<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://1217570951.rsc.cdn77.org/wp-content/plugins/seriously-simple-podcasting/templates/feed-stylesheet.xsl"?><rss version="2.0"
	 xmlns:content="http://purl.org/rss/1.0/modules/content/"
	 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	 xmlns:dc="http://purl.org/dc/elements/1.1/"
	 xmlns:atom="http://www.w3.org/2005/Atom"
	 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	 xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
	 xmlns:podcast="https://podcastindex.org/namespace/1.0"
	>
		<channel>
		<title>Identitalks</title>
		<atom:link href="https://www.i-sprint.com/feed/podcast/identitalks-by-isprint/" rel="self" type="application/rss+xml"/>
		<link>https://www.i-sprint.com/podcasts/identitalks-by-isprint/</link>
		<description>Tune in to IdentiTalks. A podcast for security leaders, IT professionals, and anyone responsible for building digital trust.</description>
		<lastBuildDate>Fri, 08 May 2026 07:48:23 +0000</lastBuildDate>
		<language>en-US</language>
		<copyright>© 2025 i-Sprint Innovations</copyright>
		<itunes:subtitle></itunes:subtitle>
		<itunes:author>i-Sprint Innovations</itunes:author>
		<itunes:type>episodic</itunes:type>
		<itunes:summary>Tune in to IdentiTalks. A podcast for security leaders, IT professionals, and anyone responsible for building digital trust.</itunes:summary>
		<itunes:owner>
			<itunes:name>i-Sprint Innovations</itunes:name>
			<itunes:email>marketing@i-sprint.com</itunes:email>
		</itunes:owner>
		<itunes:explicit>false</itunes:explicit>
		<itunes:image href="https://1217570951.rsc.cdn77.org/wp-content/uploads/2025/10/podcast_MainBanner_Square.png"></itunes:image>
			<image>
				<url>https://1217570951.rsc.cdn77.org/wp-content/uploads/2025/10/podcast_MainBanner_Square.png</url>
				<title>Identitalks</title>
				<link>https://www.i-sprint.com/podcasts/identitalks-by-isprint/</link>
			</image>
		<itunes:category text="Technology">
		</itunes:category>
		<googleplay:author><![CDATA[i-Sprint Innovations]]></googleplay:author>
			<googleplay:email>marketing@i-sprint.com</googleplay:email>			<googleplay:description>Tune in to IdentiTalks. A podcast for security leaders, IT professionals, and anyone responsible for building digital trust.</googleplay:description>
			<googleplay:explicit>No</googleplay:explicit>
			<googleplay:image href="https://1217570951.rsc.cdn77.org/wp-content/uploads/2025/10/podcast_MainBanner_Square.png"></googleplay:image>
			<podcast:guid>2424dca6-f4de-5376-9aa0-e9eaeb9f957d</podcast:guid>
		
		<!-- podcast_generator="SSP by Castos/3.15.0" Seriously Simple Podcasting plugin for WordPress (https://wordpress.org/plugins/seriously-simple-podcasting/) -->
		<generator>https://wordpress.org/?v=6.8.5</generator>

<item>
	<title>IdentiTalks: Episode 9 &#124; Why CISOs Are Rethinking Browser Security</title>
	<link>https://www.i-sprint.com/podcast/identitalks-episode-9-why-cisos-are-rethinking-browser-security/</link>
	<pubDate>Wed, 29 Apr 2026 08:40:05 +0000</pubDate>
	<dc:creator><![CDATA[i-Sprint Innovations]]></dc:creator>
	<guid isPermaLink="false">3904cf76-5e46-5e22-bfa5-1fb880c5c738</guid>
	<description><![CDATA[No hacker. No malware. No breach alert.
Just everyday browser activity… and sensitive data leaving the company.

In this episode of IdentiTalks, we dive into why the browser has become the new security battleground and how organizations can protect data where work actually happens — inside the web session.]]></description>
	<itunes:subtitle><![CDATA[No hacker. No malware. No breach alert.
Just everyday browser activity… and sensitive data leaving the company.

In this episode of IdentiTalks, we dive into why the browser has become the new security battleground and how organizations can protect data ]]></itunes:subtitle>
	<content:encoded><![CDATA[No hacker. No malware. No breach alert.
Just everyday browser activity… and sensitive data leaving the company.

