Each episode our panel of International Map Hackers will dissect a buzzword from the world of GIS. We’ll give you concrete definitions, practical applications, and share where we hope the technology can go from here.
…
continue reading
Map Hackers Podcasts
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
The Fraudian Slip Podcast from the ITRC
…
continue reading
Customer onboarding in B2B SaaS is changing fast, but the resources for onboarding teams? Not so much. That's why we're kicking off Onboarding Therapy, a podcast that tackles the real challenges onboarding teams face every day.
…
continue reading
Ever wondered what really goes on when solo traveling the world? Join Emily from Emily Eats and Explores and Ashley from Ashley gets Around weekly as they air out their crazy travel stories, share travel tips, and just chat about travel! Emily Cooper is a full-time traveler and the creator behind Emily Eats and Explores. In 2022, Emily quit her job in healthcare to travel the world solo and create content. Now, she teaches women how they can make money while they travel the world! Ashley Pet ...
…
continue reading
Inside the FBI highlights news, cases, and people from around the Bureau—in audio form.
…
continue reading
Listen to the Eh Sayers podcast to meet the people behind the data and explore the stories behind the numbers. Join us as we meet with experts from Statistics Canada and from across the nation to ask and answer the questions that matter to Canadians.
…
continue reading
Cybersecurity Innovation Podcast is the show that experts in their field share the lessons they've learned, the tactics they use, and all other things that are driving innovation in the field.
…
continue reading

1
Emily's Honeymoon Part 1: All About Tahiti
33:49
33:49
Play later
Play later
Lists
Like
Liked
33:49Travel Chat with Ashley and Emily is back — and this time, Emily’s fresh from her honeymoon in French Polynesia! In this two-part series, the girls dive into every detail of the trip, starting with their time in beautiful Tahiti. Emily shares why waiting a bit after the wedding to take their honeymoon turned out to be the best decision, plus all th…
…
continue reading

1
The Weekly Breach Breakdown Podcast: NSA Popup Warning - What If You See a Suspicious Popup? - S6E32
2:53
2:53
Play later
Play later
Lists
Like
Liked
2:53Welcome to the Identity Theft Resource Center’s (ITRC’s) Weekly Breach Breakdown for October 17, 2025. I’m Tim Walden, Communications Leader for the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today we’re talking about a serious NSA…
…
continue reading

1
SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads& Malicious Link Distribution
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55This story was originally published on HackerNoon at: https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution. The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or relea Check mor…
…
continue reading

1
Mapping Prime Factorization onto Palm Jumeirah: A Geometric View of the Elliptic Curve Method
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19This story was originally published on HackerNoon at: https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method. Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M. Check more stories…
…
continue reading

1
The Dark Side of GPT: How NLP Tools Are Being Used for Phishing, Scams, and Misinformation
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41This story was originally published on HackerNoon at: https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation. Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. Learn how AI-powered attacks are becoming more sophisticated and dangerous. Check more stories related to…
…
continue reading

1
Beyond Phishing: How Agentic AI Is Weaponizing the Human Element in Next-Gen Cyberattacks
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34This story was originally published on HackerNoon at: https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks. Security expert analyzes how Agentic AI moves beyond simple phishing to autonomously exploit the human element. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading

1
The Weekly Breach Breakdown Podcast: Step Into the Breach – Q3 2025 Data Breach Analysis - S6E31
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50Welcome to the Identity Theft Resource Center's (ITRC’s) Weekly Breach Breakdown for October 10, 2025. I'm Alex Achten, Senior Director of Communications & Media Relations for the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, w…
…
continue reading

1
INE Security Releases "Wired Together: The Case For Cross-Training In Net working And Cybersecurity"
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02This story was originally published on HackerNoon at: https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity. The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to ha Check more st…
…
continue reading

