Look for any podcast host, guest or anyone
Showing episodes and shows of

Authentic8

Shows

NeedleStackNeedleStackAdventures in OSINT Red TeamingAnna discusses her career trajectory from corporate security and financial crimes to becoming the CEO of Pine Risk Management. She shares her experiences in conducting complex risk assessments, fraud detection, and crisis communications, particularly highlighting her role at Meta where she led Silicon Valley's largest physical red team.2025-06-1246 minNeedleStackNeedleStackHow culture can inform OSINT investigationsAn OSINT Arabic instructor and geopolitical risk expert joins the show to discuss what can get lost in translation when performing OSINT investigations. Plus learn how cultural knowledge can unlock key insights.About Paolo WalcherPaolo Walcher is a leading OSINT trainer and security consultant, recognized for his expertise in Arabic-language investigations, geopolitical risk, and strategic intelligence. With a background in counterterrorism and crisis management, Paolo delivers advanced OSINT training to law enforcement, military, and intelligence agencies on both national and international levels.At i-intelligence GmbH, he equips private and governmental organizations with...2025-05-2833 minNeedleStackNeedleStackRansomware gangs and OSINTRansomware groups continue to generate significant profits, frequently relying on recycled or leaked code—leading researchers to describe them as “lazy.” OSINT analysts follow cryptocurrency transactions to trace financial trails, while effective defense depends on early detection, system-level visibility, and staying alert to shifts in attacker techniques.2025-05-1419 minNeedleStackNeedleStackUsing AI in OSINT investigationsDiscover how AI is revolutionizing OSINT, from speeding up data collection to generating comprehensive reports, while also addressing the challenges and ethical considerations. Hosts AJ and Robert dive deep with Lance James, discussing real-world insights and the potential for misuse.2025-04-3052 minNeedleStackNeedleStackEntering infosec as an outsider! Tips from a librarian turned cyber analystA librarian and an OSINT analyst may have more in common than you realize. That’s how Tracy Maleeff found her way into cyber and made a name as InfoSec Sherpa.2025-04-1643 minNeedleStackNeedleStackWhat is counterintelligence?From government to private enterprise, counterintelligence can unlock big benefits in cybersecurity. We sit down with a counterintelligence professional to define the practice, and how everyone can benefit by employing it.2025-04-0239 minNeedleStackNeedleStack"We’re back, and we’re your new hosts"Meet the new hosts of NeedleStack. Robert Vamosi is a CISSP and award-winning journalist. AJ Nash has two decades of experience in the Intelligence community. Together they will host new episodes of NeedleStack, with an array of amazing guests.2025-03-1933 minRemarkable Content with Ian FaisonRemarkable Content with Ian FaisonThe Wager: B2B Marketing Lessons from the Epic True Story of the Shipwrecked HMS Wager with Former Director of Content Marketing at Authentic8, Shannon Ragan“Each man carried, along with a sea chest, his own burdensome story.” - Excerpt from The Wager, by David GrannThis is true not only for the men that sailed on the HMS Wager, but your audience and customers (minus the sea chests). Just as David Grann took those burdensome stories from journal entries to write The Wager, so too can you use the burdensome stories of your customers in your marketing.This is one of the things we’re talking about in this episode of Remarkable with the help of our special guest...2024-10-0844 minNeedleStackNeedleStackUsing OSINT to investigate organized animal crimeJacob Lloyd, head of investigations at Animal Welfare Investigations Project, has been putting OSINT skills to use to stop organized animal crime — dogfights, puppy mills, badger baiting and more. Jacob discusses how these crimes are often neglected by law enforcement due to lack of training and are thus dealt with reactively. He explains how to leverage pedigree sites, social media and other online sources to proactively investigate animal crime and save animals from this horrible fate. Key takeawaysWhat pedigree sites can tell you about fighting dogs and their ownersHow prevalent information on organized animal crime is...2024-08-1318 minNeedleStackNeedleStackInvestigating influence operationsFrom influence operations and Telegram to using marketing tools for OSINT insights, our guest gives pro tips on OSINT and cyber investigations for professional practitioners.Key takeawaysDigital forensics incident responseCyberthreat and OSINT crossoverMarketing tools for OSINT2024-08-0524 minNeedleStackNeedleStackIs Telegram the place for cyber investigators?In this episode, we sit down with cyber threat analyst and SANS OSINT instructor, Steven Harris. Steven discusses how Telegram is a must-use channel for investigating the war in Ukraine, and why cyber threat actors are flocking to the app.Key TakeawaysSOCMINT from law enforcement to cyber threatsInvestigating on TelegramWhy Telegram allows cyber threat actors a lower barrier to entry2024-06-2529 minNeedleStackNeedleStackOSINT for executive protectionAlex Lozano of Cybergy joins us to discuss how he uses OSINT and social media to protect executive clients, resources for his cyber students at University of Barcelona and the best tools for real-time monitoring.Key takeawaysHow to use OSINT for executive protectionResources for students and OSINT newbiesTools for real-time monitoring2024-06-1817 minNeedleStackNeedleStackWord