In this episode of IdentiTalks, we dive into why the browser has become the new security battleground and how organizations can protect data where work actually happens — inside the web session.]]></content:encoded>
	<enclosure url="https://www.i-sprint.com/podcast-download/96836/identitalks-episode-9-why-cisos-are-rethinking-browser-security.mp3" length="12814894" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[No hacker. No malware. No breach alert.
Just everyday browser activity… and sensitive data leaving the company.

In this episode of IdentiTalks, we dive into why the browser has become the new security battleground and how organizations can protect data where work actually happens — inside the web session.]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>00:09:33</itunes:duration>
	<itunes:author><![CDATA[i-Sprint Innovations]]></itunes:author>	<googleplay:description><![CDATA[No hacker. No malware. No breach alert.
Just everyday browser activity… and sensitive data leaving the company.

In this episode of IdentiTalks, we dive into why the browser has become the new security battleground and how organizations can protect data where work actually happens — inside the web session.]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>IdentiTalks: Episode 8 &#124; Hardening The Perimeter: FAPI 2.0 &#038; Secure Machine Connectivity</title>
	<link>https://www.i-sprint.com/podcast/identitalks-episode-8-hardening-the-perimeter-fapi-2-0-secure-machine-connectivity/</link>
	<pubDate>Thu, 26 Feb 2026 03:09:34 +0000</pubDate>
	<dc:creator><![CDATA[i-Sprint Innovations]]></dc:creator>
	<guid isPermaLink="false">https://www.i-sprint.com/?post_type=podcast&#038;p=96631</guid>
	<description><![CDATA[When machines run your business, proving their identity isn't optional. It's survival.]]></description>
	<itunes:subtitle><![CDATA[When machines run your business, proving their identity isnt optional. Its survival.]]></itunes:subtitle>
	<content:encoded><![CDATA[When machines run your business, proving their identity isn't optional. It's survival.]]></content:encoded>
	<enclosure url="https://www.i-sprint.com/podcast-download/96631/identitalks-episode-8-hardening-the-perimeter-fapi-2-0-secure-machine-connectivity.mp3" length="8456087" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[When machines run your business, proving their identity isn't optional. It's survival.]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>00:08:48</itunes:duration>
	<itunes:author><![CDATA[i-Sprint Innovations]]></itunes:author>	<googleplay:description><![CDATA[When machines run your business, proving their identity isn't optional. It's survival.]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>IdentiTalks: Episode 7 &#124; Authentication Without Limits: Ending Vendor Lock-In for Good</title>
	<link>https://www.i-sprint.com/podcast/identitalks-episode-7-authentication-without-limits-ending-vendor-lock-in-for-good/</link>
	<pubDate>Tue, 06 Jan 2026 01:50:52 +0000</pubDate>
	<dc:creator><![CDATA[i-Sprint Innovations]]></dc:creator>
	<guid isPermaLink="false">91660f64-c764-57d3-b289-3aa9d2ca1c9a</guid>
	<description><![CDATA[Your Authentication Strategy is a Golden Cage. Is Vendor Lock-In Secretly Sabotaging Your Innovation?]]></description>
	<itunes:subtitle><![CDATA[Your Authentication Strategy is a Golden Cage. Is Vendor Lock-In Secretly Sabotaging Your Innovation?]]></itunes:subtitle>
	<content:encoded><![CDATA[Your Authentication Strategy is a Golden Cage. Is Vendor Lock-In Secretly Sabotaging Your Innovation?]]></content:encoded>
	<enclosure url="https://www.i-sprint.com/podcast-download/95923/identitalks-episode-7-authentication-without-limits-ending-vendor-lock-in-for-good.mp3" length="16143402" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Your Authentication Strategy is a Golden Cage. Is Vendor Lock-In Secretly Sabotaging Your Innovation?]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>00:11:11</itunes:duration>
