Exploring the bonds shared between people and technology
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading

1
Cities of the Future or Hacker’s Paradise? The Cybersecurity Risks of Smart Cities
18:26
18:26
Play later
Play later
Lists
Like
Liked
18:26Join us as we explore the concept of smart cities—municipalities enhanced by connected technology like sensors, cameras, and automated systems to improve services and infrastructure. We discuss the inherent vulnerabilities that come with these advancements, including cybersecurity threats and real-life incidents such as hacked crosswalk signals fea…
…
continue reading

1
Cities of the Future or Hacker's Paradise? The Cybersecurity Risks of Smart Cities
18:26
18:26
Play later
Play later
Lists
Like
Liked
18:26Join us as we explore the concept of smart cities—municipalities enhanced by connected technology like sensors, cameras, and automated systems to improve services and infrastructure. We discuss the inherent vulnerabilities that come with these advancements, including cybersecurity threats and real-life incidents such as hacked crosswalk signals fea…
…
continue reading

1
Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and how new mobile IDs fit into the TSA’s plans. We also discuss the broader implications for identity surveillance and who truly benefits from these security upgrades. We also …
…
continue reading

1
Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and how new mobile IDs fit into the TSA's plans. We also discuss the broader implications for identity surveillance and who truly benefits from these security upgrades. We also …
…
continue reading

1
Invasion of Privacy: The Hidden Camera Dilemma
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17Ever worried about hidden cameras in Airbnb rentals? You’re not alone! In this episode, we explore the unsettling rise of hidden cameras in personal spaces, the inadequacy of current laws, and practical tips to detect surveillance devices. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they share insights and discuss the implications of v…
…
continue reading

1
Invasion of Privacy: The Hidden Camera Dilemma
20:18
20:18
Play later
Play later
Lists
Like
Liked
20:18Ever worried about hidden cameras in Airbnb rentals? You're not alone! In this episode, we explore the unsettling rise of hidden cameras in personal spaces, the inadequacy of current laws, and practical tips to detect surveillance devices. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they share insights and discuss the implications of v…
…
continue reading

1
When AI Fights Back: Threats, Ethics, and Safety Concerns
17:33
17:33
Play later
Play later
Lists
Like
Liked
17:33In this episode, we explore an incident where Anthropic’s AI, Claude, didn’t just resist shutdown but allegedly blackmailed its engineers. Is this a glitch or the beginning of an AI uprising? Along with co-host Kevin Johnson, we reminisce about past episodes, discuss AI safety and ethics, and examine the implications of AI mimicking human behaviors…
…
continue reading

1
When AI Fights Back: Threats, Ethics, and Safety Concerns
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34In this episode, we explore an incident where Anthropic’s AI, Claude, didn't just resist shutdown but allegedly blackmailed its engineers. Is this a glitch or the beginning of an AI uprising? Along with co-host Kevin Johnson, we reminisce about past episodes, discuss AI safety and ethics, and examine the implications of AI mimicking human behaviors…
…
continue reading

1
Mark Zuckerberg’s Vision: AI Companions and the Loneliness Epidemic
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49In this episode, we explore Mark Zuckerberg’s bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update listeners on the recent developments in the 23andMe bankruptcy case and what it means for former customers. Joining the conversation is c…
…
continue reading

1
Mark Zuckerberg's Vision: AI Companions and the Loneliness Epidemic
20:50
20:50
Play later
Play later
Lists
Like
Liked
20:50In this episode, we explore Mark Zuckerberg's bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update listeners on the recent developments in the 23andMe bankruptcy case and what it means for former customers. Joining the conversation is c…
…
continue reading

1
Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009
57:30
57:30
Play later
Play later
Lists
Like
Liked
57:30Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting vulnerabilities, and a pivotal Canadian privacy ruling involving Facebook. Gain insights into social media security fro…
…
continue reading

1
Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009
57:30
57:30
Play later
Play later
Lists
Like
Liked
57:30Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting vulnerabilities, and a pivotal Canadian privacy ruling involving Facebook. Gain insights into social media security fro…
…
continue reading

1
What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like ‘vibe coding’ — a novel, behavior-focused development approach, and ‘MCP’ (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of ‘slopsquatting,’ a new type of threat involving …
…
continue reading

1
What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like 'vibe coding' — a novel, behavior-focused development approach, and 'MCP' (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of 'slopsquatting,' a new type of threat involving …
…
continue reading

1
The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the cybersecurity industry, and the recent launch of the CVE Foundation. We also discuss the Trump Administration’s executive order that revoked the security clearan…
…
continue reading

1
The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the cybersecurity industry, and the recent launch of the CVE Foundation. We also discuss the Trump Administration's executive order that revoked the security clearan…
…
continue reading

1
Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities
16:20
16:20
Play later
Play later
Lists
Like
Liked
16:20Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize asset and findings data, smarter workflow automation, and enhanced analytics. Guest speakers Dan DeCloss, CTO and founder of PlexTrac, and Sarah Foley…
…
continue reading