Shared Security Podcast
Exploring the bonds shared between people and technology

Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
Tom Eston | | border crossing, Canadian Perspective, Cyber Security, cyber threat, Cybersecurity, Data Privacy, digital id, Digital Privacy, Enhanced Driver's License, Episodes, Federal Government, Flying, Google Wallet, government surveillance, Identity Surveillance, Information Security, Infosec, Interstate Travel, law enforcement, National ID Cards, passport, Personal Stories, Podcast, Podcasts, Political Discussion, Post 9/11, Privacy, REAL ID, Right To Travel, security, Security Concerns, technology, tsa, US Travel, Voter ID, Weekly Edition
Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and ...

Invasion of Privacy: The Hidden Camera Dilemma
Tom Eston | | Airbnb, Crime Junkies Podcast, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Detecting Cameras, Digital Privacy, Episodes, Hidden Cameras, Information Security, Infosec, law enforcement, Legal Implications, Podcast, Podcasts, Privacy, security, surveillance, technology, voyeurism, Voyeurism Laws, Weekly Edition
Ever worried about hidden cameras in Airbnb rentals? You’re not alone! In this episode, we explore the unsettling rise of hidden cameras in personal spaces, the inadequacy of current laws, and practical ...

When AI Fights Back: Threats, Ethics, and Safety Concerns
Tom Eston | | advanced ai, AI & Automation, AI Blackmail, AI Engineering, ai ethics, AI Ethics and Safety, AI Evolution, AI Future, AI in Daily Life, AI in Industry, AI in Technology, AI Podcast, AI Revolution, AI safety, AI Shutdown, AI testing, ai threats, AI Uprising, Anthropic, Artificial Intelligence, Claude, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, LLM, machine learning, Podcast, Podcasts, Privacy, security, technology, Weekly Edition
In this episode, we explore an incident where Anthropic’s AI, Claude, didn’t just resist shutdown but allegedly blackmailed its engineers. Is this a glitch or the beginning of an AI uprising? Along ...

Mark Zuckerberg’s Vision: AI Companions and the Loneliness Epidemic
Tom Eston | | 23andMe Bankruptcy, AI, AI Friends, AI Girlfriends, Canadian Government, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, Information Security, Infosec, Loneliness Epidemic, Mark Zuckerberg, Meta, Meta AI, Podcast, Podcasts, Privacy, Privacy Concerns, security, Social Media Security, technology, US Civil War Book, Weekly Edition
In this episode, we explore Mark Zuckerberg’s bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update ...

Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009
Tom Eston | | 2009, cross-site scripting, Cyber Security, Cyber Security Podcast, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Early Social Media, Episodes, facebook, Information Security, Infosec, internet security, online safety, Podcast, Podcasts, Privacy, privacy laws, security, Social Media Awareness, Social Media Risks, Social Media Security, Tech Podcast, technology, Weekly Edition, XSS
Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook ...

What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development
Tom Eston | | AI Development Era, AI Evolution, AI Generated Code, AI Hallucinations, Behavioral Development, Coding Practices, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Gen Z Tech, Information Security, Infosec, Model Context Protocol, Podcast, Podcasts, Privacy, security, Slopsquatting, Software Security, static code analysis, Tech Standardization, Tech Trends, technology, Vibe Coding, Weekly Edition
Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like ‘vibe coding’ — a novel, behavior-focused development approach, and ‘MCP’ (Model ...

The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order
Tom Eston | | Chris Krebs, cisa, CISA Director, CVE, CVE Program, Cyber Security, cyber threat, cyber vulnerabilities, Cybersecurity, Cybersecurity Industry, cybersecurity programs, cybersecurity trends, Data Privacy, Digital Privacy, Episodes, executive order, Executive Order Controversy, Government Funding for Cybersecurity, Information Security, Infosec, Podcast, Podcasts, Politics and Cybersecurity, Privacy, security, technology, Trump, Trump Executive Order, Vulnerability Management, Weekly Edition
What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in ...

Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities
Tom Eston | | AI, AI in Cybersecurity, asset management, Automation Engine, continuous threat exposure management, CTEM, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Analytics, Data Centralization, Data Overload, Data Privacy, Digital Privacy, Episodes, Findings Data, Information Security, Infosec, pen testing, PlexTrac, Podcast, Podcasts, Privacy, Product features, risk prioritization, RSA 2025, RSA Conference, security, Security Reporting, Tech Demo, technology, Vulnerability Remediation, Weekly Edition, workflow automation
Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize asset ...

US Border Searches and Protesting in the Surveillance Age
Tom Eston | | Civil Liberties, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Device Confiscation, Digital Privacy, Electronic Device Search, Episodes, government surveillance, Information Security, Infosec, Meshtastic, Podcast, Podcasts, Privacy, Protest, Protest Communication, Protest Safety, Protesting in the Surveillance Age, secure communication, security, Smartphone Security, surveillance, Surveillance Self Defense, technology, Travel Tips, Travel Warning, US Border Searches, Weekly Edition
Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and ...

The 23andMe Collapse, Signal Gate Fallout
Tom Eston | | 23andMe, Bankruptcy, Cyber Security, cyber threat, Cybersecurity, data deletion, Data Privacy, data retention, Data Security, Digital Privacy, DNA, DNA Privacy, Episodes, Genetic Testing, Government Accountability, Information Security, Infosec, Legal Challenges, Military Protocol, personal data, Podcast, Podcasts, Privacy, security, signal, Signal Gate, technology, Weekly Edition
In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin ...