Exploring the bonds shared between people and technology
…
continue reading
Tom Eston Scott Wright Kevin Johnson Podcasts
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
1
AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how the attack was executed, why it matters, and its implications for cybersecurity. Join the conversation as …
…
continue reading
1
AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage
18:12
18:12
Play later
Play later
Lists
Like
Liked
18:12In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how the attack was executed, why it matters, and its implications for cybersecurity. Join the conversation as …
…
continue reading
1
OWASP Top 10 for 2025: What’s New and Why It Matters
18:59
18:59
Play later
Play later
Lists
Like
Liked
18:59In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore the changes, the continuity, and the significance of the update for application security. Learn about the importance of getting involved with the release candidate to provide feedback and suggestions. The […] T…
…
continue reading
1
OWASP Top 10 for 2025: What's New and Why It Matters
19:00
19:00
Play later
Play later
Lists
Like
Liked
19:00In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore the changes, the continuity, and the significance of the update for application security. Learn about the importance of getting involved with the release candidate to provide feedback and suggestions. The conve…
…
continue reading
1
Meet NEO 1X: The Robot That Does Chores and Spies on You?
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48The future of home robotics is here — and it’s a little awkward. Meet the NEO 1X humanoid robot, designed to help with chores but raising huge cybersecurity and privacy questions. We discuss what it can actually do, the risks of having an always-connected humanoid in your home, and why it’s definitely not the “Robot […] The post Meet NEO 1X: The Ro…
…
continue reading
1
Meet NEO 1X: The Robot That Does Chores and Spies on You?
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48The future of home robotics is here — and it's a little awkward. Meet the NEO 1X humanoid robot, designed to help with chores but raising huge cybersecurity and privacy questions. We discuss what it can actually do, the risks of having an always-connected humanoid in your home, and why it's definitely not the "Robot Rosie" we were promised. Show no…
…
continue reading
1
OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy
15:13
15:13
Play later
Play later
Lists
Like
Liked
15:13In this episode, we explore OpenAI’s groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterprise security, and the risks it poses to privacy. Join hosts Tom Eston and Scott Wright as they discuss everything from the browser’s memory function to v…
…
continue reading
1
OpenAI's ChatGPT Atlas: What It Means for Cybersecurity and Privacy
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14In this episode, we explore OpenAI's groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterprise security, and the risks it poses to privacy. Join hosts Tom Eston and Scott Wright as they discuss everything from the browser's memory function to v…
…
continue reading
1
It’s Always DNS: Lessons from the AWS Outage
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touches on the need for tested business continuity plans, the implications of DNS failures, and the misconceptions around cloud infrastructure’s automatic f…
…
continue reading
1
It's Always DNS: Lessons from the AWS Outage
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touches on the need for tested business continuity plans, the implications of DNS failures, and the misconceptions around cloud infrastructure's automatic f…
…
continue reading
1
Is Sora 2 the Future of Video? AI, Copyright, and Privacy Issues
22:41
22:41
Play later
Play later
Lists
Like
Liked
22:41OpenAI’s Sora 2 is here — and it’s not just another AI toy. This episode explores how Sora 2 works, how users can insert almost anything into generated content, and why that’s raising alarms about privacy, identity, and copyright. We walk you through the initial opt-out copyright controversy, the backlash from studios and creators, and how OpenAI i…
…
continue reading
1
Is Sora 2 the Future of Video? AI, Copyright, and Privacy Issues
22:41
22:41
Play later
Play later
Lists
Like
Liked
22:41OpenAI's Sora 2 is here — and it's not just another AI toy. This episode explores how Sora 2 works, how users can insert almost anything into generated content, and why that's raising alarms about privacy, identity, and copyright. We walk you through the initial opt-out copyright controversy, the backlash from studios and creators, and how OpenAI i…
…
continue reading
1
Age Verification Laws: A Privacy Disaster in the Making
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30In this episode, we discuss the surge of age verification laws spreading across the US, including the recent implementation in Ohio. These laws intend to shield children but come at a significant cost to privacy and cybersecurity. We’ll explore how third-party ID verification companies operate, the risks associated with these systems, and the broad…
…
continue reading
1
Age Verification Laws: A Privacy Disaster in the Making
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30In this episode, we discuss the surge of age verification laws spreading across the US, including the recent implementation in Ohio. These laws intend to shield children but come at a significant cost to privacy and cybersecurity. We'll explore how third-party ID verification companies operate, the risks associated with these systems, and the broad…
…
continue reading
Phishing simulations have been a cornerstone of security awareness training for years. But do they actually change user behavior, or are they just creating frustration and fatigue? In this episode, Tom Eston and Scott Wright (CEO of ClickArmor) debate whether simulated phishing attacks are still valuable in 2025. We cover the benefits, challenges, …
…
continue reading
1
Are Phishing Simulations Still Worth It in 2025?
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51Phishing simulations have been a cornerstone of security awareness training for years. But do they actually change user behavior, or are they just creating frustration and fatigue? In this episode, Tom Eston and Scott Wright (CEO of ClickArmor) debate whether simulated phishing attacks are still valuable in 2025. We cover the benefits, challenges, …
…
continue reading
1
Milestone Episode 400: Reflecting on 16 Years of Shared Security
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37Episode 400! In this special milestone edition of the Shared Security Podcast, we look back at 16 years of conversations on security, privacy, and technology. From our very first episodes in 2009 to today’s AI-driven threats, we cover the topics that defined each era, the surprises along the way, and the lessons that still matter. Plus, we share li…
…
continue reading