up: learning foreign languages for OSINT with Skip SchiphorstLanguage can limit or expand your worldview. That’s important to remember in OSINT where what you’re able to find and analyze can greatly affect the intelligence you build. Skip Schiphorst, OSINT instructor at i-Intelligence, shares his expertise on why even baseline knowledge of a foreign language is important in a world flush with translation services; how foreign language content can counteract bias; and tips for verifying automated translations.Key takeawaysYou can find a lot more online than you may think by using foreign languages — even those using non-Latin charactersYou don’t need to be a nin...2024-06-1123 minNeedleStackNeedleStackOSINT after dark with MJ BaniasMJ Banias discusses how one man’s late-night OpSec fail is an OSINTer’s treasure. If that’s too salacious for you, we also talk about how awesome newspaper archives and librarians are.Key takeawaysPut yourself in your targets shoes to understand what sites could give you your next selectorThe sites and services every OSINTer should subscribe toHow overcoming a millennial’s worst nightmare could be the break you need2024-05-1437 minNeedleStackNeedleStackSecuring high-risk communitiesJournalists, academics and NGOs face unprecedented levels of threats in real life and in the digital world. With limited resources, they often lack secure methods to collect OSINT. That’s why a digital investigations platform is being offered pro bono as part of a larger CISA initiative. Key takeawaysNew threats in the digital landscapeThe risks for journalists, NGOs and academics collecting OSINTHow digital investigative teams can protect themselves2024-05-0721 minNeedleStackNeedleStackDemystifying dark web research for enterprise and law enforcementAn analysts from DarkOwl joins us to discuss dark web research and all its facets. From AI and other trends on the dark web, to operational security, learn how to turn on the light beneath the surface of the internet.Key takeawaysAI and other dark web trendsOperational security in dark web researchHow to search an unindexed environment2024-04-3020 minNeedleStackNeedleStackBreaking in: how to use OSINT for pen testingHow can I get in? Steve Stasiukonis knows the power OSINT brings to this crucial pen testing question. From uncovering who to pose as, what to wear and how to forge a badge, OSINT can be the key you need to unlock a client's physical security. Steve also discusses the gold mine OSINT brings to cyber pen tests and what CTI pros need to know before going on the dark web.Key takeawaysHow OSINT is used in pen testingDark web OPSEC considerationsHow Steve easily broke into banks (for good!)2024-04-1620 minNeedleStackNeedleStackLockbit and the stories behind ransomware with Jon DiMaggioWe go behind the scenes with Jon DiMaggio of Ransomware Diaries. As the chief security strategist at Analyst 1, Jon has conducted in-depth investigations of ransomware groups, including the famed Lockbit gang. He tells us the open-source tactics he uses and how cyber threats can take a mental toll.Key takeawaysTracking the Lockbit storyWhere OSINT meets ransomware investigationsThe human element in threat detection2024-03-1928 minNeedleStackNeedleStackLegal and OSINT: hunting down the bullsh*tBullsh*t Hunting creators Justin Seitz and Some Lawyer share their tips on how OSINT and legal investigation tactics can benefit one another. They talk about their series “The Hunt” as it examines suspicious legal proceedings and possible wrongful convictions. Plus we dive deep into public records requests with tips of how to get the information you need.Key TakeawaysHow to effectively submit a public records requestWhat OSINTers can learn from legal professionals and vice versaThink like a lawyer when searching legal databases2024-03-1228 minNeedleStackNeedleStackSecurity research: humans in the loop with John HammondCybersecurity is rife with technological solutions, but as security researcher John Hammond knows all too well, it’s people that make the difference. Hear how people make or break security intel, both as researchers and threat actors. We’ll talk sock puppets, the role of OSINT for your own OPSEC and intelligence building, cybergang leaders as businessmen and more. Plus we’ll dive into John’s recent OSINT work on the ScreenConnect vulnerabilities and how they’re being leveraged in the wild.Key takeawaysUsing OSINT for opsec to protect your identity and enhance security intelligenceLurking in dark we...2024-03-0528 minNeedleStackNeedleStackWhat’s up with OSINTUp?Do you wish you had more training opportunities or just chances to flex your OSINT skills? We’re hosting a big event this month where we’ll talk ways to level up your tradecraft, training opportunities, take-home tips and more.2024-02-1316 minNeedleStackNeedleStackOSINT training in 2024There are many paths to OSINT — one of them is through training programs and online resources! Aubrey and Shannon break down what’s available, what’s free (or not) to keep you abreast of how you can gain and further your OSINT skills.2024-02-0613 minNeedleStackNeedleStackDigital investigation techniques with Craig SilvermanPropublica reporter and author of the Digital Investigations newsletter, Craig Silverman joins the podcast to discuss disinformation trends on social media platforms, elections around the world in 2024 and what journalists and OSINT investigators can learn from each other.Key takeawaysOSINT for investigative journalismDisinformation trends on social mediaDocumenting evidence during an investigation2023-12-0535 minNeedleStackNeedleStackOPSEC on