logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search
Shared Security Podcast

Scott Wright and Tom Eston have just completed their 100th episode of the Shared Security Podcast.

[et_pb_section fb_built=”1″ _builder_version=”4.4.6″ custom_padding=”0px|||||” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.4.6″ custom_padding=”5px||8px|||”][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.4.6″]

It has been my pleasure to have co-hosted 100 episodes of the Shared Security Podcast with Tom Eston. We have been practicing social distancing religiously for over 10 years. In fact, we have never met in person. Tom and I were brought together by the early “Information Security” discussion forums back in 2007, which included Michael Santarcangelo’s “Security Catalyst Forum”.

Tom’s day job is managing a team of “penetration testers” who assess the security of systems and networks, which makes him a good complement to my specialty of addressing the human awareness side of security.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_image src=”https://clickarmor.ca/wp-content/uploads/2020/06/sharedsec-100.png” alt=”Shared Security Podcast” title_text=”Shared-Security-Podcast-Episode-100″ url=”https://www.youtube.com/watch?v=e6Fl9h-bDZc&t=460s” url_new_window=”on” _builder_version=”4.4.6″ width=”100%” hover_enabled=”0″][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″ custom_padding=”8px|||||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.4.6″]

We decided that when things like LinkedIn, Twitter and Facebook started to become a regular part of all our lives, there were some inherent risks that many people didn’t realize existed. So, it made sense to start a podcast where we could raise people’s awareness of not only the apparent technical risks (through poorly implemented security), but of things like privacy and social engineering.

Since 2009, we usually covered two or three major security or privacy stories on a nearly monthly basis. We originally called it the “Social Media Security Podcast”, but around Episode 40, we could see that many of the risks we were talking about involved more than social media. We were often covering the “Internet of Things” (IoT), as well as “home assistants” and even apps that just operate insecurely. So, we renamed it the “Shared Security Podcast” – in hommage to the “sharing” nature of almost every app and website that now exists.

We have been very fortunate to have some of the security industry’s leading experts on the show. A few of them have joined us a number of times to provide updates. In this 100th episode, we reminisce about some of the interesting stories we have covered over the years, and we are happy to have had Rachel Tobac and Kathleen Smith with us in this episode to help us celebrate the milestone. We are really proud of this achievement.

Between our monthly, informal episodes, and Tom’s popular, weekly security news feed called “Shared Security Weekly Blaze”, you can learn about recent trends in security and hear our perspectives on what they mean for businesses and individuals.

You can find the Shared Security Podcast on any of the popular podcast listening apps, and you can find our home page, where Tom maintains our show notes, at: www.sharedsecurity.net

We also have a Youtube channel where you can find video versions of many of our episodes.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]
Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use