300 episodes

Hosted by cybersecurity and privacy professionals Tom Eston, Scott Wright and Kevin Johnson, Shared Security is a weekly show that explores the trust you put in people and technology. We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world.

The Shared Security Show Tom Eston and Scott Wright

    • News
    • 4.6 • 24 Ratings

Hosted by cybersecurity and privacy professionals Tom Eston, Scott Wright and Kevin Johnson, Shared Security is a weekly show that explores the trust you put in people and technology. We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world.

    Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode

    Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode

    Why your phone number is becoming a popular way to identify you, our advise on how to best protect your privacy at hacker summer camp in Las Vegas (BSides, BlackHat, DEF CON), and details on Samsung's new repair mode which will protect your private data on your smartphone when you take it in for repairs.

    • 25 min
    Twitter Data Breach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits

    Twitter Data Breach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits

    Twitter suffers a data breach of phone numbers and email addresses belonging to 5.4 million accounts, new research shows that attackers are finding and exploiting zero-day vulnerabilities in 15 minutes, and details on how a resilient trait in videos and images could aid in deepfake detection.

    • 26 min
    Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street

    Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street

    In this episode learn all about the world of corporate spying from someone who was a corporate spy and actually wrote a book on it! Robert Kerbeck author of "RUSE: Lying the American Dream from Hollywood to Wall Street" joins us to discuss his fascinating career as a corporate spy, life as a struggling actor, his many celebrity encounters (including his performance in the infamous OJ Simpson exercise video), and how the corporate spying game is still big business. This is one interview you don't want to miss!

    • 29 min
    Apple Previews Lockdown Mode, Another Marriott Data Breach, Smart Contact Lenses

    Apple Previews Lockdown Mode, Another Marriott Data Breach, Smart Contact Lenses

    Apple previews Lockdown Mode which is designed for high risk individuals such as human rights workers, lawyers, politicians and journalists, hotel chain Marriott confirms another data breach, and new details on the development of smart contact lenses and what these could mean for your privacy.

    • 23 min
    Could TikTok Be Removed From App Stores, HackerOne Employee Caught Stealing Vulnerability Reports, California Gun Owner Data Breach

    Could TikTok Be Removed From App Stores, HackerOne Employee Caught Stealing Vulnerability Reports, California Gun Owner Data Breach

    The commissioner of the FCC (Federal Communications Commission), asked the CEOs of Apple and Google to remove TikTok from their app stores, bug bounty platform HackerOne disclosed that a former employee improperly accessed security reports and submitted them for personal gain, and new details on the California gun owner data breach which had exposed the personal information of hundreds of thousands of gun owners.

    • 21 min
    Period Tracking Apps and Your Privacy, Vendor Impersonation Attacks, LockBit Ransomware Bug Bounty Program

    Period Tracking Apps and Your Privacy, Vendor Impersonation Attacks, LockBit Ransomware Bug Bounty Program

    Period tracker apps are causing privacy concerns because they could potentially be used against women in states that ban abortion, new research shows that vendors are being impersonated more than employees in Business Email Compromise (BEC) attacks, and details on the first ever bug bounty program from the creators of the LockBit ransomware operation.

    • 18 min

Customer Reviews

4.6 out of 5
24 Ratings

24 Ratings

KWGraves ,

Highly Recommend

I appreciate the sound advice given on current security events as well as other comments! I follow this podcast this every Monday.

JoshCrist ,

Entertaining, insightful and actionable! 👏👏👏

Whether you’re well established as someone who can translate creative energy into the impact you want to have on the cyber security industry, or just getting started as a catalyst for change - this is a must-listen podcast for you! Tom and Scott do an incredible job leading conversations that cover a huge breadth of topics related to the ins and outs of building a thriving career in data security, and life you can be proud of - from leaders who’ve actually walked the path. Highly recommend listening and subscribing!

Tony-Stark-0 ,

30% ads 50% useless chatter

Only a tiny fraction of the show is valuable, and that too going over news articles. A lot of wasted time. But that’s just me.

Top Podcasts In News

The New York Times
NPR
The Daily Wire
New York Times Opinion
Cumulus Podcast Network | Dan Bongino
Crooked Media

You Might Also Like

Graham Cluley, Carole Theriault
ITWC
CyberWire Inc.
CyberWire, Inc.
CISO Series
Jerry Bell and Andrew Kalat