loader from loading.io

2025 Predictions: Hits, Misses & What We Learned

Shared Security

Release Date: 12/29/2025

Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare? show art Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare?

Shared Security

In this episode, we explore Amazon Ring's newly introduced Familiar Faces feature that utilizes AI for facial recognition. We discuss the convenience of identifying familiar people at your doorstep, the privacy concerns it raises, and the legal implications surrounding biometric data. Learn about how this feature works, potential inaccuracies, and privacy laws in certain U.S. states. We also discuss broader concerns about AI and surveillance, and provide practical advice on using this technology responsibly. Show notes:

info_outline
Your Google Searches Aren't Private? PA Court's Surprising Ruling show art Your Google Searches Aren't Private? PA Court's Surprising Ruling

Shared Security

In this episode of Shared Security, we discuss a significant Pennsylvania Supreme Court ruling that permits police to access unprotected Google search histories without a traditional warrant. The discussion centers around the implications of the Commonwealth vs. Kurtz case and the concept of reverse keyword searches. Kevin Tackett joins the conversation, providing insights and posing critical questions about the balance between law enforcement needs and privacy rights. The episode explores concerns over digital privacy, third-party data, and potential broader impacts on users. Show notes:

info_outline
AI and the End of the Traditional Entry-Level Tech Job show art AI and the End of the Traditional Entry-Level Tech Job

Shared Security

Welcome to the first episode of the Shared Security Podcast in 2026! As AI becomes increasingly integrated into technical fields such as software development and cybersecurity, traditional entry-level roles are evolving or disappearing. This episode discusses the implications of AI on entry-level knowledge worker jobs, emphasizing the need for students, recent graduates, and those entering the job market to adapt their strategies. Discover the new skills and approaches needed to stay relevant, explore potential career pivots, and learn why degrees and certifications alone are no longer...

info_outline
2025 Predictions: Hits, Misses & What We Learned show art 2025 Predictions: Hits, Misses & What We Learned

Shared Security

Join us this week as we rewind the tape on our 2025 predictions. In this episode, we revisit last year's forecasts in cybersecurity, geopolitics, and AI, discussing which ones came true, which ones fizzled out, and which ones were a mixed bag. Additionally, we share insights from past guests, celebrate milestones, and make bold new predictions for 2026. Find out what we got right, what surprised us, and what we think is on the horizon for the coming year! Show notes:

info_outline
Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting show art Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting

Shared Security

In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as attending conferences, volunteering for open source projects, creating a blog, and seeking mentors. He also addresses misconceptions about the job shortage in cybersecurity and encourages listeners to start building their professional networks early. Tune in for valuable insights to help you advance your cybersecurity career. Show notes:

info_outline
The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns show art The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns

Shared Security

Join us in the midst of the holiday shopping season as we discuss a growing privacy problem: tracking pixels embedded in marketing emails. According to Proton's latest Spam Watch 2025 report, nearly 80% of promotional emails now contain trackers that report back your email activity. We discuss how these trackers work, why they become more aggressive during the holidays, the data being collected by marketers, and how you can protect yourself. We are joined by Scott Wright to explore Proton's comprehensive study, identify the worst offenders in email tracking, and share tips on maintaining your...

info_outline
Seeing Is Not Believing: How to Spot AI-Generated Video show art Seeing Is Not Believing: How to Spot AI-Generated Video

Shared Security

In this episode we discuss the rising challenge of AI-generated videos, including deepfakes and synthetic clips that can deceive even a skeptical viewer. Once the gold standard of proof, video content is now increasingly manipulated through advanced AI tools like Sora 2 and Google's Nano Banana, making it harder to separate reality from fiction. Tom and Scott discuss the differences between malicious deepfakes and poorly-made AI-generated content, identify key indicators that reveal a video might be AI-generated, and explain how these videos are used in social engineering attacks. Practical...

info_outline
So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer show art So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer

Shared Security

In this special episode of the Shared Security Podcast, host Tom Eston reunites with former co-host and experienced fractional CISO, Chris Clymer. They reminisce about their early podcasting days and discuss the evolving role of a Chief Information Security Officer (CISO). The conversation covers the responsibilities, challenges, and skills required to be a successful CISO, including technical and soft skills, business acumen, and people management. Chris shares his journey, the concept of a fractional CISO, and offers valuable advice for those aspiring to enter the CISO role. Tune in for a...

info_outline
AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage show art AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage

Shared Security

In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how the attack was executed, why it matters, and its implications for cybersecurity. Join the conversation as we examine the details, Anthropic's response, and the broader impact on AI in cybersecurity. Show notes:

info_outline
OWASP Top 10 for 2025: What's New and Why It Matters show art OWASP Top 10 for 2025: What's New and Why It Matters

Shared Security

In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore the changes, the continuity, and the significance of the update for application security. Learn about the importance of getting involved with the release candidate to provide feedback and suggestions. The conversation touches on the history of the OWASP Top 10, its release cycle, the evolution from specific vulnerabilities to broader categories, and the impact on vulnerability assessment and compliance. Show notes:  

info_outline
 
More Episodes

Join us this week as we rewind the tape on our 2025 predictions. In this episode, we revisit last year's forecasts in cybersecurity, geopolitics, and AI, discussing which ones came true, which ones fizzled out, and which ones were a mixed bag. Additionally, we share insights from past guests, celebrate milestones, and make bold new predictions for 2026. Find out what we got right, what surprised us, and what we think is on the horizon for the coming year!

Show notes: https://sharedsecurity.net/2025/12/29/2025-predictions-hits-misses-what-we-learned/