Shared Security Podcast
4.5(28)

Shared Security Podcast

by Tom Eston, Scott Wright, Kevin Tackett

558 episodesLatest yesterdayEN-US
Shared Security is the the longest-running cybersecurity and privacy podcast where industry veterans Tom Eston, Scott Wright, and Kevin Tackett break down the week’s security WTF moments, privacy fails, human mistakes, and “why is this still a problem?” stories — with humor, honesty, and hard-earned real-world experience. Whether you’re a security pro, a privacy advocate, or just here to hear Kevin yell about vendor nonsense, this podcast delivers insights you’ll actually use — and laughs you probably need. Real security talk from people who’ve lived it.

2026

Recent reviews on Apple Podcasts (5)
  • Highly Recommend

    I appreciate the sound advice given on current security events as well as other comments! I follow this podcast this every Monday.

    KWGraves ·

  • 30% ads 50% useless chatter

    Only a tiny fraction of the show is valuable, and that too going over news articles. A lot of wasted time. But that’s just me.

    Tony-Stark-0 ·

  • Entertaining, insightful and actionable! 👏👏👏

    Whether you’re well established as someone who can translate creative energy into the impact you want to have on the cyber security industry, or just getting started as a catalyst for change - this is a must-listen podcast for you! Tom and Scott do an incredible job leading conversations that cover a huge breadth of topics related to the ins and outs of building a thriving career in data security, and life you can be proud of - from leaders who’ve actually walked the path. Highly recommend listening and subscribing!

    obacker19 ·

  • Awesome and helpful!

    Love this show. Always keeps me interested and always look forward to new episodes. Can’t recommend it enough. -Tabby from Your New Best Friends podcast

    HelloandNo ·

  • Great pod!

    So helpful, great podcast!

    Abpfinance ·

View all reviews on Apple Podcasts

Episodes (558)

  1. Fake Party Invites and the Rise of Social Phishing Attacks

    May 4, 202615m

    Attackers are now impersonating invitation services to trick people into clicking malicious links and sharing sensitive information. These phishing attempts look like legitimate event invites, making them especially effe

  2. New York’s 3D Printing Crackdown: Security or Surveillance?

    Apr 27, 202615m

    New York’s latest budget proposal could fundamentally change how 3D printers work—requiring built-in software that scans and blocks certain designs. Supporters say it’s about stopping ghost guns. Critics say it opens the

  3. Project Glasswing: When AI Becomes the Ultimate Hacker—and Defender

    Apr 20, 202628m

    Anthropic has introduced Project Glasswing, a cybersecurity initiative powered by an unreleased AI model called Claude Mythos. This system can identify zero-day vulnerabilities, generate exploits, and even help fix them—

  4. The Dark Web Explained with John Hammond

    Apr 13, 202622m

    The dark web is often misunderstood, but it plays an important role in both privacy technology and cybercrime activity. In this episode, Tom Eston speaks with cybersecurity researcher and educator John Hammond about what

  5. Meta & YouTube Found Negligent: A Turning Point for Big Tech?

    Apr 6, 202613m

    A landmark jury verdict has found Meta and YouTube negligent in a social media addiction case, raising major questions about platform accountability and legal protections under Section 230. This episode covers the detail

  6. The Hidden Tracking Risk Inside Your Tires

    Mar 30, 202614m

    In this episode, Tom Eston and co-host Scott Wright discuss research showing that Tire Pressure Monitoring Systems (TPMS) can create privacy risks because the sensors broadcast unencrypted, uniquely identifying wireless

  7. The Real State of Offensive Security: AI, Penetration Testing & The Road Ahead with Andrew Wilson

    Mar 23, 202644m

    Tom Eston interviews offensive AI researcher and PhD candidate Andrew Wilson, a former Bishop Fox partner who helped grow the firm from under 20 people to nearly 500, built award-winning AI solutions for SOC modernizatio

  8. The Privacy Problem With Meta’s Ray-Ban Smart Glasses

    Mar 16, 202618m

    This episode discusses Meta Ray-Ban Smart Glasses, which blend a camera, microphone, AI features, and social media integration into sunglasses that look like normal fashion eyewear, raising major privacy concerns. It hig

