• Home
  • New
  • Top Charts
  • Search

Technology

  • Apple Events (audio)
    Apple Events (audio)

    1

    Apple Events (audio)

    Apple

  • Cybersecurity Where You Are (video)
    Cybersecurity Where You Are (video)

    2

    Cybersecurity Where You Are (video)

    Center for Internet Security

  • The Cybersecurity Defenders Podcast
    The Cybersecurity Defenders Podcast

    3

    The Cybersecurity Defenders Podcast

    LimaCharlie

  • Reimagining Cyber - real world perspectives on cybersecurity
    Reimagining Cyber - real world perspectives on cybersecurity

    4

    Reimagining Cyber - real world perspectives on cybersecurity

    Reimagining Cyber

  • Whatsapp
    Whatsapp

    5

    Whatsapp

    Rami AP

  • Apple Events (video)
    Apple Events (video)

    6

    Apple Events (video)

    Apple

  • Terms of Service with Clare Duffy
    Terms of Service with Clare Duffy

    7

    Terms of Service with Clare Duffy

    CNN Podcasts

Essentials

  • Hard Fork
    Technology
    Technology

    Every two weeks

  • The Vergecast
    Technology
    Technology

    Updated twice weekly

  • There Are No Girls on the Internet
    Technology
    Technology

    Updated weekly

  • Endless Thread
    Technology
    Technology

    Updated weekly

  • Land of the Giants
    Business
    Business

    Weekly series

  • Channels with Peter Kafka
    Business News
    Business News

    Updated weekly

  • Uncanny Valley | WIRED
    Technology
    Technology

    Updated weekly

  • Episode 172: Helping CISOs as a CIS Controls Ambassador

    4 DAYS AGO · VIDEO

    1

    Episode 172: Helping CISOs as a CIS Controls Ambassador

    In episode 172 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Chirag Arora, Cyber Security Executive Advisor and CISO at Dorf Nelson & Zauderer LLP. Together, they discuss how Chirag draws upon his experience as a CISO and his community work as a CIS Critical Security Controls® (CIS Controls®) Ambassador to help other CISOs with their cybersecurity programs. Here are some highlights from our episode: 00:51. Introduction to Chirag and the early years of his work as a CIS Controls Ambassador06:03. The value of measurement and psychology when discussing assessments with CISOs09:00. Chirag's work on a CISO certification and vision for aligning it to the CIS Controls12:31. How open sharing of wisdom between CISOs makes the world more secure20:57. The importance of storytelling for CISOs, CIS Controls Ambassadors, and other leaders24:29. Chirag's use of law school to take his understanding of reasonableness up a level28:13. Regular opportunities for CIS Controls Ambassadors to discuss universal issues31:08. The heightened importance of nonprofit organizations bringing people togetherResources CIS Critical Security Controls®Episode 160: Championing SME Security with the CIS ControlsEpisode 168: Institutionalizing Good Cybersecurity IdeasReasonable Cybersecurity GuideSimplify Security Management with CIS SecureSuite PlatformCISO Certification by GlobalCISO Leadership Foundation™If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].

    4 days ago · Video

    •
    34 min
  • #288 - Defender Fridays: Agentic SecOps Workspace (ASW) office hours with LimaCharlie

    2 DAYS AGO

    2

    #288 - Defender Fridays: Agentic SecOps Workspace (ASW) office hours with LimaCharlie