the internet’s dark side with Sam BentDefCon speaker and host of DoingFedTime on YouTube, Sam Bent joins the podcast to shine light on operational security concerns on the dark web. The reformed darknet marketplace seller shares insights and advice for best practices when investigating on the dark web. Key takeaways:OPSEC on the dark webThe different darknetsLinguistic analysis in evidence gathering2023-11-2850 minNeedleStackNeedleStackSocial media intelligence gathering with Ritu GillRitu Gill, or @OSINTtechniques as she’s known online, joins the podcast to give tips for social media intelligence gathering. What are the little-known platforms to look at and how do you gather safely? Tune in to hear the tips.Key takeawaysOverlooked social media platforms for evidence gatheringOPSEC for law enforcementTips for beginning OSINT practitioners2023-11-1424 minNeedleStackNeedleStackTraining law enforcement on trafficking with Griffin GlynnThe chief investigations officer of the National Child Protection Task Force shares the tools and methods he trains law enforcement on, how he protects his mental health in a such a devastating field and the latest platforms and technology to stay on top of.Key takeawaysOSINT for child protectionThe importance of mental healthWhat law enforcement need to know about trafficking2023-10-1737 minNeedleStackNeedleStackThe myths and misconceptions of child protectionJessica Smith, president and founder of ClickSafe intelligence and special investigations lead with the National Child Protection Task Force, joins the podcast to dispel misconceptions about child protection. From who is being targeted to where and how, Jessica Smith shares how misinformation about child exploitation can derail investigations, and how OSINT helps pave the way for child protection.Key takeawaysMisinformation around child protection can adversely affect investigationsHow OSINT plays a role in helping victimsThe new platforms where kids are targetedTips for vigilance and education2023-10-1045 minNeedleStackNeedleStackCan AI identify AI?We discuss recent Bellingcat reports on whether AI has the capability to reliably identify AI. The reporter and fellow shares his research on AI for OSINT and the results.Key takeawaysTesting AI’s ability to recognize AI artBlending journalism and OSINT at BellingcatHow machine learning should and shouldn’t be used in OSINT2023-10-0337 minNeedleStackNeedleStackOSINT by day and nightWe talk to an OSINT professional about what he learned when he applied his daytime skills to a moonlighting hobby. On YouTube, Gary Ruddell shares 3-minute tips, geolocates scenes from movies and shares the OSINT discipline he learned from the U.K. military with hobbyists and practitioners just starting out.Key takeaways:Applying the intelligence cycleExecutive protection with social mediaGeolocation clues from the shortest frame2023-09-2635 minNeedleStackNeedleStackHow AI is disrupting OSINT for better or worseProducers Aubrey and Shannon review the latest articles and research on using AI in OSINT. Should you consider using AI chatbots in research now or in the future? And if so, how can you do so securely and with verification in mind?Key takeawaysAI chatbots aren’t great at OSINT right now, but they might be one dayVerification is keyYou need an access policy2023-08-2920 minNeedleStackNeedleStackKeeping up with AI and social mediaHow can researchers keep up with all the changes in the OSINT landscape? From AI to constantly shifting social media platforms, Neil Spencer from LifeRaft gives tips for how to adapt and optimize your OSINT practice.Key takeawaysHow AI has evolvedMassive shifts on social media platformsThreat verification2023-08-2229 minNeedleStackNeedleStackAI-enhanced technology for frictionless bordersAs analysts assess how AI could improve their workflow, Babel Street is presenting technology that can help border agents better name-match terrorist watchlist to travelers. Declan Trezise, vice president of global solutions engineering, joins the show to discuss how AI can create more seamless borders for agents and innocent travelers.Key TakeawaysDigitization and the future of bordersName–matching technology for terrorism watchlistsCreating faster, seamless travel for citizens2023-08-1538 minNeedleStackNeedleStackThe ethical use of AI in open-source investigationsEveryone is talking about using AI for OSINT, but what are the ethical considerations before you fire up your first chat? Before you start feeding a machine learning model your data and relying on it’s results, our guest from Fivecast tells us what you should consider.Key takeawaysChatGPT has built-in biases (just like humans)Understand the human toll behind machine learningHow to use AI responsibly2023-08-0335 minNeedleStackNeedleStackLeveraging generative AI for OSINTWondering how to incorporate AI into your OSINT framework? We asked the CEO and founder of the popular training organization, OSINT Combine. Key takeawaysHow can OSINT researchers leverage generative AI?Tips for spotting disinformation in an AI worldTeaching ChatGPT your company datasets2023-07-2518 minNeedleStackNeedleStackLifeRaft: What security teams need to know about ChatGPTWe’re handing the mic over to our friends at Talking Threat Intelligence, a podcast by LifeRaft today. On the show, they had our very own Daniel Ben-Chitrit on to discuss the security implications of ChatGPT, how it could be used by phishing scammers to up their skills and the safest way for OSINT researchers to prompt AI.Key takeawaysSecurity implications of ChatGPT“A force multiplier” for phishing scammersThe safest way for OSINT researchers to prompt AI2023-07-1838 minTalking Threat IntelligenceTalking Threat IntelligenceWhat Security Teams Need to Know About ChatGPTImagine a world where talking to computers feels as natural as chatting with a friend. That's the power of ChatGPT, a groundbreaking technology developed by a company called OpenAI.  