  9. TikTok Says No to End-to-End Encryption: Here’s Why That’s a Big Deal

    Mar 9, 202615m

    In a move that bucks the entire industry trend, TikTok has confirmed it will not implement end-to-end encryption (E2EE) for direct messages on its platform — arguing that E2EE would make users less safe. We break down wh

  10. Claude Code Security: The AI Shockwave Hitting Cybersecurity

    Mar 2, 202613m

    Anthropic’s Claude Code Security research preview promises AI-powered code analysis and vulnerability detection at scale. The announcement triggered strong reactions across the cybersecurity community and sent several ve

  11. TikTok’s New U.S. Deal and Privacy Policy: What Users Don’t Understand

    Feb 23, 202616m

    TikTok has shifted to a majority-American entity, TikTok USDS Joint Venture, LLC, to comply with U.S. national security requirements and avoid a ban. This week we discuss why a recent privacy policy update went viral—esp

  12. Ring’s Search Party ‘Dystopia’ Debate & Claude Zero-Click RCE Vulnerability

    Feb 16, 202624m

    In this episode, we discuss two major tech stories impacting privacy and security. First, we analyze Ring’s new AI-powered ‘Search Party’ feature and its controversial Super Bowl ad that sparked privacy concerns. We then

  13. OpenClaw & Moltbook: AI Agents and Cybersecurity Risks

    Feb 9, 202621m

    Autonomous AI assistants are hitting the mainstream — but at what cost? This week, we discuss the recent OpenClaw phenomenon (formerly Clawdbot/Moltbot), the security fiasco surrounding Moltbook’s exposed database, and t

  14. Why Gen Z is Ditching Smartphones for Dumbphones

    Feb 2, 202619m

    Younger generations are increasingly ditching smartphones in favor of “dumbphones”—simpler devices with fewer apps, fewer distractions, and less tracking. But what happens when you step away from a device that now functi

  15. AirDrop Security in iOS 26.2: Time Limits, Codes & Privacy Best Practices

    Jan 26, 20267m

    In this episode, we explore the latest changes to AirDrop in iOS 26.2 and how they enhance privacy and security. Learn about the new 10-minute limitation on the ‘Everyone’ setting and the introduction of AirDrop codes fo

  16. Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare?

    Jan 19, 202615m

    In this episode, we explore Amazon Ring’s newly introduced Familiar Faces feature that utilizes AI for facial recognition. We discuss the convenience of identifying familiar people at your doorstep, the privacy concerns

  17. Your Google Searches Aren’t Private? PA Court’s Surprising Ruling

    Jan 12, 202616m

    In this episode of Shared Security, we discuss a significant Pennsylvania Supreme Court ruling that permits police to access unprotected Google search histories without a traditional warrant. The discussion centers aroun

  18. AI and the End of the Traditional Entry-Level Tech Job

    Jan 5, 202614m

    Welcome to the first episode of the Shared Security Podcast in 2026! As AI becomes increasingly integrated into technical fields such as software development and cybersecurity, traditional entry-level roles are evolving

  19. 2025 Predictions: Hits, Misses & What We Learned

    Dec 29, 202536m

    Join us this week as we rewind the tape on our 2025 predictions. In this episode, we revisit last year’s forecasts in cybersecurity, geopolitics, and AI, discussing which ones came true, which ones fizzled out, and which

  20. Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting

    Dec 22, 202512m

    In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as atten

  21. The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns

    Dec 15, 202518m

    Join us in the midst of the holiday shopping season as we discuss a growing privacy problem: tracking pixels embedded in marketing emails. According to Proton’s latest Spam Watch 2025 report, nearly 80% of promotional em

  22. Seeing Is Not Believing: How to Spot AI-Generated Video

    Dec 8, 202517m

    In this episode we discuss the rising challenge of AI-generated videos, including deepfakes and synthetic clips that can deceive even a skeptical viewer. Once the gold standard of proof, video content is now increasingly

  23. So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer

    Dec 1, 202531m

    In this special episode of the Shared Security Podcast, host Tom Eston reunites with former co-host and experienced fractional CISO, Chris Clymer. They reminisce about their early podcasting days and discuss the evolving

  24. AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage

    Nov 24, 202518m

    In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organi

  25. OWASP Top 10 for 2025: What’s New and Why It Matters

    Nov 17, 202518m

    In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore the changes, the continuity, and the significance of the update for application