    Join us for a special Defender Fridays Office Hours session where the LimaCharlie team demonstrates the new Agentic SecOps Workspace (ASW) and explores what's possible when AI agents operate security infrastructure directly. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands. What We'll Discuss In this hands-on session, we showcase real working implementations of AI in cybersecurity operations. From reverse engineering malware to automated rule tuning and infrastructure management, we demonstrate how AI agents are transforming security workflows from concept to production-ready tools in hours instead of days. Key Topics Automated malware analysis and decompilation without traditional manual reverse engineering workflowsRule tuning at scale: Investigating noisy detections, writing false positive rules, and deploying them autonomouslyInfrastructure automation: Setting up data sources, configuring tenants, and managing security operations through AI agentsThe permission model: Balancing AI capability with human oversight and approval workflowsReal-world applications: Custom reporting, detection coverage analysis, and operational time savingsAbout This Session This office hours format brings together the LimaCharlie team to share practical experiences with AI-powered security operations. Rather than theoretical discussions, we demonstrate working tools and invite the community to share their own AI security experiments. The session highlights the rapid evolution of AI capabilities in cybersecurity and explores the changing relationship between security practitioners and automation. Register for Live Sessions Join us every Friday at 10:30am PT for live, interactive discussions with industry experts. Whether you're a seasoned professional or just curious about the field, these sessions offer an engaging dialogue between our guests, hosts, and you – our audience. Register here: https://limacharlie.io/defender-fridays Subscribe to our YouTube channel and hit the notification bell to never miss a live session or catch up on past episodes! Sponsored by LimaCharlie This episode is brought to you by LimaCharlie, a cloud-native SecOps platform where AI agents operate security infrastructure directly. Founded in 2018, LimaCharlie provides complete API coverage across detection, response, automation, and telemetry, with multi-tenant architecture designed for MSSPs and MDR providers managing thousands of unique client environments. Why LimaCharlie? Transparency: Complete visibility into every action and decision. No black boxes, no vendor lock-in.Scalability: Security operations that scale like infrastructure, not like procurement cycles. Move at cloud speed.Unopinionated Design: Integrate the tools you need, not just those contracts allow. Build security on your terms.Agentic SecOps Workspace (ASW): AI agents that operate alongside your team with observable, auditable actions through the same APIs human analysts use.Security Primitives: Composable building blocks that endure as tools come and go. Build once, evolve continuously.Try the Agentic SecOps Workspace free: https://limacharlie.io Learn more: https://docs.limacharlie.io Follow LimaCharlie Sign up for free: https://limacharlie.io LinkedIn: / limacharlieio X: https://x.com/limacharlieio Community Discourse: https://community.limacharlie.com/ Host: Maxime Lamothe-Brassard - CEO / Co-founder at LimaCharlie

    2 days ago

    •
    30 min
  • When Good Enough Isn't Enough - Ep 186

    5 DAYS AGO

    3

    When Good Enough Isn't Enough - Ep 186

    Microsoft Defender is often treated as “good enough” security—built in, always on, and quietly doing its job. But what happens when malware convinces Windows to turn it off without triggering alarms? In this episode, cybersecurity expert Tyler Mofitt breaks down a real-world Windows malware campaign that disables Defender before anything else happens. No zero-days. No flashy exploits. Just a quiet abuse of built-in trust that causes Windows to step aside its own protection. He walks through how shortcut files, PowerShell, and legitimate cloud services are used to blend into normal activity, why Defender doesn’t fail so much as follow the rules, and what defenders should be watching for when “installed” doesn’t always mean “active.” A conversation about assumptions, visibility, and why the most dangerous attacks don’t look dangerous at all. Link mentioned in the episode -  threat intel hub with all the latest trends and stories going on with threat intelligence. https://community.opentextcybersecurity.com/ As featured on Million Podcasts' Best 100 Cybersecurity Podcasts Top 50 Chief Information Security Officer CISO Podcasts Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform. Share the show with others in the cybersecurity world. Get in touch via [email protected]

    5 days ago

    •
    13 min
  • Tech Grapples With ICE + Casey Tries Clawdbot, a Risky New A.I. Assistant + HatGPT

    2 DAYS AGO

    4

    Tech Grapples With ICE + Casey Tries Clawdbot, a Risky New A.I. Assistant + HatGPT

    This week we’re talking about the tech industry’s response to the killings by federal agents in Minneapolis and the federal government’s strategy to control the narrative on social media. Then we follow Casey through his trial of a new open-source A.I. assistant called Moltbot (formerly Clawdbot) and consider whether it is worth the security risk. And, finally, it’s time for a look at the rest of the week’s tech news with a round of HatGPT. Additional Reading:  False Posts and Altered Images Distort Views of Minnesota ShootingA Moment-by-Moment Look at the Shooting of Alex PrettiIt’s a War: Inside ICE’s Media MachineSome Amazon Employees Get ‘Project Dawn’ Calendar Invitation Discussing Upcoming Job CutsTikTok Data Center Outage Triggers Trust Crisis for New U.S. OwnersFormer FTX Crypto Executive Caroline Ellison Released From Federal CustodyAnthropic C.E.O.’s Grave Warning: A.I. Will “Test Us as a Species”Inside the White House Screening for Amazon’s ‘Melania’ DocApp for Quitting Porn Leaked Users’ Masturbation HabitsAlaska Student Arrested After Eating A.I.-Generated Art in ProtestSteak ’n Shake Adds $5 Million in Bitcoin Exposure, Deepening Bitcoin CommitmentSpaceX Weighs June I.P.O. Timed to Planetary Alignment and Elon Musk’s BirthdayLinkedIn Will Let You Show Off Your Vibe Coding Expertise  We want to hear from you. Email us at [email protected]. Find “Hard Fork” on YouTube and TikTok. Subscribe today at nytimes.com/podcasts or on Apple Podcasts and Spotify. You can also subscribe via your favorite podcast app here https://www.nytimes.com/activate-access/audio?source=podcatcher. For more podcasts and narrated articles, download The New York Times app at nytimes.com/app.

    2 days ago

    •
    1h 11m
  • The future of our memories

    2 DAYS AGO

    5

    The future of our memories

    From creating “synthetic” memories to reviving ruined monuments, tech no longer simply stores the past — it can enhance it. This hour, we explore new ways to capture, share and even recreate our past. Guests include technologist Pau Aleikum Garcia, cartoonist Amy Kurzweil and digital archaeologist Chance Coughenour. (Original broadcast date: January 24, 2025) TED Radio Hour+ subscribers now get access to bonus episodes, with more ideas from TED speakers and a behind the scenes look with our producers. A Plus subscription also lets you listen to regular episodes (like this one!) without sponsors. Sign-up at plus.npr.org/ted. Learn more about sponsor message choices: podcastchoices.com/adchoices NPR Privacy Policy

    2 days ago

    •
    50 min
  • Poisoned at the source.

    6 JAN

    6

    Poisoned at the source.

    Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠Qintel⁠⁠⁠⁠. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into supply chain attacks through the lens of a massive Android malware campaign that infects devices before they ever reach users, embedding itself in firmware and reseller-installed system images. We connect the dots to other high-impact supply chain incidents—from SolarWinds to the recent F5 breach—and share new intelligence on Android devices compromised during manufacturing and distribution in China. Together, these cases highlight how attacks at the source can quietly scale, persist, and evade traditional defenses.

    6 Jan

    •
    45 min
  • Truth and AI in Minneapolis

    5 DAYS AGO

    7

    Truth and AI in Minneapolis

    Like so many others, we’re still reeling from the killing of Alex Pretti in Minneapolis. To open the show, we talk with Adi Robertson about how videos of the incident moved around social platforms, how even well-intentioned people got confused by AI imagery, and what we’ve learned about the state of misinformation. Then Adi explains the new TikTok, which is both the same and very different from the old TikTok. The newly US-centric version of the app has had some switching pains so far, and the changes may only be just beginning. After that, it’s time for a hard pivot, as Vulture’s Nick Quah joins the show to talk about Netflix’s entry into podcasts — and whether what Netflix is doing can even be called “podcasts” anymore. Finally, David answers an old Vergecast Hotline question that got him thinking about all the ways we hold our phones to make calls, and which one is the best.  Further reading: It doesn’t matter if Alex Pretti had a gun The day of the second killing TikTok USA is broken Everything (Including Netflix) Will Become YouTube This Year It’s finally time to retire the word ‘podcast’ Subscribe to The Verge for unlimited access to theverge.com, subscriber-exclusive newsletters, and our ad-free podcast feed.We love hearing from you! Email your questions and thoughts to [email protected] or call us at 866-VERGE11. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    5 days ago

    •
    1h 15m
  • Reimagining Personal Finance with Fruitful

    23 JAN

    8

    Reimagining Personal Finance with Fruitful

    In this episode of the Wharton FinTech Podcast, Bobby Ma sits down with Sam Lewis, CEO of Fruitful. Sam shares his experience building Fruitful and how the company is reimagining personal finance through a membership model that combines CFP® guidance with AI automation to transform every paycheck into progress. Fruitful has raised $37 million to date and serves thousands of members across all 50 states. We discuss: - Building Fruitful and scaling its membership model for personal finance - Why income allocation matters more than asset allocation for most Americans - Closing the execution gap between financial advice and real-world action - The role of AI in scaling CFP® workflows