	<itunes:author><![CDATA[i-Sprint Innovations]]></itunes:author>	<googleplay:description><![CDATA[Your Authentication Strategy is a Golden Cage. Is Vendor Lock-In Secretly Sabotaging Your Innovation?]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>IdentiTalks: Episode 6 &#124; DRPS: Why Digital Risk Protection Is Suddenly a Hot Topic</title>
	<link>https://www.i-sprint.com/podcast/identitalks-episode-6-drps-why-digital-risk-protection-is-suddenly-a-hot-topic/</link>
	<pubDate>Mon, 15 Dec 2025 01:40:32 +0000</pubDate>
	<dc:creator><![CDATA[i-Sprint Innovations]]></dc:creator>
	<guid isPermaLink="false">5cc2ffa1-02b9-51f5-adf2-e0aec8b7884a</guid>
	<description><![CDATA[Your Security Looks Inward. Are You Blind to the Real Threats Lurking Outside?]]></description>
	<itunes:subtitle><![CDATA[Your Security Looks Inward. Are You Blind to the Real Threats Lurking Outside?]]></itunes:subtitle>
	<content:encoded><![CDATA[Your Security Looks Inward. Are You Blind to the Real Threats Lurking Outside?]]></content:encoded>
	<enclosure url="https://www.i-sprint.com/podcast-download/95702/identitalks-episode-6-drps-why-digital-risk-protection-is-suddenly-a-hot-topic.mp3" length="3990436" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Your Security Looks Inward. Are You Blind to the Real Threats Lurking Outside?]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[i-Sprint Innovations]]></itunes:author>	<googleplay:description><![CDATA[Your Security Looks Inward. Are You Blind to the Real Threats Lurking Outside?]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>IdentiTalks: Episode 5 &#124; DRPS: The Hidden World of Digital Brand Impersonation</title>
	<link>https://www.i-sprint.com/podcast/identitalks-episode-5-drps-the-hidden-world-of-digital-brand-impersonation/</link>
	<pubDate>Tue, 02 Dec 2025 01:56:45 +0000</pubDate>
	<dc:creator><![CDATA[i-Sprint Innovations]]></dc:creator>
	<guid isPermaLink="false">fd6cab41-b280-597e-bd30-a2326d1f4769</guid>
	<description><![CDATA[Your Biggest Threat Isn't a Hacker, It's a Fake Version of You. Do You Know How to Fight It?]]></description>
	<itunes:subtitle><![CDATA[Your Biggest Threat Isnt a Hacker, Its a Fake Version of You. Do You Know How to Fight It?]]></itunes:subtitle>
	<content:encoded><![CDATA[Your Biggest Threat Isn't a Hacker, It's a Fake Version of You. Do You Know How to Fight It?]]></content:encoded>
	<enclosure url="https://www.i-sprint.com/podcast-download/94880/identitalks-episode-5-drps-the-hidden-world-of-digital-brand-impersonation.mp3" length="5407342" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Your Biggest Threat Isn't a Hacker, It's a Fake Version of You. Do You Know How to Fight It?]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[i-Sprint Innovations]]></itunes:author>	<googleplay:description><![CDATA[Your Biggest Threat Isn't a Hacker, It's a Fake Version of You. Do You Know How to Fight It?]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>IdentiTalks: Episode 4 &#124; AccessMatrix USO: The Hidden ROI of Single Sign-On</title>
	<link>https://www.i-sprint.com/podcast/identitalks-episode-4-accessmatrix-uso-the-hidden-roi-of-single-sign-on/</link>
	<pubDate>Wed, 05 Nov 2025 03:39:39 +0000</pubDate>
	<dc:creator><![CDATA[i-Sprint Innovations]]></dc:creator>
	<guid isPermaLink="false">15476112-ae88-50c9-bb95-e0fa1f906b45</guid>
	<description><![CDATA[30% of Your Helpdesk Calls Are Just Password Resets. Why Are You Still Paying That Bill?]]></description>
	<itunes:subtitle><![CDATA[30% of Your Helpdesk Calls Are Just Password Resets. Why Are You Still Paying That Bill?]]></itunes:subtitle>
	<content:encoded><![CDATA[30% of Your Helpdesk Calls Are Just Password Resets. Why Are You Still Paying That Bill?]]></content:encoded>
	<enclosure url="https://www.i-sprint.com/podcast-download/94355/identitalks-episode-4-accessmatrix-uso-the-hidden-roi-of-single-sign-on.mp3" length="11729203" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[30% of Your Helpdesk Calls Are Just Password Resets. Why Are You Still Paying That Bill?]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[i-Sprint Innovations]]></itunes:author>	<googleplay:description><![CDATA[30% of Your Helpdesk Calls Are Just Password Resets. Why Are You Still Paying That Bill?]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>IdentiTalks: Episode 3 &#124; Unlocking Identity Governance Excellence: The Future with Universal Identity Manager (UIM)</title>