1
Building Resilient Operations Through ITIL-Based Incident Management
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00This story was originally published on HackerNoon at: https://hackernoon.com/building-resilient-operations-through-itil-based-incident-management. ITIL 4 transforms cloud incident management with automation, observability, and adaptive governance—cutting MTTR by 47% and boosting resilience. Check more stories related to cybersecurity at: https://ha…
…
continue reading
…
continue reading
On this episode of the Inside the FBI Podcast, we'll share the story behind Operation Summer Heat, a nationwide initiative that aimed to get the worst of the worst violent offenders off American streets and to seize illegal weapons and drugs flowing through our communities, with the ultimate goal of restoring safety to neighborhoods across the Unit…
…
continue reading

1
The Weekly Breach Breakdown Podcast: The Phantom Only Warns Once – The Phantom Hacker Scam - S6E30
4:14
4:14
Play later
Play later
Lists
Like
Liked
4:14Welcome to the Identity Theft Resource Center's (ITRCs) Weekly Breach Breakdown for October 3, 2025. I'm Tatiana Cuadras, Communications Assistant for the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we are going to break down…
…
continue reading

1
Quantum Photons Deliver the Ultimate Random Number Generator
16:49
16:49
Play later
Play later
Lists
Like
Liked
16:49This story was originally published on HackerNoon at: https://hackernoon.com/quantum-photons-deliver-the-ultimate-random-number-generator. HOM interference, entanglement, and CHSH tests have confirmed secure quantum randomness, guaranteeing cryptographic applications that are independent of devices Check more stories related to cybersecurity at: ht…
…
continue reading

1
Inside the AI-Driven Supply Chain: How Scribe Security Is Building Trust at Code Speed
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00This story was originally published on HackerNoon at: https://hackernoon.com/inside-the-ai-driven-supply-chain-how-scribe-security-is-building-trust-at-code-speed. Scribe Security’s ScribeHub combines signed provenance, SBOMs, and AI agents to secure AI-generated code and meet global supply chain regulations. Check more stories related to cybersecu…
…
continue reading

1
ThreatBook Launches Best-of-Breed Advanced Threat Intelligence Solution
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04This story was originally published on HackerNoon at: https://hackernoon.com/threatbook-launches-best-of-breed-advanced-threat-intelligence-solution. 34% of cyber-attacks worldwide take place within the Asia Pacific (APAC) ThreatBook ATI is able to capture new, difficult-to-detect threats emanating from withi Check more stories related to cybersecu…
…
continue reading

1
The Four Seasons Resort Orlando: Part 2 – Golf, Spa, Dining & More
37:13
37:13
Play later
Play later
Lists
Like
Liked
37:13This week on Travel Chat with Ashley & Emily They're back with the second half of their hosted stay at the Four Seasons Resort Orlando — but this time, it’s all about the details! After last week’s big-picture overview, Ashley and Emily are diving deep into the incredible amenities that make this resort so special. From world-class golf and a dream…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/you-should-be-faking-your-security-answers. One way to guarantee they won’t know the answers to these questions is if you make them up and save them in your password manager for future reference. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybe…
…
continue reading

1
Want to Stay Safe Online? Lie About Your Birthday
3:34
3:34
Play later
Play later
Lists
Like
Liked
3:34This story was originally published on HackerNoon at: https://hackernoon.com/want-to-stay-safe-online-lie-about-your-birthday. Your birth date, like your phone number, is personal information that scammers can use to steal your identity or target you for fraud. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. …
…
continue reading

1
Sia Redefines Cloud Security with Supreme Privacy and Impenetrable Protection
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:15This story was originally published on HackerNoon at: https://hackernoon.com/sia-redefines-cloud-security-with-supreme-privacy-and-impenetrable-protection. Sia delivers decentralized cloud security with Supreme Privacy and Impenetrable Protection, eliminating single points of failure and insider threats. Check more stories related to cybersecurity …
…
continue reading

1
The Day I Learned My NAS Was Traceable Through TLS Logs
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17This story was originally published on HackerNoon at: https://hackernoon.com/the-day-i-learned-my-nas-was-traceable-through-tls-logs. I recently learned about a new way to leak your privacy, and it's a scary one. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #dns, …
…
continue reading

1
The Weekly Breach Breakdown Podcast: Turning up the Heat – Giving Scammers the Third Degree - S6E29
4:15
4:15
Play later
Play later
Lists
Like
Liked
4:15Welcome to the Identity Theft Resource Center’s (ITRC) Weekly Breach Breakdown for September 26, 2025. I’m Tim Walden. Thanks to SentiLink for their support of the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. This week, we’re discussing a new wave of tools designed to help us c…
…
continue reading

1
How to Stop Getting Spam Emails—The Complete Guide to Removing Your Personal Information Online
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51This story was originally published on HackerNoon at: https://hackernoon.com/how-to-stop-getting-spam-emailsthe-complete-guide-to-removing-your-personal-information-online. How to remove your personal information from the major data broker sites and get fewer ads in your inbox. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading

1
How Generative AI Can Be Used in Cybersecurity
11:50
11:50
Play later
Play later
Lists
Like
Liked
11:50This story was originally published on HackerNoon at: https://hackernoon.com/how-generative-ai-can-be-used-in-cybersecurity. Explore how generative AI is transforming cybersecurity: its dual-use risks, defense tools, and what teams must do to stay ahead. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can…
…
continue reading

1
Luxury and Disney Magic at the Four Seasons Resort Orlando: Part One
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54Ashley and Emily are back from an incredible hosted stay at the Four Seasons Resort Orlando at Walt Disney World® Resort — and in part one, they’re spilling all the details. From flawless service to magical surprises, this trip was packed with Disney magic and luxury from start to finish. They share their flight experience, a little-known airport l…
…
continue reading

1
Research Round Up: On Anonymization -Creating Data That Enables Generalization Without Memorization
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35This story was originally published on HackerNoon at: https://hackernoon.com/research-round-up-on-anonymization-creating-data-that-enables-generalization-without-memorization. Anonymization is what lets us take the most sensitive information and transform it into a safe, usable substrate for machine learning. Check more stories related to cybersecu…
…
continue reading

1
New in Syteca Release 7.21: Agentless Access, Sensitive Data Masking, And Smooth Session Playback
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03This story was originally published on HackerNoon at: https://hackernoon.com/new-in-syteca-release-721-agentless-access-sensitive-data-masking-and-smooth-session-playback. Users can now launch remote sessions (RDP for Windows or SSH for Linux/Unix) directly in web browsers (Chrome, Safari, and Edge) Check more stories related to cybersecurity at: h…
…
continue reading

1
3 Weeks Left Until The Start Of The OpenSSL Conference 2025
2:28
2:28
Play later
Play later
Lists
Like
Liked
2:28This story was originally published on HackerNoon at: https://hackernoon.com/3-weeks-left-until-the-start-of-the-openssl-conference-2025. The program will bring together lawyers, regulators, developers, and entrepreneurs to discuss security and privacy in a global context. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
…
continue reading

1
The Fraudian Slip Podcast: Javelin Strategy & Research - Child Identity Theft in 2025 - S6E9
28:29
28:29
Play later
Play later
Lists
Like
Liked
28:29Welcome to the Fraudian Slip, the Identity Theft Resource Center’s (ITRC) podcast, where we talk about all things identity theft, fraud and scams that impact people and businesses. This month’s episode focuses on child identity theft. How does child identity theft occur in 2025? What should parents know and do as their kids head back to school?Here…
…
continue reading

1
Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33This story was originally published on HackerNoon at: https://hackernoon.com/seraphic-browser-native-protection-now-available-for-purchase-on-the-crowdstrike-marketplace. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #seraphic-security, #cybernewswi…
…
continue reading

1
How to Get a Reverse Shell on macOS Using A Flipper Zero as a BadUSB
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10This story was originally published on HackerNoon at: https://hackernoon.com/how-to-get-a-reverse-shell-on-macos-using-a-flipper-zero-as-a-badusb. Using a Flipper Zero as an ethical pentesting device to establish a reverse shell on a macOS computer. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also…
…
continue reading

1
Introducing the InfoSec colour wheel — blending developers with red and blue security teams.
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40This story was originally published on HackerNoon at: https://hackernoon.com/introducing-the-infosec-colour-wheel-blending-developers-with-red-and-blue-security-teams-6437c1a07700. As a developer turned security person, I’ve learnt first-hand how important it is for all teams to work together, more than just DevSecOps. Check more stories related to…
…
continue reading