    23 Jan

    •
    32 min
  • Episode 171: Securing CNI in U.S. SLTTs through AI Adoption

    21 JAN · VIDEO

    9

    Episode 171: Securing CNI in U.S. SLTTs through AI Adoption

    In episode 171 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Soledad Antelada Toledano, Security Advisor, Office of the CISO, Google Cloud at Google. Together, they discuss securing critical national infrastructure (CNI) in U.S. State, Local, Tribal, and Territorial (SLTT) government organizations through artificial intelligence (AI) adoption. Here are some highlights from our episode: 00:50. Introduction to Soledad02:48. How the convergence of informational technology (IT) and operational technology (OT) has created bigger attack surfaces04:10. The proliferation of threat actors targeting critical infrastructure sectors07:24. The challenge of legacy systems for U.S. SLTT owners of CNI08:13. Alert fatigue, limited visibility, and other challenges facing OT networks13:22. The value of automated cyber threat intelligence (CTI)24:46. Building strategic AI implementation around human in the loop (HITL)33:17. U.S. SLTTs' use of the cloud to test and build trust for securing CNIResources The Changing Landscape of Security Operations and Its Impact on Critical InfrastructureCybersecurity for Critical InfrastructureEpisode 139: Community Building for the Cyber-UnderservedEpisode 119: Multidimensional Threat Defense at Large EventsLeveraging Generative Artificial Intelligence for Tabletop Exercise DevelopmentThe Evolving Role of Generative Artificial Intelligence in the Cyber Threat LandscapeEpisode 148: How MDR Helps Shine a Light on Zero-Day AttacksVulnerability Management Policy Template for CIS Control 7CIS Critical Security Controls v8.1 Industrial Control Systems (ICS) GuideIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].

    21 Jan · Video

    •
    37 min
  • E2: Technocracy, Inc.

    14/10/2025

    10

    E2: Technocracy, Inc.

    Could Musk’s authoritarian streak trace back to his Canadian grandfather? Before Joshua Haldeman brought his family to South Africa, he made waves as part of the radical 1930s Technocracy movement. And while the two men’s lives only overlapped for three years, we find echoes of Elon’s worldview in Haldeman’s pro-tech, anti-democratic ideology. Guests in this episode include: Geoff Leo, senior investigative journalist for CBCDerek Proudian, early investor in Zip2.comWill Shoki, South African journalist and writerAdrienne LaFrance, executive editor of The Atlantic Topics in this episode include: The life and lasting influence of Elon Musk’s Canadian grandfather, Joshua Haldeman; his influence within the Technocracy movement and his historical context (the Great Depression and the dust bowl) Elon Musk's early career moves, including his time at Zip2.com, PayPal and the "PayPal Mafia,” and the Baasskap (bossism) management styleThe relationship between techno-optimism and authoritarianism, and Marc Andreessen’s “Techno-Optimist Manifesto”

