Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest episode

cyber graphic of outline of human face

E84 | AI as an insider threat

AJ and Robert explore the shadowy side of AI — how some users are becoming addicted, confiding in it like a personal therapist and then gaining confidence to take risky actions in their lives and at work. They discuss what this could mean for insider threats and the broader impact on security.

Listen
Subscribe
Enter your email address below to receive notifications from needlestack@authentic8.com

Featured

podcast microphone

E77 | "We’re back, and we’re your new hosts."
E77 | "We’re back, and we’re your new hosts."

Listen
executive and his security detail walking

S3E73 | OSINT for executive protection
S3E73 | OSINT for executive protection

Listen
NeedleStack waveform logo with pixelated, padlock outline

S3E68 | Breaking in: how to use OSINT for pen testing
S3E68 | Breaking in: how to use OSINT for pen testing

Listen

Latest podcast

Topic
  • Option 1
  • Option 2
  • Option 3
  • Option 4
Investigating influence operations

S3E75 | Investigating influence…
S3E75 | Investigating influence operations

Listen
an image of the app, telegram

S3E74 | Is Telegram the place for cyber…
S3E74 | Is Telegram the place for cyber investigators?

Listen
executive and his security detail walking

S3E73 | OSINT for executive protection
S3E73 | OSINT for executive protection

Listen
a large amount of circles with different national flags

S3E72 | Word up: learning foreign…
S3E72 | Word up: learning foreign languages for OSINT with Skip Schiphorst

Listen
person holding index finger up to their mouth

S3E71 | OSINT after dark with MJ Banias
S3E71 | OSINT after dark with MJ Banias

Listen
Securing high-risk communities

S3E70 | Securing high-risk communities
S3E70 | Securing high-risk communities

Listen
Demystifying dark web research

S3E69 | Demystifying dark web research…
S3E69 | Demystifying dark web research for enterprise and law enforcement

Listen
NeedleStack waveform logo with pixelated, padlock outline

S3E68 | Breaking in: how to use OSINT…
S3E68 | Breaking in: how to use OSINT for pen testing

Listen
skull in circuit board representing ransomware

S3E67 | Lockbit and the stories behind…
S3E67 | Lockbit and the stories behind ransomware with Jon DiMaggio

Listen
Close
Close