This technology has already revolutionized the way we work with computers. Instead of giving them commands, we can have real conversations with them. It's like having an incredibly smart virtual assistant at our fingertips. ChatGPT understands what we say and responds in a way that makes sense. It helps us find information quickly, provides useful suggestions, and even assists with tasks like writing. With ChatGPT, the possibilities seem e...2023-07-1133 minNeedleStackNeedleStackMaritime OSINT deep dive with Rae BakerWe sit down with the author of the new OSINT reference book Deep Dive: Exploring the Real-world Value of Open Source Intelligence, Rae Baker. Baker is an expert in OSINT with an emphasis on maritime intelligence, analyzing vessels and ports around the world. In this episode, she shares tips from her book, blog and career, and we explore her one-of-a-kind OSINT training game, Kase Scenarios.2023-06-1324 minNeedleStackNeedleStackGEOINT for funsies with JoseMonkeyNot his real name, but there’s real fun to be had learning how JoseMonkey geolocates videos on his wildly popular TikTok channel. Hear the tools, techniques and process he uses to pinpoint even the trickiest videos, the wildest things he’s seen and how this supersleuth got into the GEOINT game.2023-06-0628 minNeedleStackNeedleStackUSGIF GEOINT Symposium acronym spectacularWe attended USGIF’s GEOINT Symposium so you don’t have to (but you should – it’s great). NeedleStack producers Aubrey and Shannon break down the geospatial intelligence conference (and its many, many acronyms) and the presence of OSINT on the floor, in keynotes and the Innovation Hub. If you’re an open-source researcher, tune in to understand what’s out there and how to leverage this adjacent INT.2023-05-3129 minNeedleStackNeedleStackThe good and bad of geotagsIn this episode, our guest brings more than 30 years of experience from the Department of Defense to the conversation. James A. Samuel, Jr. is now in the private sector working as an entrepreneur in the GEOINT space, using his military knowledge to create apps that use location data to protect safety.2023-05-1635 minNeedleStackNeedleStackThe future of GEOINTAs commercial satellites increase and technology advances, what does the future of geospatial intelligence look like? We ask our guest to explain the basics of GEOINT, where it’s headed and how other industries can utilize one of the most fascinating -INTs.2023-05-0930 minNeedleStackNeedleStackHard-to-hear OSINT truthsAbbi Dobbertin of Fivecast and Adam Huenke join the podcast to talk hot takes. As tradecraft and training leads, respectively, and years of OSINT practitioner experience between them, they’ve come to form opinions on some of OSINT’s more heated topics.2023-04-1134 minNeedleStackNeedleStackThe youths and their TikTok: a SOCMINT symposium recapProducers Shannon and Aubrey attend the 2023 Symposium on Open Source, Social Media and National Security. They discuss highlights, panel topics and advice for people hoping to break into a career in OSINT, INFOSEC and NATSEC.2023-04-0433 minNeedleStackNeedleStackWhat if we taught OSINT to high schoolers?This week, a high school criminology teacher joins the podcast to discuss how teaching open-source research helped engage his students during distant learning. In the classroom, OSINT can show students the power of open-source information and serves as a cautionary tale for sharing personally identifiable information online.2023-03-2821 minNeedleStackNeedleStackThink like an investigatorOur guest is a former FBI investigator and current university professor who has tips for practitioners in every industry. From the protocol before you log on to conduct OSINT research to the resources and reporting, here are the tips for approaching your OSINT like law enforcement. 2023-03-0736 minNeedleStackNeedleStackTake-home tips for OSINT Curious researchersA founding member of the OSINT Curious Project joins us to give practical tips and advice for researchers. We discuss tools, tradecraft and trends with Micah Hoffman.2023-02-2822 minNeedleStackNeedleStackNetworking your way to better OSINTThe president of the OSMOSIS Association and host of OSINT Cocktail, Cynthia Navarro, joins the podcast to discuss how creating a community of open-source researchers had allowed her to learn from others and hone her skills.2023-02-2132 minNeedleStackNeedleStackHow OSINT is changing in federal governmentThe times they are a’changing. Open-source intelligence was once the lesser celebrated branch and now makes up the bulk of analytical reporting. Our guest tells how the federal government is changing its views on OSINT.2023-02-1411 minNeedleStackNeedleStackOSINT’s journey from academia to decision-makersThe director of the soon-to-open Open-Source Intelligence Laboratory of University of Albany joins the podcast to discuss the definition of OSINT and how his students will research its effect on society.2023-02-0731 minNeedleStackNeedleStackIs your digital fingerprint following you into 2023?It’s a new year and as researchers work to hit their goals, we want to revisit some of our most important advice for securely investigating online. It’s time to take stock of your security hygiene and revisit how your digital fingerprint may be getting in