    14/10/2025

    •
    48 min

New Shows

  • Possible (en français)
    Entrepreneurship
    Entrepreneurship

    Every two weeks

  • CYBR.HAK.CAST
    Technology
    Technology

    Updated 21 Jan

  • Adam's Morning Walk
    Entrepreneurship
    Entrepreneurship

    Updated 09/12/2025

  • The CapCut Creative
    Technology
    Technology

    Updated 07/11/2025

  • Certified - The CompTIA A+ Audio Course
    Technology
    Technology

    Series

  • "AI Plus" Initiative
    Technology
    Technology

    Updated 22 Jan

  • "Computing.... There I was!"
    History
    History

    Updated 10 hr ago

Tech News

  • WSJ Tech News Briefing
    Tech News
    Tech News

    Updated daily

  • Harvard Data Science Review Podcast
    Tech News
    Tech News

    Every two months

  • Notnerd Podcast: Tech Better
    Tech News
    Tech News

    Updated weekly

  • AgriBusiness Global Podcasts
    Tech News
    Tech News

    Twice monthly

  • Big Technology Podcast
    Tech News
    Tech News

    Updated weekly

  • Software Engineering Daily
    Tech News
    Tech News

    Updated weekly

  • Cybersecurity Today
    Tech News
    Tech News

    Updated daily

Select a country or region

Africa, Middle East, and India

  • Algeria
  • Angola
  • Armenia
  • Azerbaijan
  • Bahrain
  • Benin
  • Botswana
  • Brunei Darussalam
  • Burkina Faso
  • Cameroun
  • Cape Verde
  • Chad
  • Côte d’Ivoire
  • Congo, The Democratic Republic Of The
  • Egypt
  • Eswatini
  • Gabon
  • Gambia
  • Ghana
  • Guinea-Bissau
  • India
  • Iraq
  • Israel
  • Jordan
  • Kenya
  • Kuwait
  • Lebanon
  • Liberia
  • Libya
  • Madagascar
  • Malawi
  • Mali
  • Mauritania
  • Mauritius
  • Morocco
  • Mozambique
  • Namibia
  • Niger (English)
  • Nigeria
  • Oman
  • Qatar
  • Congo, Republic of
  • Rwanda
  • São Tomé and Príncipe
  • Saudi Arabia
  • Senegal
  • Seychelles
  • Sierra Leone
  • South Africa
  • Sri Lanka
  • Tajikistan
  • Tanzania, United Republic Of
  • Tunisia
  • Turkmenistan
  • United Arab Emirates
  • Uganda
  • Yemen
  • Zambia
  • Zimbabwe

Asia Pacific

  • Afghanistan
  • Australia
  • Bhutan
  • Cambodia
  • 中国大陆
  • Fiji
  • 香港
  • Indonesia (English)
  • 日本
  • Kazakhstan
  • 대한민국
  • Kyrgyzstan
  • Lao People's Democratic Republic
  • 澳門
  • Malaysia (English)
  • Maldives
  • Micronesia, Federated States of
  • Mongolia
  • Myanmar
  • Nauru
  • Nepal
  • New Zealand
  • Pakistan
  • Palau
  • Papua New Guinea
  • Philippines
  • Singapore
  • Solomon Islands
  • 台灣
  • Thailand
  • Tonga
  • Turkmenistan
  • Uzbekistan
  • Vanuatu
  • Vietnam

Europe

  • Albania
  • Armenia
  • Österreich
  • Belarus
  • Belgium
  • Bosnia and Herzegovina
  • Bulgaria
  • Croatia
  • Cyprus
  • Czechia
  • Denmark
  • Estonia
  • Finland
  • France (Français)
  • Georgia
  • Deutschland
  • Greece
  • Hungary
  • Iceland
  • Ireland
  • Italia
  • Kosovo
  • Latvia
  • Lithuania
  • Luxembourg (English)
  • Malta
  • Moldova, Republic Of
  • Montenegro
  • Nederland
  • North Macedonia
  • Norway
  • Poland
  • Portugal (Português)
  • Romania
  • Россия
  • Serbia
  • Slovakia
  • Slovenia
  • España
  • Sverige
  • Schweiz
  • Türkiye (English)
  • Ukraine
  • United Kingdom

Latin America and the Caribbean

  • Anguilla
  • Antigua and Barbuda
  • Argentina (Español)
  • Bahamas
  • Barbados
  • Belize
  • Bermuda
  • Bolivia (Español)
  • Brasil
  • Virgin Islands, British
  • Cayman Islands
  • Chile (Español)
  • Colombia (Español)
  • Costa Rica (Español)
  • Dominica
  • República Dominicana
  • Ecuador (Español)
  • El Salvador (Español)
  • Grenada
  • Guatemala (Español)
  • Guyana
  • Honduras (Español)
  • Jamaica
  • México
  • Montserrat
  • Nicaragua (Español)
  • Panamá
  • Paraguay (Español)
  • Perú
  • St. Kitts and Nevis
  • Saint Lucia
  • St. Vincent and The Grenadines
  • Suriname
  • Trinidad and Tobago
  • Turks and Caicos
  • Uruguay (English)
  • Venezuela (Español)

The United States and Canada

  • Canada (English)
  • Canada (Français)
  • United States
  • Estados Unidos (Español México)
  • الولايات المتحدة
  • США
  • 美国 (简体中文)
  • États-Unis (Français France)
  • 미국
  • Estados Unidos (Português Brasil)
  • Hoa Kỳ
  • 美國 (繁體中文台灣)

Copyright © 2026 Apple Inc. All rights reserved.

  • Internet Service Terms
  • Apple Podcasts web player & Privacy
  • Cookie Warning
  • Support
  • Feedback

To listen to explicit episodes, sign in.

