Podcast Episodes

Back to Search
Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities

Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities



Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize…


Published on 4 months, 2 weeks ago

US Border Searches and Protesting in the Surveillance Age

US Border Searches and Protesting in the Surveillance Age



Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential t…


Published on 4 months, 3 weeks ago

The 23andMe Collapse, Signal Gate Fallout

The 23andMe Collapse, Signal Gate Fallout



In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Ke…


Published on 5 months ago

Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy

Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy



In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and ques…


Published on 5 months, 1 week ago

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows



In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Disc…


Published on 5 months, 2 weeks ago

Tackling Data Overload: Strategies for Effective Vulnerability Remediation

Tackling Data Overload: Strategies for Effective Vulnerability Remediation



In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Crimin…


Published on 5 months, 3 weeks ago

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes



In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with ins…


Published on 5 months, 4 weeks ago

Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors

Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors



In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA).…


Published on 6 months ago

Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher

Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher



In this episode, we welcome cybersecurity researcher and YouTube legend John Hammond. John shares insights from his career at Huntress and his popular YouTube channel, where he creates educational co…


Published on 6 months, 2 weeks ago

UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking

UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking



In this episode, we discuss the UK government’s demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implica…


Published on 6 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate