Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest episode

Person wearing headphones facing a computer screen, with a graphic of colorful sound waves and the NeedleStack on the right.

E95 | The Rise of Citizen OSINT and What to Do About It

In this episode, hosts Robert Vamosi and AJ Nash engage with Neil Ysart, a seasoned expert in cyber investigations and OSINT.

Listen
Subscribe
Enter your email address below to receive notifications from needlestack@authentic8.com

Featured

podcast microphone

E77 | "We’re back, and we’re your new hosts."
E77 | "We’re back, and we’re your new hosts."

Listen
executive and his security detail walking

S3E73 | OSINT for executive protection
S3E73 | OSINT for executive protection

Listen
NeedleStack waveform logo with pixelated, padlock outline

S3E68 | Breaking in: how to use OSINT for pen testing
S3E68 | Breaking in: how to use OSINT for pen testing

Listen

Latest podcast

Topic
  • Option 1
  • Option 2
  • Option 3
  • Option 4
Person walking on a red carpet event, with a focus on their elegant pleated skirt. The left side of the image features a colorful audio equalizer graphic.

E86 | Using OSINT to protect…
E86 | Using OSINT to protect celebrities and athletes

Listen
Podcast Landing

E85 | An OSINT investigator’s toolkit
E85 | An OSINT investigator’s toolkit

Listen
cyber graphic of outline of human face

E84 | AI as an insider threat
E84 | AI as an insider threat

Listen
ball in maze

E83 | Adventures in OSINT Red Teaming
E83 | Adventures in OSINT Red Teaming

Listen
illustration of a diverse group people

E82 | How culture can inform OSINT…
E82 | How culture can inform OSINT investigations

Listen
Ransomware Gangs and OSINT

E81 | Ransomware Gangs and OSINT
E81 | Ransomware Gangs and OSINT

Listen
cyber graphic of a magnifying glass

E80 | Using AI in OSINT investigations
E80 | Using AI in OSINT investigations

Listen
cyber lock graphic

E79 | Entering infosec as an outsider!…
E79 | Entering infosec as an outsider! Tips from a librarian turned cyber analyst

Listen
counterintelligence

E78 | What is counterintelligence?
E78 | What is counterintelligence?

Listen
Close
Close