1
How to Make a Malicious USB Device and Have Some Harmless Fun
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54This story was originally published on HackerNoon at: https://hackernoon.com/how-to-make-a-malicious-usb-device-and-have-some-harmless-fun. Make an inexpensive BadUSB from an old USB drive and learn about Windows shortcut files and how malicious actors are using .lnk files to spread malware. Check more stories related to cybersecurity at: https://h…
…
continue reading

1
Identity Governance and Administration Projects Are Never Done – But Can Get Much Easier
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27This story was originally published on HackerNoon at: https://hackernoon.com/identity-governance-and-administration-projects-are-never-done-but-can-get-much-easier. Identity & Access Management (IAM) and Identity Governance & Administration (IGA) are crucial for organizations, but current implementations often fall short. Check more stories related…
…
continue reading

1
Innovations in Cloud-Based Standards Management: Shaping the Future of Global Compliance
7:18
7:18
Play later
Play later
Lists
Like
Liked
7:18This story was originally published on HackerNoon at: https://hackernoon.com/innovations-in-cloud-based-standards-management-shaping-the-future-of-global-compliance. Ritesh Kumar drives innovation in cloud-based standards management with AI, SaaS, and automation, redefining global compliance and collaboration. Check more stories related to cybersec…
…
continue reading
On this episode of the Inside the FBI Podcast, we’ll discuss the results of Operation Restore Justice—a first-of-its-kind effort—and its significance in our long-term fight to protect children from the threat of violent crime. This episode is part of "Your FBI: Crushing Violent Crime," a campaign highlighting the people, partners, and mission of Yo…
…
continue reading

1
The Weekly Breach Breakdown Podcast: The Rat Race – Phishing Attack Installs RATs – S6E28
3:47
3:47
Play later
Play later
Lists
Like
Liked
3:47Welcome to the Identity Theft Resource Center's (ITRC) Weekly Breach Breakdown for September 12, 2025. I'm Tatiana Cuadras, Communications Assistant for the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we are going to talk abo…
…
continue reading
On this episode of the Inside the FBI Podcast, we’ll learn how the National Academy program equips law enforcement leaders to strive for personal and professional excellence and foster interagency collaboration in the quest to ensure justice the world over. For a full transcript and additional resources, visit https://www.fbi.gov/news/podcasts.Memb…
…
continue reading

1
The Weekly Breach Breakdown Podcast: Gone Quishing – QR Code Phishing Used in New Attacks – S6E27
4:22
4:22
Play later
Play later
Lists
Like
Liked
4:22Welcome to the Identity Theft Resource Center's (ITRC) Weekly Breach Breakdown for September 5, 2025. I'm Tatiana Cuadras, Communications Assistant for the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we are going to look at h…
…
continue reading
Ashley takes the stage in this episode, sharing the story of her unforgettable birthday trip. What began as a plan to celebrate in Bora Bora quickly changed when business class flights proved impossible to book. With a flight credit in hand, she pivoted to Cancun — a destination she knows and loves. The first half of her stay at the Grand Hyatt Pla…
…
continue reading
On this episode of Inside the FBI Podcast, learn about new artifacts that've been added to The FBI Experience's 9/11 exhibit and hear a retired agent share stories behind them. For a full transcript and additional resources, visit fbi.gov/news/podcasts. To learn more about The FBI Experience, including how to book your visit and explore new videos …
…
continue reading

1
The Fraudian Slip Podcast: Socure – Identity Criminals Target Consumers with Fake Jobs – S6E8
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09Welcome to the Fraudian Slip, the Identity Theft Resource Center’s (ITRC) podcast, where we talk about all things identity theft, fraud and scams that impact people and businesses. This month’s episode focuses on the hot topic of fake jobs. Chances are that sometime in the past week or this week, you will receive a text from someone claiming to be …
…
continue reading