	<link>https://www.i-sprint.com/podcast/identitalks-episode-3-unlocking-identity-governance-excellence-the-future-with-universal-identity-manager-uim/</link>
	<pubDate>Thu, 30 Oct 2025 09:21:30 +0000</pubDate>
	<dc:creator><![CDATA[i-Sprint Innovations]]></dc:creator>
	<guid isPermaLink="false">d4adb063-6f9b-56a2-902c-0ae8dc8eb4dd</guid>
	<description><![CDATA[That 70% Breach Statistic? It's Not Elite Hackers, It's Your Own Dormant Accounts.]]></description>
	<itunes:subtitle><![CDATA[That 70% Breach Statistic? Its Not Elite Hackers, Its Your Own Dormant Accounts.]]></itunes:subtitle>
	<content:encoded><![CDATA[That 70% Breach Statistic? It's Not Elite Hackers, It's Your Own Dormant Accounts.]]></content:encoded>
	<enclosure url="https://www.i-sprint.com/podcast-download/94075/identitalks-episode-3-unlocking-identity-governance-excellence-the-future-with-universal-identity-manager-uim.mp3" length="11258974" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[That 70% Breach Statistic? It's Not Elite Hackers, It's Your Own Dormant Accounts.]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[i-Sprint Innovations]]></itunes:author>	<googleplay:description><![CDATA[That 70% Breach Statistic? It's Not Elite Hackers, It's Your Own Dormant Accounts.]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>IdentiTalks: Episode 2 &#124; YESsafe AppProtect+: Securing Mobile Apps in the Digital Age</title>
	<link>https://www.i-sprint.com/podcast/identitalks-episode-2-yessafe-appprotect-securing-mobile-apps-in-the-digital-age/</link>
	<pubDate>Thu, 30 Oct 2025 09:18:45 +0000</pubDate>
	<dc:creator><![CDATA[i-Sprint Innovations]]></dc:creator>
	<guid isPermaLink="false">8117473f-a1f4-5f60-bb25-6354e046ee01</guid>
	<description><![CDATA[Your Users Are Your Biggest Risk. Is Your App Built to Survive Them?]]></description>
	<itunes:subtitle><![CDATA[Your Users Are Your Biggest Risk. Is Your App Built to Survive Them?]]></itunes:subtitle>
	<content:encoded><![CDATA[Your Users Are Your Biggest Risk. Is Your App Built to Survive Them?]]></content:encoded>
	<enclosure url="https://www.i-sprint.com/podcast-download/94073/identitalks-episode-2-yessafe-appprotect-securing-mobile-apps-in-the-digital-age.mp3" length="9758260" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Your Users Are Your Biggest Risk. Is Your App Built to Survive Them?]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[i-Sprint Innovations]]></itunes:author>	<googleplay:description><![CDATA[Your Users Are Your Biggest Risk. Is Your App Built to Survive Them?]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>IdentiTalks: Episode 1 &#124; AccessMatrix UCM: Post-Quantum Powered PAM</title>
	<link>https://www.i-sprint.com/podcast/identitalks-episode-1-accessmatrix-ucm-post-quantum-powered-pam/</link>
	<pubDate>Tue, 28 Oct 2025 02:48:31 +0000</pubDate>
	<dc:creator><![CDATA[i-Sprint Innovations]]></dc:creator>
	<guid isPermaLink="false">f543b0eb-deec-5fe7-990c-f7e3104a93d4</guid>
	<description><![CDATA[Today's secure credential is tomorrow's quantum breach. Is your protection already obsolete?]]></description>
	<itunes:subtitle><![CDATA[Todays secure credential is tomorrows quantum breach. Is your protection already obsolete?]]></itunes:subtitle>
	<content:encoded><![CDATA[Today's secure credential is tomorrow's quantum breach. Is your protection already obsolete?]]></content:encoded>
	<enclosure url="https://www.i-sprint.com/podcast-download/94033/identitalks-episode-1-accessmatrix-ucm-post-quantum-powered-pam.mp3" length="21489719" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Today's secure credential is tomorrow's quantum breach. Is your protection already obsolete?]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[i-Sprint Innovations]]></itunes:author>	<googleplay:description><![CDATA[Today's secure credential is tomorrow's quantum breach. Is your protection already obsolete?]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>
	</channel>
</rss>
