Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest episode

Person walking on a red carpet event, with a focus on their elegant pleated skirt. The left side of the image features a colorful audio equalizer graphic.

E86 | Using OSINT to protect celebrities and athletes

Sometimes, when a Hollywood actor stars in a blockbuster film or a hit TV show, or when an athlete wins the Super Bowl, their personal problems begin with scandalous photos, property theft, even death threats. That’s where OSINT can help them stay one step ahead.

Listen
Subscribe
Enter your email address below to receive notifications from needlestack@authentic8.com

Featured

podcast microphone

E77 | "We’re back, and we’re your new hosts."
E77 | "We’re back, and we’re your new hosts."

Listen
executive and his security detail walking

S3E73 | OSINT for executive protection
S3E73 | OSINT for executive protection

Listen
NeedleStack waveform logo with pixelated, padlock outline

S3E68 | Breaking in: how to use OSINT for pen testing
S3E68 | Breaking in: how to use OSINT for pen testing

Listen

Latest podcast

Topic
  • Option 1
  • Option 2
  • Option 3
  • Option 4
Person walking on a red carpet event, with a focus on their elegant pleated skirt. The left side of the image features a colorful audio equalizer graphic.

E86 | Using OSINT to protect…
E86 | Using OSINT to protect celebrities and athletes

Listen
Podcast Landing

E85 | An OSINT investigator’s toolkit
E85 | An OSINT investigator’s toolkit

Listen
cyber graphic of outline of human face

E84 | AI as an insider threat
E84 | AI as an insider threat

Listen
ball in maze

E83 | Adventures in OSINT Red Teaming
E83 | Adventures in OSINT Red Teaming

Listen
illustration of a diverse group people

E82 | How culture can inform OSINT…
E82 | How culture can inform OSINT investigations

Listen
Ransomware Gangs and OSINT

E81 | Ransomware Gangs and OSINT
E81 | Ransomware Gangs and OSINT

Listen
cyber graphic of a magnifying glass

E80 | Using AI in OSINT investigations
E80 | Using AI in OSINT investigations

Listen
cyber lock graphic

E79 | Entering infosec as an outsider!…
E79 | Entering infosec as an outsider! Tips from a librarian turned cyber analyst

Listen
counterintelligence

E78 | What is counterintelligence?
E78 | What is counterintelligence?

Listen
Close
Close