the way of finding the data you need.2023-01-3112 minNeedleStackNeedleStackThe Best of Season 1Watch when Jack Rhysider of Darknet Diaries shares his amazement at what hackers will do “for a free burrito,” or the moment Rob Fuller, a read team and CTI director, condemns security awareness training. From journalists to OSINT investigators to dark web experts, here are some of the best moments we shared with guests last season.2023-01-2441 minNeedleStackNeedleStackBook club: This Is How They Tell Me The World EndsOur second book club episode features essential reading for threat intelligence. New York Times reporter, Nicole Perloth, gives a history of the zero-day market and how it has changed the cyber weapons arms race. Learn how this market was created and what it means for future cyber defense.2022-12-1323 minNeedleStackNeedleStackBook club: We Are BellingcatThis special edition of NeedleStack features a must-read for open-source researchers, We Are Bellingcat by Eliot Higgins. Our producer Shannon discusses what she learned from the founder of Bellingcat’s tell-all and how researchers can learn from the organization’s practices.2022-12-0627 minNeedleStackNeedleStackPractical OSINT tips from the fieldIn this episode, an expert OSINT practitioner from both government and private sector practices joins to share hands-on tips from in the field. He also shares what the students of Center for Intelligence and Research and Training are learning from their real-world client experiences.2022-11-1524 minNeedleStackNeedleStackSubverting censorship through techAuthoritarian regimes create propaganda and disinformation, in part, by blocking citizens’ access to traditional news sources. In this episode, co-founder of Samizdat Online, Yevgeny Simkin, walks us through how their program works in partnership with outlets to syndicate articles to bypass censorship in Russia and other countries — to get citizens and researchers the information they need.2022-11-0823 minNeedleStackNeedleStackHow to perform a fact-check: from start to finishNick Hardinges from the Reuters fact-checking team joins the podcast to walk us through how to go about debunking information online, from deciding what’s worth covering to why grainy images should make you skeptical. Ultimately, fact-checking takes time, persistence and a healthy dose of intrigue. Key takeawaysKnow these telltale signs of doctored contentCheck your sourcesDo some digging on what you seeAbout NickNick Hardinges is a former digital news editor and current fact-checker for Reuters, whose job is to find harmful, widely circulating and topical misinformation, and then address th...2022-10-1826 minNeedleStackNeedleStackVerifying what you see in the mediaSocial media and traditional media overlap now more than ever, with social media providing an opportunity to reach and resonate with new audiences – for better or worse. Rachel Baig knows this intersection well. As a social media journalist and trainer for Deutsche Welle, she knows the ins and outs of not only using social to identify a great story but also how to spot a fake one. In this episode, Rachel breaks down important lessons from her training to understand media spoofs, verify images and videos, spot tell-tale signs of bots and more.2022-10-1120 minNeedleStackNeedleStackWhy Russian disinformation is so effectiveFact-checkers’ biggest nemesis is the proliferation of disinformation in the digital age. Chris Paul joins the episode to talk about Russian propaganda and disinformation techniques. Why are they so effective? Is it skill or just an innate vulnerability for humans to want to believe what they see? Chris Paul walks us through his research from the technical to the psychological.2022-10-0425 minNeedleStackNeedleStackWhere Woodward meets Holmes: OSINT and investigative journalismThe intersection of open-source information, disinformation, social media and journalism has spawned a new breed of investigator. Meet Brecht Castel, fact-checking journalist and OSINT aficionado. In this episode, Brecht shares his advice on how to be good at both. Learn how his background as a journalist helps him dig deeper, beyond “hashtag OSINT” and get the bigger story. And how his passion for OSINT has led down many interesting paths — from locating one tree in the whole of Africa to explaining why a mosquito with a number on its back is not part of Bill Gates’ plan for worl...2022-09-2720 minNeedleStackNeedleStackThe AI tracking alt-social mediaMis- and disinformation abound on social media. But as violating users are deplatformed from mainstream sites, they’ve become hyper-concentrated on alternative social media where anything goes. We sit down with Dr. Welton Chang, CEO and co-founder of Pyrra Technologies, to discuss how AI/ML is helping researchers zero-in on disinformation, domestic extremism, hate speech and more, and understand how to counteract it.2022-09-2023 minNeedleStackNeedleStackAutopsy of a story: the art and science of fact-checkingFact-checking can be seen as the undoing of a story, tearing apart the salacious tidbits to get at the bloody — or perhaps just boring — truth. In this episode, veteran journalist and lead of AFP's award-winning digital verification team in Africa, Nina Lamparski, sits down in the NeedleStack guest seat to discuss fact-checking and debunking in the age of misinformation, how local media consumption habits impact her work, fact-checking in election cycles and more.2022-09-1325 minNeedleStackNeedleStackPro tips for intel team “care and feeding”From a love of Tom Clancy novels to military intelligence to “the ivory tower” of