What are your interests?
Select categories to help us recommend content for you.
Let's Go!
Close queue History
Play full episodes to fill your queue.
   
The Shared Security Show

The Shared Security Show

25 Episodes By Tom Eston, Scott Wright, Kevin Johnson sharedsecurity.net/
Hosted by cybersecurity and privacy professionals Tom Eston, Scott Wright and Kevin Johnson, Shared Security is a weekly show that explores the trust you put in people and technology. We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure ...more
Technology Tech News News
The Shared Security Show
The Shared Security Show
@thesharedsecurityshow
mute button
stars icon No captions Available
SASE: Is it Just Another Cybersecurity Buzzword?
In this sponsored episode co-host Tom Eston discusse... more
Dec 5 2022 15m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots
A recent data breach of 5.4 million Twitter users an... more
Dec 5 2022 26m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
How to Break Into a Cybersecurity Career – Rob Fuller (Mubix)
This week we continue our series on how to break int... more
Nov 28 2022 27m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
The Rise of Mastodon, Twitter in Trouble, Largest Privacy Settlement in US History
Former Twitter users are migrating en masse to Masto... more
Nov 21 2022 22m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
How to Break Into a Cybersecurity Career – Digital Forensics and Incident Response (DFIR)
Matt Scheurer, host of the ThreatReel Podcast and As... more
Nov 14 2022 28m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Cybersecurity’s Role in Combating Midterm Election Disinformation
Katie Teitler, Senior Cybersecurity Strategist at Ax... more
Nov 7 2022 30m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
CISO Liability Risk and Jail Time, (ISC)2 Bylaw Vote and the Value of Cybersecurity Certifications
Rafal Los, host of the popular Down the Security Rab... more
Oct 31 2022 40m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Attack of the Wi-Fi Spy Drones, How to Destroy Your Old Electronics, Signal Removes SMS Support
Two modified wi-fi enabled drones were found on the ... more
Oct 24 2022 19m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Uber Breach Guilty Verdict, Mandatory Password Expiration, Fake Executive Profiles on LinkedIn
Former Uber CSO Joe Sullivan was found guilty of obs... more
Oct 17 2022 20m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Hackers Need 5 Hours or Less to Break In, SMS Phishing Tactics, Strange Ways Employees Expose Data
A recent survey of ethical hackers by Bishop Fox and... more
Oct 10 2022 24m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
What are Passkeys, PowerPoint Mouseover Attack, 2K Games Support Hacked
Passkeys are coming soon to Apple iOS 16 so what are... more
Oct 3 2022 21m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Uber Hacked by 18 Year Old, Morgan Stanley Hard Drives Got Auctioned, Deleting Your Data is Hard
Uber got hacked by an 18 year old using social engin... more
Sep 26 2022 20m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Facebook Doesn’t Know Where Your Data Is, New Hire Spearmishing Attack, Smart Thermostat Lock Out
In recent court testimony two Facebook engineers wer... more
Sep 19 2022 20m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
LastPass Data Breach, ETHERLED: Air-Gapped Systems Attack, Twitter Whistleblower Complaint
Popular password manager LastPass announced that som... more
Sep 5 2022 26m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Janet Jackson Can Crash Laptops, Credential Phishing Attacks Skyrocket, A Phone Carrier That Doesn’t Track You
Janet Jackson’s “Rhythm Nation” has been recognized ... more
Aug 29 2022 18m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser
A Cisco employee was compromised by a ransomware gan... more
Aug 22 2022 23m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
The Importance of Faraday Technology with Aaron Zar from SLNT
Aaron Zar, SLNT founder and director of disconnectio... more
Aug 15 2022 24m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode
Why your phone number is becoming a popular way to i... more
Aug 8 2022 25m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Twitter Data Breach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits
Twitter suffers a data breach of phone numbers and e... more
Aug 1 2022 26m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street
In this episode learn all about the world of corpora... more
Jul 25 2022 29m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Apple Previews Lockdown Mode, Another Marriott Data Breach, Smart Contact Lenses
Apple previews Lockdown Mode which is designed for h... more
Jul 18 2022 23m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Period Tracking Apps and Your Privacy, Vendor Impersonation Attacks, LockBit Ransomware Bug Bounty Program
Period tracker apps are causing privacy concerns bec... more
Jul 4 2022 18m
Like
Clip
Share
Transcript
More
Play Full
mute button
stars icon No captions Available
Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data
The Tim Hortons mobile app created a “a mass invasio... more
Jun 27 2022 25m
Like
Clip
Share
Transcript
More
Play Full