Apple Podcasts

Stay up to date with this show

Sign in or sign up to follow shows, save episodes and get the latest updates.

Select a country or region

Africa, Middle East, and India

  • Algeria
  • Angola
  • Armenia
  • Azerbaijan
  • Bahrain
  • Benin
  • Botswana
  • Brunei Darussalam
  • Burkina Faso
  • Cameroun
  • Cape Verde
  • Chad
  • Côte d’Ivoire
  • Congo, The Democratic Republic Of The
  • Egypt
  • Eswatini
  • Gabon
  • Gambia
  • Ghana
  • Guinea-Bissau
  • India
  • Iraq
  • Israel
  • Jordan
  • Kenya
  • Kuwait
  • Lebanon
  • Liberia
  • Libya
  • Madagascar
  • Malawi
  • Mali
  • Mauritania
  • Mauritius
  • Morocco
  • Mozambique
  • Namibia
  • Niger (English)
  • Nigeria
  • Oman
  • Qatar
  • Congo, Republic of
  • Rwanda
  • São Tomé and Príncipe
  • Saudi Arabia
  • Senegal
  • Seychelles
  • Sierra Leone
  • South Africa
  • Sri Lanka
  • Tajikistan
  • Tanzania, United Republic Of
  • Tunisia
  • Turkmenistan
  • United Arab Emirates
  • Uganda
  • Yemen
  • Zambia
  • Zimbabwe

Asia Pacific

  • Afghanistan
  • Australia
  • Bhutan
  • Cambodia
  • 中国大陆
  • Fiji
  • 香港
  • Indonesia (English)
  • 日本
  • Kazakhstan
  • 대한민국
  • Kyrgyzstan
  • Lao People's Democratic Republic
  • 澳門
  • Malaysia (English)
  • Maldives
  • Micronesia, Federated States of
  • Mongolia
  • Myanmar
  • Nauru
  • Nepal
  • New Zealand
  • Pakistan
  • Palau
  • Papua New Guinea
  • Philippines
  • Singapore
  • Solomon Islands
  • 台灣
  • Thailand
  • Tonga
  • Turkmenistan
  • Uzbekistan
  • Vanuatu
  • Vietnam

Europe

  • Albania
  • Armenia
  • Österreich
  • Belarus
  • Belgium
  • Bosnia and Herzegovina
  • Bulgaria
  • Croatia
  • Cyprus
  • Czechia
  • Denmark
  • Estonia
  • Finland
  • France (Français)
  • Georgia
  • Deutschland
  • Greece
  • Hungary
  • Iceland
  • Ireland
  • Italia
  • Kosovo
  • Latvia
  • Lithuania
  • Luxembourg (English)
  • Malta
  • Moldova, Republic Of
  • Montenegro
  • Nederland
  • North Macedonia
  • Norway
  • Poland
  • Portugal (Português)
  • Romania
  • Россия
  • Serbia
  • Slovakia
  • Slovenia
  • España
  • Sverige
  • Schweiz
  • Türkiye (English)
  • Ukraine
  • United Kingdom

Latin America and the Caribbean

  • Anguilla
  • Antigua and Barbuda
  • Argentina (Español)
  • Bahamas
  • Barbados
  • Belize
  • Bermuda
  • Bolivia (Español)
  • Brasil
  • Virgin Islands, British
  • Cayman Islands
  • Chile (Español)
  • Colombia (Español)
  • Costa Rica (Español)
  • Dominica
  • República Dominicana
  • Ecuador (Español)
  • El Salvador (Español)
  • Grenada
  • Guatemala (Español)
  • Guyana
  • Honduras (Español)
  • Jamaica
  • México
  • Montserrat
  • Nicaragua (Español)
  • Panamá
  • Paraguay (Español)
  • Perú
  • St. Kitts and Nevis
  • Saint Lucia
  • St. Vincent and The Grenadines
  • Suriname
  • Trinidad and Tobago
  • Turks and Caicos
  • Uruguay (English)
  • Venezuela (Español)

The United States and Canada

  • Canada (English)
  • Canada (Français)
  • United States
  • Estados Unidos (Español México)
  • الولايات المتحدة
  • США
  • 美国 (简体中文)
  • États-Unis (Français France)
  • 미국
  • Estados Unidos (Português Brasil)
  • Hoa Kỳ
  • 美國 (繁體中文台灣)