industry analysts, Rick Holland’s road to Digital Shadow’s CISO taught him many lessons along the way. Rick shares his advice for building an intel team, including: avoid homogenous groups; take time to strategize — and follow — processes for OSINT collection on the surface, deep and dark (or derp) web; and remember the importance of human relationships even in the tech-heavy world of threat intelligence.2022-08-3121 minNeedleStackNeedleStackUsing OSINT to identify weaknessesOSINT is a powerful tool to identify vulnerabilities in your organization. But with all the information out there, how do you zero-in on the data you need quickly? In this episode, host and former CISO Matt Ashburn gives his advice on go-to resources, where to automate, how to truly gain an outside perspective and tradecraft considerations.2022-08-0914 minNeedleStackNeedleStackIntelligence sharing for the greater goodAfter spending 22 years in the U.S. Air Force building the branch’s cyber presence worldwide and reshaping its cyber curriculum, Lance Taylor now applies his background to the private sector. From lessons he’s learned along the way to the best tools for the job, Lance tells us how companies can improve their intel.2022-08-0225 minNeedleStackNeedleStackInformation is not intelligenceWithout the right appreciation for intelligence, organizations may be hiring themselves into a problem. Vice President of Intelligence at ZeroFox A.J. Nash sits down with NeedleStack to discuss the fundamentals of intelligence, how to build and lead the best teams, and why as analysts doing the easy thing may be doing the best thing.2022-07-2627 minNeedleStackNeedleStackRed team, blue team, stopping hack fiendsIn episode 20 we interview Rob Fuller, the red team and CTI director for a major U.S. airline. Rob discusses how red teams can better leverage CTI, the grand mistakes of even the most security-conscious individuals, and why he thinks most security awareness training gets it wrong.2022-07-1237 minNeedleStackNeedleStackYour dark web questions answeredIn this listeners live episode, Matt answers questions from the audience that have come up over our dark web episodes. Get sage advice on safely accessing the dark web without running afoul of policy, blockchain analysis (or the lack thereof with Monero), how to use PGP encryption to communicate with dark web actors and more.2022-06-1420 minNeedleStackNeedleStackDear Darknet Diaries: dark web stories with Jack RhysiderThe surprising identity behind some of the internet’s most nefarious hacks and why sometimes criminals are more willing to talk than victims of a crime, we discuss the dark side of the web with Darknet Diaries host Jack Rhysider.2022-06-0729 minNeedleStackNeedleStackThe Silk Road and other dark destinations with Eileen OrmsbyEileen Ormsby has chatted with drug lords, been threatened by purported hitmen and written books about The Silk Road. Her investigative journalism led her to the dark web, where she has been reporting her findings ever since.2022-05-3125 minNeedleStackNeedleStackDark web research tips for the OSINT-curiousMichael James of the OSINT Curious Project joins the podcast to give expert tips on conducting dark web research. From GitHub tools to Discord resources— Michael has practical guidance on finding information in the dark.2022-05-2427 minNeedleStackNeedleStackInvestigating financial crimes on the dark webIn this episode, podcast contributor Adam Huenke discusses how to investigate financial crimes on the dark web. How do stolen credit card numbers affect the victim of theft, the institution and those who investigate fraud? Tune in to hear all about it.2022-05-1719 minNeedleStackNeedleStackFollow the money: how cryptocurrency shines a light in the dark webThere’s a (false) assumption that cryptocurrency is inherently anonymous, concealing the identity of those who use it. But in fact, crypto has been used in countless investigations to unmask criminals and bring them to justice. We sit down with Matt Price, former IRS-CI special agent and current head of investigations and intelligence at Binance, to bust the myths of crypto and the dark web, and learn how the best advice to any investigator holds true for crypto: follow the money.2022-05-1018 minNeedleStackNeedleStackReady to turn out the light? An intro to the dark webIn this episode, host Matt Ashburn, and co-host Jeff Phillips, break down everything you needed to know about the dark web. From how it works and why it was invented to things to consider before conducting your research there – we cover all the questions you were too afraid to ask.2022-05-0315 minNeedleStackNeedleStackListeners live April 2022Needlestack hosts answered live questions from our listeners in this special episode. From use cases in different industries to world news to tools to help researchers – Matt and Jeff discussed the role of OSINT in professional research.2022-04-1324 minNeedleStackNeedleStackOSINT’s crucial role in CTIThis week the team is joined by threat intelligence researcher Adam Huenke to go over the importance of open-source intelligence to CTI research. From social media to the dark web, freely available information can be found to help improve security.2022-04-0518 minNeedleStackNeedleStackHow OSINT informs executive protectionIt takes a team of people to provide protection to executives and one of their most important tools for offering the best protection is OSINT. Whether searching Facebook for public protests or getting a tip from Twitter, guest Mick Baccio explains how open-source is a key tool in the field.2022-03-2915 minNeedleStackNeedleStackWhere