. From our very first episodes in 2009 to today's AI-driven threats, we cover the topics that defined each era, the surprises along the way, and the lessons that still matter. Plus, we share li…
…
continue reading
1
Situational Awareness & Family Safety: Staying Alert in Today’s World with Andy Murphy
30:55
30:55
Play later
Play later
Lists
Like
Liked
30:55Join the Shared Security Podcast for a critical discussion about situational awareness with special guest, Andy Murphy, host of the Secure Family Podcast. In a world where mass shootings and violence in public places are alarming realities, staying alert to your surroundings has never been more important. Andy shares his expertise on personal and f…
…
continue reading
1
Situational Awareness & Family Safety: Staying Alert in Today's World with Andy Murphy
30:56
30:56
Play later
Play later
Lists
Like
Liked
30:56Join the Shared Security Podcast for a critical discussion about situational awareness with special guest, Andy Murphy, host of the Secure Family Podcast. In a world where mass shootings and violence in public places are alarming realities, staying alert to your surroundings has never been more important. Andy shares his expertise on personal and f…
…
continue reading
1
Best of Shared Security (2020) History Repeats Itself: Cybersecurity Challenges that Still Haunt Us
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29In this “best of” episode of the Shared Security Podcast, we revisit a discussion from September 2020 that’s just as relevant today as it was then. First, we cover how ransomware attacks forced several school districts—including Hartford, CT and Toledo, OH—to delay or shut down classes on the very first day of school. Then we dive into Google Chrom…
…
continue reading