Data Privacy

Telegram is NOT an Encrypted Messaging App, Must-See Documentaries
Tom Eston | | arrest, Class Action Park, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Documentary, E2E, EFF, encryption, end-to-end encryption, Episodes, france, Information Security, Infosec, LuLaRich, LuLaRoe, messaging, OSINT, Pavlov Durov, Podcast, Podcasts, Privacy, security, social media, technology, Telegram
In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is ...

Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips
Tom Eston | | Alexa, amazon, black hat, Black Hat USA, Cyber Security, Cybersecurity, Data Privacy, DEF CON, Digital Privacy, Episodes, google, Information Security, Infosec, Justice, las vegas, Monopoly, Podcast, Podcasts, Privacy, privacy settings, security, technology, US Justice Department, USJD, Weekly Edition
This week, we discuss Google’s recent accusation by the U.S. Justice Department for being a monopoly and its implications for privacy and cybersecurity. We also cover essential privacy settings for Alexa smart ...

Survey Surfaces Widespread Mishandling of Sensitive Data
Perforce Software today published a survey of 250 IT professionals that finds the amount of sensitive data residing in non-production environments is rising as organizations embrace artificial intelligence (AI) and digital business ...
Security Boulevard

The Inefficiency of People-Search Removal Tools, Massive Data Breach Impacting U.S. Citizens
Tom Eston | | Confidently, Consumer Reports, Cyber Security, Cybersecurity, Data breach, Data Privacy, DeleteMe, Digital Privacy, EasyOptOuts, Episodes, Hackers, idx, Information Security, Infosec, Kanary, Optery, People Search, People-Search Removal Tool, Podcast, Podcasts, Privacy, Privacy Law, privacy laws, ReputationDefender, security, social security number, ssn, technology, US Privacy Law, Weekly Edition
In episode 342, we discuss the effectiveness of people-search removal tools like DeleteMe and Reputation Defender, based on a study by Consumer Reports. We also cover how almost every American’s social security ...

Exploring Cybersecurity Trends at Black Hat 2024 with Shourya Pratap Singh from SquareX
Tom Eston | | AI, Application Security, AppSec, browser, Cyber Security, Cybersecurity, Data Privacy, DEF CON, defcon, Digital Privacy, Episodes, Information Security, Infosec, Podcast, Podcasts, Privacy, Secure Web Gateway, security, Shourya Pratap Singh, Special Editions, SquareX, SWG, technology, Vivek Ramachandran, web browser, Web security, Weekly Edition
Join us for this special live edition of the Shared Security Podcast, recorded in scorching Las Vegas at Black Hat 2024. Host Tom Eston is joined by Shourya Pratap Singh, Principal Software ...

How To Secure GenAI by Implementing RBAC In The Enterprise
Generative AI (GenAI) is revolutionizing enterprises, but security challenges loom large. Implementing Role-Based Access Control (RBAC) offers a robust solution. This article explores how defining roles, mapping permissions, and enforcing access controls ...

How Using a VPN May Benefit Your Privacy
In the title of this post, keep in mind the keyword is may; as a forewarning, this is not a post that definitively says you must use a VPN regardless of the ...

The Great CrowdStrike Crash, AI’s Role in Employee Smiles
Tom Eston | | AI, antivirus, CrowdStrike, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, employee, Employee Monitoring, Episodes, Information Security, Infosec, IT, IT Outage, Japan, Microsoft, Mister Smile, Mr. Smile, outage, Podcast, Podcasts, Privacy, security, Smiles, technology, update, Weekly Edition, Windows, Workplace, Worldwide
In episode 341, we cover the unprecedented global IT outage caused by a CrowdStrike update crash, affecting 8.5 million Windows machines. We discuss whether it’s the largest outage in history and discuss ...

Opal Security Extends Scope and Reach of Platform for Managing Privileges
Michael Vizard | | access, Cloud Security, Cybersecurity, Data Privacy, Phishing, privilege, Security Awareness
Opal Security this week updated its privilege posture management platform to provide the ability to detect irregular access to an IT environment and manage privileges by groups ...
Security Boulevard

How SquareX is Redefining Web Security: An In-Depth Discussion with Chief Architect Jeswin Mathai
Tom Eston | | AI, Application Security, AppSec, browser, Cyber Security, Cybersecurity, Data Privacy, defcon, Digital Privacy, Episodes, Information Security, Infosec, Jeswin Mathai, Podcast, Podcasts, Privacy, Secure Web Gateway, security, Special Editions, SquareX, SWG, technology, Vivek Ramachandran, web browser, Web security, Weekly Edition
In this episode, Tom Eston hosts Jeswin Mathai, Chief Architect at SquareX. This episode is part two of a series featuring SquareX, and Jeswin takes a deeper look into their cybersecurity solutions ...