trust and safety meets OSINTTrust and safety is a constantly growing and evolving field. In this episode, we cover the basics of the industry and the role of OSINT in minimizing risk to end users. We also discuss the risks to researchers when their investigations take them off-platform and into the wild of the web.2022-03-2212 minNeedleStackNeedleStackHow law enforcement is using OSINTThe latest episode in our OSINT use case tour covers how open-source can be applied to law enforcement. The popular use of social media has made it so that more and more of the clues investigators are looking for can be freely found.2022-03-1520 minNeedleStackNeedleStackOSINT in a tense worldOpen-source intelligence (OSINT) has been playing out on the world stage in a big way over the past few weeks. Social media platforms like TikTok have become insightful sources for analysts to track Russian military movements in the Ukraine invasion. Tracking disinformation on various sites shows a war being fought with more than tanks — Russia is using culture and the power of the media. And auxiliary intelligence is a growing resource in governments gaining OSINT.2022-03-0818 minNeedleStackNeedleStackListeners live February 2022In our first listeners live episode, Matt and Jeff take questions from our live audience. They cover resources that can be useful in finding the best OSINT tools; advantages to using native-language search engines in international research; free training for OSINT analysts; and managing attribution to access the information you need. Listen on-demand, or sign up for our upcoming live events at authentic8.com/events/needlestack. 2022-02-1513 minNeedleStackNeedleStackKnow thyself, disguise thyselfDisguising your digital fingerprint is imperative to the results of online research. This episode, the hosts dive into the tools that can help investigators understand and manage their identity online. From websites to browsers, extensions and full-service managed attribution platforms, here are the tools you need to blend in online.2022-02-0826 minNeedleStackNeedleStackHidden dangers of the digital fingerprintYou’re conducting your research. It seems like it’s going successfully. But unbeknownst to you, the subject of your research is onto you, knows you’re snooping and is working to spoil your investigation. This is thanks to your digital fingerprint being passed by your browser. In this panel discussion, we dive deeeep into all the ways details of your digital fingerprint can be discovered — even when using tools built to disguise it — and how adversaries can take advantage of it.2022-02-0131 minNeedleStackNeedleStackVPNs, Incognito, free Wi-Fi, oh my!In an effort to conceal their identity, online researchers may turn to the solutions they know: VPNs, Inocgnito Mode and free Wi-Fi. While these solutions may appear to be working on the surface, there’s lots of details still being disclosed to sites they visit. Tune in to learn what these solutions miss and what’s needed to truly blend in with the crowd to ensure quality research.2022-01-2520 minNeedleStackNeedleStackWhat's in your digital fingerprintBlending in with the crowd is critical to performing successful online research. If adversaries or the targets of your research can recognize your digital fingerprint, you could get blocked, targeted, infected, identified or tracked. In this episode, we’ll explain what’s in a digital fingerprint, how traditional browsers share this information, what it can mean for research projects and what’s needed to manage it.2022-01-2520 minNeedleStackNeedleStackThe podcast for professional online researchTune into the podcast every week to learn how to hone your online research skills with better tradecraft. Hear from our host Matt Ashburn and co-host Jeff Phillips as they share tips, tricks and tools to protect your identity, stay safe while you search and improve the efficiency of your investigations. Learn more at authentic8.com/needlestack.2022-01-2402 minNeedleStackNeedleStackOnline research: your risk, your rewardThe use cases for online research have exploded in recent years and have become critical practices not just in government and law enforcement agencies, but also in commercial organizations of all sizes. We look at the impact online research has, what are the risks to those who perform sensitive research and what needs to change in the practice. 2022-01-1813 minModern CTOModern CTO#206 Kevin Lund - CTO at Authentic8Cyber Security, Products, CTO Responsibilities Today we are talking to Kevin Lund, the CTO at Authentic8. And we discuss using previous experience to set yourself up for success, the differences between inward and outward facing CTOs and how being passionate about the business first will help the product deliver more value. All of this, right now, on the Modern CTO Podcast! Check them out at https://www.authentic8.com/2020-08-051h 01Business Security Weekly (Video)Business Security Weekly (Video)SWVHSC: How Security Spending Overlooks the Biggest Risk of All - Matt Ashburn - BSW #183Global spending on cyber security totals over $100 billion per year, with no upper limit in sight as adversaries remain successful at compromising even well-resourced organizations. Why do adversaries remain successful despite advances in security technologies and risk frameworks? As it turns out, an often-overlooked architecture from 30 years ago is a common thread among many successful attacks. By re-thinking the ubiquitous web browser and its connection to the internet, CIOs and CISOs can nearly eliminate their internet risk surface, provide users the tools and access they need, and free up incident responders to focus on more advanced threats.  2020-08-0528 minSmashing SecuritySmashing SecurityHuawei ban, MGM hack, and a contact-tracing cock-upLogin chaos for England's contact tracing service, our drill-down on the Britain's Huawei 5G ban, MGM's blockbuster breach, and how to pronounce "Gigabyte."All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.Plus we have a bonus featured interview with Scott Petry, the co-founder of Authentic8, all about how you can browse the internet safely, securely, and anonymously when conducting research, collecting sensitive evidence, and analyzing data.Visit https://www.smashingsecurity.com/187 to check out...2020-07-161h 03Smashing SecuritySmashing SecurityHuawei ban, MGM hack, and a contact-tracing cock-upLogin chaos for England's contact tracing service, our drill-down on the Britain's Huawei 5G ban, MGM's blockbuster breach, and how to pronounce "Gigabyte."All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.Plus we have a bonus featured interview with Scott Petry, the co-founder of Authentic8, all about how you can browse the internet safely, securely, and anonymously when conducting research, collecting sensitive evidence, and analyzing data.2020-07-161h 03Smashing SecuritySmashing SecurityThis one's for all the Karens!A high-rolling Hushpuppi gets extradited to the United States, Carole details her problems with clipboards and Disposophobia, and our guest becomes the subject of fake news during the Senegalese election.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by investigative journalist Michelle Madsen (or is it Michelle Damsen? Hmm...).Visit https://www.smashingsecurity.com/186 to check out this episode’s show notes and episode links.Follow th...2020-07-0949 minSmashing SecuritySmashing SecurityBieber fever, Roblox, and ransomwareWho's been dressing Robox players up in red baseball caps? Which ransomware victim's negotations got spied on by the media? And should Jason Bieber think twice before touching his hat? Oh, and we need to talk about squirrels...All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by John Hawes.Visit https://www.smashingsecurity.com/185 to check out this episode’s show notes and episode links.Follow the show on Tw...2020-07-0247 minThe CU2.0 PodcastThe CU2.0 PodcastCU 2.0 Podcast Episode 80 Scott Petry Authentic8 on the Tower of Babel in Many FIsSend us a textThey just don't talk well together.That's the surprising conclusion in a report entitled "Surprising Disconnect Over Compliance and Secure Web Use at Financial Firms," research sponsored by IT security company Authentic8. (Download the report here.)Inside many banks and credit unions IT, compliance, and legal just don't talk the same language and often do not see the same problems, according to this report.Read the related CUInsight article about the report here. 2020-02-2635 minTriangulation (Video)Triangulation (Video)Scott Petry, CEO of Authentic8 Scott Petry is the CEO of Authentic8. He talks to Leo Laporte about his work on the Newton, how he saved the world from spam, and his plan to make your browser safe. Host: Leo Laporte Guest: Scott Petry Download or subscribe to this show at https://twit.tv/shows/triangulation. 2019-11-221h 04Triangulation (Audio)Triangulation (Audio)Scott Petry, CEO of Authentic8 Scott Petry is the CEO of Authentic8. He talks to Leo Laporte about his work on the Newton, how he saved the world from spam, and his plan to make your browser safe. Host: Leo Laporte Guest: Scott Petry Download or subscribe to this show at https://twit.tv/shows/triangulation. 2019-11-221h 04Business Security Weekly (Video)Business Security Weekly (Video)Challenges in the Browser & Securing Web Sessions - Scott Petry - BSW #152Scott Petry is the CEO of Authentic8. Scott Petry has been using the cloud to disrupt the information security market for nearly 20 years. He founded Postini in 1999, which pioneered the cloud-delivered service model for email security and content compliance. After Postini was acquired by Google, Scott remained as Director of Product Management for Google Enterprise. In 2010, he co-founded Authentic8, a secure virtual browser solution designed to address the inherent lack of security in the protocols the world uses to access the web. He graduated with a B.S. from San Diego State University. To learn more about...2019-11-2040 minDesigning Enterprise PlatformsDesigning Enterprise PlatformsEarly Adopter Research Podcast with Authentic8's Scott PetryIn this edition of the Early Adopter Research(EAR)Podcast, EAR's Dan Woods speaks with Scott Petry, the CEO of Authentic8. Their conversation focused on the current cybersecurity landscape and Authentic8's approach of securing the browser. Their discussion also covered: * 2:30 - Zero Trust * 7:20 - Why is cybersecurity always additive? * 13:30 - How will cybersecurity change as it moves to the cloud? * 20:00 - How to be a rational buyer in cybersecurity * 24:30 - Is cyber insurance necessary?2019-03-2127 minCharles TendellCharles TendellWhat is #GDPR and why you should care with Scott Petry @imscottpetry of @authentic8GDPR is on the minds and lips of a lot of security professionals these days. And some are even making a career out of it. But what exactly GDPR is and what we need to know about it isn't as scary as it seems. Scott Perty Of Authentic8 Joins the conversation. https://www.authentic8.com/2018-01-3051 minConnectSafely LiveConnectSafely LiveScott Petry of Authentic8 on secure cloud browserLarry speaks with Scott Petry about Authentic8's secure cloud-based browser2017-02-1406 min