1
SURPRISE! The Travel Chat Duo is BACK with Emily’s Wedding Story!
1:00:17
1:00:17
Play later
Play later
Lists
Like
Liked
1:00:17What happens when your “maybe elopement in Italy” turns into a totally unique wedding at UMASS? In this episode, Emily takes listeners behind the scenes of her two-year wedding planning saga—from the initial dream of escaping to Italy, to pivoting into a heartfelt ceremony at her alma mater. Emily opens up about how she chose to keep things real an…
…
continue reading

1
The Weekly Breach Breakdown Podcast: Mapping Out The Problem – Instagram Map Concerns - S6E26
3:49
3:49
Play later
Play later
Lists
Like
Liked
3:49Welcome to the Identity Theft Resource Center’s (ITRC) Weekly Breach Breakdown for August 22, 2025. I’m Timothy Walden. Thanks to SentiLink for their support of the ITRC and this podcast. Each week, we break down the latest data security incidents making headlines. Today, we’re focusing on a recent incident involving Instagram that exposed sensitiv…
…
continue reading

1
The Weekly Breach Breakdown Podcast: Love in the Time of Breaches - U.S. Breaches Cost $10M - S6E25
6:19
6:19
Play later
Play later
Lists
Like
Liked
6:19Welcome back to the Identity Theft Resource Center’s (ITRC) Weekly Breach Breakdown, supported by Sentilink. I’m James E. Lee, the ITRC’s President, and this is the episode for August 15, 2025. Each week, we take a look at the latest news and trends related to data security and privacy. For 20 years now, the CODB, along with the ITRC’s U.S. Data Br…
…
continue reading

1
Canadians Just Aren't California Dreamin' These Days
10:57
10:57
Play later
Play later
Lists
Like
Liked
10:57Calllllll-i-forrrrr-nia... here we come? If you've changed your plans to visit the US recently, you're not alone. Nowadays, Canadians are more likely to be singing along to "Bobcaygeon" than "Sweet Home Alabama." Today, we're sitting down with Jane Lin, of the Tourism Statistics Program at Statistics Canada, to dig into StatCan's tourism data and t…
…
continue reading
On this episode of the Inside the FBI Podcast, we'll learn about FBI Ten Most Wanted Fugitive Giovanni Vicente Mosquera Serrano, a leader of Tren de Aragua, a transnational gang involved in drug trafficking, human trafficking, weapons trafficking, and violent crime in the U.S. For a full transcript and additional resources, visit fbi.gov/news/podca…
…
continue reading

1
The Weekly Breach Breakdown Podcast: 123456 – Weak Password Leads to McDonald’s Data Breach - S6E24
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53Welcome to the Identity Theft Resource Center's (ITRC’s) Weekly Breach Breakdown for August 8, 2025. I'm Alex Achten, Senior Director of Communications & Media Relations of the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we a…
…
continue reading

1
The Weekly Breach Breakdown Podcast by ITRC: Prime Target - S6E23
3:38
3:38
Play later
Play later
Lists
Like
Liked
3:38Welcome to the Identity Theft Resource Center’s (ITRC) Weekly Breach Breakdown for August 1, 2025. I’m Timothy Walden. Thanks to SentiLink for their support of the ITRC and this podcast. Each week, we examine the latest events and trends in data security and privacy.This week, we’re looking at an Amazon phishing scam that could impact more than 200…
…
continue reading

1
The Fraudian Slip Podcast: Ride or AI – Impacts of AI on Identity Theft, Fraud and Scams - S6E7
30:15
30:15
Play later
Play later
Lists
Like
Liked
30:15Welcome to the Fraudian Slip, the Identity Theft Resource Center’s (ITRC) podcast, where we talk about all things identity theft, fraud and scams that impact people and businesses. You’ve probably heard of Ride or Die, one of those slang terms that seems to be everywhere at one time or another. Today, the phrase you can’t escape no matter how hard …
…
continue reading
On this My Mission episode of the Inside the FBI Podcast, we’ll meet Justin Labrecque, an Air Force veteran and current Air National Guardsman who leverages his military skillset to support Bureau operations across the globe. For a full transcript and additional resources, visit fbi.gov/news/podcasts. You can also visit fbi.gov/tactics to learn mor…
…
continue reading