loader from loading.io

Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting

Shared Security

Release Date: 12/22/2025

The Real State of Offensive Security: AI, Penetration Testing & The Road Ahead with Andrew Wilson show art The Real State of Offensive Security: AI, Penetration Testing & The Road Ahead with Andrew Wilson

Shared Security

Tom Eston interviews offensive AI researcher and PhD candidate Andrew Wilson, a former Bishop Fox partner who helped grow the firm from under 20 people to nearly 500, built award-winning AI solutions for SOC modernization, founded Cactus Con, and relocated his family to Guadalajara to open and scale a Bishop Fox office. They discuss Mexico’s growing cybersecurity and AI ecosystem, driven by talent, community events, and government-university partnerships, and how offensive security has shifted from “one-person army” generalists to more specialized roles. Wilson explains his PhD work...

info_outline
The Privacy Problem With Meta’s Ray-Ban Smart Glasses show art The Privacy Problem With Meta’s Ray-Ban Smart Glasses

Shared Security

This episode discusses Meta Ray-Ban Smart Glasses, which blend a camera, microphone, AI features, and social media integration into sunglasses that look like normal fashion eyewear, raising major privacy concerns. It highlights reports that footage captured by the glasses may be reviewed by human contractors to help train Meta’s AI systems, and notes critics’ concerns about how easily people can be recorded in public without their knowledge. Although the glasses include a small LED indicator when recording, many people reportedly don’t notice it. Show notes:

info_outline
TikTok Says No to End-to-End Encryption: Here's Why That's a Big Deal show art TikTok Says No to End-to-End Encryption: Here's Why That's a Big Deal

Shared Security

In a move that bucks the entire industry trend, TikTok has confirmed it will not implement end-to-end encryption (E2EE) for direct messages on its platform — arguing that E2EE would make users less safe. We break down what's really going on: the child safety argument, the privacy counterargument, the geopolitical questions surrounding ByteDance, and what it all means for TikTok's 1 billion+ users. If you use TikTok, this episode is essential listening. Show notes:

info_outline
Claude Code Security: The AI Shockwave Hitting Cybersecurity show art Claude Code Security: The AI Shockwave Hitting Cybersecurity

Shared Security

Anthropic’s Claude Code Security research preview promises AI-powered code analysis and vulnerability detection at scale. The announcement triggered strong reactions across the cybersecurity community and sent several vendor stocks lower. In this episode, we break down what the tool actually does, where it fits in modern AppSec, and whether AI automation threatens traditional security products or simply makes teams more efficient. Expect a practical, no-hype conversation about what changes and what doesn’t. Show notes:

info_outline
TikTok’s New U.S. Deal and Privacy Policy: What Users Don’t Understand show art TikTok’s New U.S. Deal and Privacy Policy: What Users Don’t Understand

Shared Security

TikTok has shifted to a majority-American entity, TikTok USDS Joint Venture, LLC, to comply with U.S. national security requirements and avoid a ban. This week we discuss why a recent privacy policy update went viral—especially language about sensitive data like immigration status and precise location—and argue much of it reflects longstanding practices and required California privacy disclosures. We emphasize reading policies, understanding your threat model, and making your own decision about using TikTok or other social platforms. The episode also briefly mentions Ring ending its...

info_outline
Ring’s Search Party ‘Dystopia’ Debate & Claude Zero-Click RCE Vulnerability show art Ring’s Search Party ‘Dystopia’ Debate & Claude Zero-Click RCE Vulnerability

Shared Security

In this episode, we discuss two major tech stories impacting privacy and security. First, we analyze Ring's new AI-powered 'Search Party' feature and its controversial Super Bowl ad that sparked privacy concerns. We then transition to a breaking story about a zero-click remote code execution flaw in the Claude Desktop, highlighting the potential risks of AI. The hosts also reflect on their most popular YouTube episode on why Gen Z is ditching smartphones. Show notes:

info_outline
OpenClaw & Moltbook: AI Agents and Cybersecurity Risks show art OpenClaw & Moltbook: AI Agents and Cybersecurity Risks

Shared Security

Autonomous AI assistants are hitting the mainstream — but at what cost? This week, we discuss the recent OpenClaw phenomenon (formerly Clawdbot/Moltbot), the security fiasco surrounding Moltbook’s exposed database, and the quirky yet concerning AI agent dating platform MoltMatch. We explore the privacy and cybersecurity implications of entrusting AI agents with sensitive access and how defenders should think about emerging agentic risks. Show notes:

info_outline
Why Gen Z is Ditching Smartphones for Dumbphones show art Why Gen Z is Ditching Smartphones for Dumbphones

Shared Security

Younger generations are increasingly ditching smartphones in favor of “dumbphones”—simpler devices with fewer apps, fewer distractions, and less tracking. But what happens when you step away from a device that now functions as your wallet, your memory, and your security key? In this episode, Tom and Scott explore the dumbphone movement through a privacy and cybersecurity lens. Drawing from a recent Wired article, the conversation digs into digital burnout, surveillance capitalism, multi-factor authentication dependencies, and whether opting out of smartphones is an act of digital...

info_outline
AirDrop Security in iOS 26.2: Time Limits, Codes & Privacy Best Practices show art AirDrop Security in iOS 26.2: Time Limits, Codes & Privacy Best Practices

Shared Security

In this episode, we explore the latest changes to AirDrop in iOS 26.2 and how they enhance privacy and security. Learn about the new 10-minute limitation on the 'Everyone' setting and the introduction of AirDrop codes for safer file sharing with non-contacts. We also discuss best practices for configuring your AirDrop settings to safeguard your privacy, including tips for high-risk individuals and general recommendations for everyday use. Stay informed and keep your device secure by updating to the latest iOS version and regularly reviewing your AirDrop settings. Show notes:

info_outline
Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare? show art Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare?

Shared Security

In this episode, we explore Amazon Ring's newly introduced Familiar Faces feature that utilizes AI for facial recognition. We discuss the convenience of identifying familiar people at your doorstep, the privacy concerns it raises, and the legal implications surrounding biometric data. Learn about how this feature works, potential inaccuracies, and privacy laws in certain U.S. states. We also discuss broader concerns about AI and surveillance, and provide practical advice on using this technology responsibly. Show notes:

info_outline
 
More Episodes

In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as attending conferences, volunteering for open source projects, creating a blog, and seeking mentors. He also addresses misconceptions about the job shortage in cybersecurity and encourages listeners to start building their professional networks early. Tune in for valuable insights to help you advance your cybersecurity career.

Show notes: https://sharedsecurity.net/2025/12/22/why-networking-is-your-secret-weapon-in-cybersecurity-job-hunting/