Podcast Episodes

Back to Search
2025 Predictions: Hits, Misses & What We Learned

2025 Predictions: Hits, Misses & What We Learned



Join us this week as we rewind the tape on our 2025 predictions. In this episode, we revisit last year’s forecasts in cybersecurity, geopolitics, and AI, discussing which ones came true, which ones f…


Published on 7 hours ago

Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting

Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting



In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking …


Published on 1 week ago

The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns

The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns



Join us in the midst of the holiday shopping season as we discuss a growing privacy problem: tracking pixels embedded in marketing emails. According to Proton’s latest Spam Watch 2025 report, nearly …


Published on 2 weeks ago

Seeing Is Not Believing: How to Spot AI-Generated Video

Seeing Is Not Believing: How to Spot AI-Generated Video



In this episode we discuss the rising challenge of AI-generated videos, including deepfakes and synthetic clips that can deceive even a skeptical viewer. Once the gold standard of proof, video conten…


Published on 3 weeks ago

So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer

So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer



In this special episode of the Shared Security Podcast, host Tom Eston reunites with former co-host and experienced fractional CISO, Chris Clymer. They reminisce about their early podcasting days and…


Published on 4 weeks ago

AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage

AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage



In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to ta…


Published on 1 month ago

OWASP Top 10 for 2025: What’s New and Why It Matters

OWASP Top 10 for 2025: What’s New and Why It Matters



In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore the changes, the continuity, and the significance of the up…


Published on 1 month, 1 week ago

Meet NEO 1X: The Robot That Does Chores and Spies on You?

Meet NEO 1X: The Robot That Does Chores and Spies on You?



The future of home robotics is here — and it’s a little awkward. Meet the NEO 1X humanoid robot, designed to help with chores but raising huge cybersecurity and privacy questions. We discuss what it …


Published on 1 month, 2 weeks ago

OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy

OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy



In this episode, we explore OpenAI’s groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterpris…


Published on 1 month, 3 weeks ago

It’s Always DNS: Lessons from the AWS Outage

It’s Always DNS: Lessons from the AWS Outage



In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touch…


Published on 2 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate