
Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
Tom Eston | | border crossing, Canadian Perspective, Cyber Security, cyber threat, Cybersecurity, Data Privacy, digital id, Digital Privacy, Enhanced Driver's License, Episodes, Federal Government, Flying, Google Wallet, government surveillance, Identity Surveillance, Information Security, Infosec, Interstate Travel, law enforcement, National ID Cards, passport, Personal Stories, Podcast, Podcasts, Political Discussion, Post 9/11, Privacy, REAL ID, Right To Travel, security, Security Concerns, technology, tsa, US Travel, Voter ID, Weekly Edition
Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and how new mobile IDs fit into the TSA’s plans. We also discuss the broader implications for identity surveillance ... Read More

Invasion of Privacy: The Hidden Camera Dilemma
Tom Eston | | Airbnb, Crime Junkies Podcast, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Detecting Cameras, Digital Privacy, Episodes, Hidden Cameras, Information Security, Infosec, law enforcement, Legal Implications, Podcast, Podcasts, Privacy, security, surveillance, technology, voyeurism, Voyeurism Laws, Weekly Edition
Ever worried about hidden cameras in Airbnb rentals? You’re not alone! In this episode, we explore the unsettling rise of hidden cameras in personal spaces, the inadequacy of current laws, and practical tips to detect surveillance devices. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they share insights ... Read More

When AI Fights Back: Threats, Ethics, and Safety Concerns
Tom Eston | | advanced ai, AI & Automation, AI Blackmail, AI Engineering, ai ethics, AI Ethics and Safety, AI Evolution, AI Future, AI in Daily Life, AI in Industry, AI in Technology, AI Podcast, AI Revolution, AI safety, AI Shutdown, AI testing, ai threats, AI Uprising, Anthropic, Artificial Intelligence, Claude, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, LLM, machine learning, Podcast, Podcasts, Privacy, security, technology, Weekly Edition
In this episode, we explore an incident where Anthropic’s AI, Claude, didn’t just resist shutdown but allegedly blackmailed its engineers. Is this a glitch or the beginning of an AI uprising? Along with co-host Kevin Johnson, we reminisce about past episodes, discuss AI safety and ethics, and examine the implications ... Read More

Mark Zuckerberg’s Vision: AI Companions and the Loneliness Epidemic
Tom Eston | | 23andMe Bankruptcy, AI, AI Friends, AI Girlfriends, Canadian Government, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, Information Security, Infosec, Loneliness Epidemic, Mark Zuckerberg, Meta, Meta AI, Podcast, Podcasts, Privacy, Privacy Concerns, security, Social Media Security, technology, US Civil War Book, Weekly Edition
In this episode, we explore Mark Zuckerberg’s bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update listeners on the recent developments in the 23andMe bankruptcy case and what it means for former customers. Joining ... Read More

Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009
Tom Eston | | 2009, cross-site scripting, Cyber Security, Cyber Security Podcast, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Early Social Media, Episodes, facebook, Information Security, Infosec, internet security, online safety, Podcast, Podcasts, Privacy, privacy laws, security, Social Media Awareness, Social Media Risks, Social Media Security, Tech Podcast, technology, Weekly Edition, XSS
Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting vulnerabilities, and a pivotal Canadian privacy ruling involving Facebook. Gain insights into social media security ... Read More

What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development
Tom Eston | | AI Development Era, AI Evolution, AI Generated Code, AI Hallucinations, Behavioral Development, Coding Practices, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Gen Z Tech, Information Security, Infosec, Model Context Protocol, Podcast, Podcasts, Privacy, security, Slopsquatting, Software Security, static code analysis, Tech Standardization, Tech Trends, technology, Vibe Coding, Weekly Edition
Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like ‘vibe coding’ — a novel, behavior-focused development approach, and ‘MCP’ (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of ‘slopsquatting,’ a new ... Read More

The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order
Tom Eston | | Chris Krebs, cisa, CISA Director, CVE, CVE Program, Cyber Security, cyber threat, cyber vulnerabilities, Cybersecurity, Cybersecurity Industry, cybersecurity programs, cybersecurity trends, Data Privacy, Digital Privacy, Episodes, executive order, Executive Order Controversy, Government Funding for Cybersecurity, Information Security, Infosec, Podcast, Podcasts, Politics and Cybersecurity, Privacy, security, technology, Trump, Trump Executive Order, Vulnerability Management, Weekly Edition
What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the cybersecurity industry, and the recent launch of the CVE Foundation. We also discuss the Trump Administration’s executive ... Read More

Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities
Tom Eston | | AI, AI in Cybersecurity, asset management, Automation Engine, continuous threat exposure management, CTEM, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Analytics, Data Centralization, Data Overload, Data Privacy, Digital Privacy, Episodes, Findings Data, Information Security, Infosec, pen testing, PlexTrac, Podcast, Podcasts, Privacy, Product features, risk prioritization, RSA 2025, RSA Conference, security, Security Reporting, Tech Demo, technology, Vulnerability Remediation, Weekly Edition, workflow automation
Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize asset and findings data, smarter workflow automation, and enhanced analytics. Guest speakers Dan DeCloss, CTO and founder of PlexTrac, ... Read More

US Border Searches and Protesting in the Surveillance Age
Tom Eston | | Civil Liberties, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Device Confiscation, Digital Privacy, Electronic Device Search, Episodes, government surveillance, Information Security, Infosec, Meshtastic, Podcast, Podcasts, Privacy, Protest, Protest Communication, Protest Safety, Protesting in the Surveillance Age, secure communication, security, Smartphone Security, surveillance, Surveillance Self Defense, technology, Travel Tips, Travel Warning, US Border Searches, Weekly Edition
Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and how to protect your personal information, especially when attending protests. Scott Wright joins the discussion to provide valuable ... Read More

The 23andMe Collapse, Signal Gate Fallout
Tom Eston | | 23andMe, Bankruptcy, Cyber Security, cyber threat, Cybersecurity, data deletion, Data Privacy, data retention, Data Security, Digital Privacy, DNA, DNA Privacy, Episodes, Genetic Testing, Government Accountability, Information Security, Infosec, Legal Challenges, Military Protocol, personal data, Podcast, Podcasts, Privacy, security, signal, Signal Gate, technology, Weekly Edition
In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on the Signal Gate scandal involving top government officials, emphasizing the ... Read More