Afleveringen

  • In this electrifying episode, we dive deep into the world of hacking, privacy, and offensive security with Ryan Williams, Editor of HVCK Magazine and Director of Smart Cyber Solutions Pty Ltd. Ryan is more than just a cybersecurity consultant—he's a red team enthusiast, blue team strategist, and relentless innovator in the cyber arena.

    We explore Ryan's journey from pen tester to publisher, and uncover the vision behind HVCK Magazine—an online publication dedicated to all things hacking, from OSINT and threat intelligence to offensive tooling and real-world exploits. Learn about his contributions to the community with projects like Commander, MxFlex, AllTheThings, and Flight Freaker, and how these tools are helping redefine modern cybersecurity practices.

    Whether you're an aspiring hacker, seasoned security pro, or just cyber-curious, this episode is packed with insights, inspiration, and a behind-the-scenes look at the evolving hacking landscape.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    🔐 Tune in to hear:

    How HVCK Magazine is shaping the hacker culture online The power of community-driven security innovation Red vs. Blue: Ryan’s dual mindset in offensive and defensive ops Real talk on bespoke security tooling and Essential Eight uplifts And a few unexpected stories from the field...

    🧠 Stay sharp. Stay curious. Stay distorted.


    Citations:

    🔗 Connect with Ryan Williams

    LinkedIn: Explore Ryan's professional background and connect with him on LinkedIn. Smart Cyber Solutions: Learn more about his cybersecurity consultancy, Smart Cyber Solutions Pty Ltd, on their Facebook page. ​

    📰 Dive into HVCK Magazine

    HVCK Magazine Back Issues: Discover the mission and content of HVCK Magazine in this feature on https://hvck-magazine.github.io/ HVCK Magazine New Issues: Discover the mission and content of HVCK Magazine in this feature on https://heyzine.com/flip-book/cd19181153.html Contributors' Insights: Read about contributors' experiences and articles in HVCK Magazine, such as this LinkedIn post. ​

    🎧 Related Media & Community

    YouTube Interview: Watch an in-depth interview with Ryan Williams discussing HVCK Magazine and cybersecurity challenges on YouTube.

    🧠 Explore More in Cybersecurity & Hacking

    Phrack Magazine: A long-standing publication in the hacking community, available at phrack.org. ​ Hakin9 Magazine: Offers articles and resources on IT security and ethical hacking at hakin9.org. ​
  • In this electrifying episode of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion dive into the fascinating crossroads of cybersecurity, health, and molecular science with a very special guest — Dr. Gregory Carpenter. Known worldwide for his pioneering research and groundbreaking work at the intersection of biotechnology and cybersecurity, Dr. Carpenter brings a unique and urgent perspective on the growing risks and innovations tied to DNA hacking and cybersecurity at the molecular level.

    Together, they explore how advances in genetics, bioinformatics, and synthetic biology are creating new vulnerabilities — and why protecting health data and even the biological code of life itself has become a critical frontier for cybersecurity professionals. Dr. Carpenter shares real-world insights, discusses current threats and emerging trends, and offers his expert take on where regulation, technology, and human ingenuity must evolve to stay ahead of threats we are only beginning to understand.

    Don’t miss this thought-provoking conversation that bridges the digital and biological worlds — and challenges how we think about security in an era where data isn’t just on servers, but in our very cells. Whether you're a cybersecurity expert, a health industry professional, or just fascinated by where technology is taking us next, this is one episode you won't want to miss!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    🔗 Citations and Related Links:

    Biomalware: Malware Encoded in DNA
    Wired – https://www.wired.com/story/malware-dna-hack/ Scientists Hack a Computer Using DNA
    MIT Technology Review – https://www.technologyreview.com/2017/08/10/150013/scientists-hack-a-computer-using-dna/ Healing the Body with Sound Frequencies
    Donovan Health – https://www.donovanhealth.com/blog/healing-the-body-with-frequencies-the-basics-explained Dire Wolves and Woolly Mammoths: Concerns About Resurrecting Extinct Species
    BBC Future – https://www.bbc.com/future/article/20250425-why-scientists-fear-attempts-to-resurrect-extinct-animals-may-backfire DEFCON Conference (Official Site)
    https://defcon.org/ CRISPR and the Threat of Biohacking
    Harvard International Review – https://hir.harvard.edu/crispr-and-the-threat-of-biohacking/ Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy
    Frontiers in Bioengineering and Biotechnology – https://www.frontiersin.org/articles/10.3389/fbioe.2019.00020/full The Growing Threat of Biosecurity Risks in Synthetic Biology
    RAND Corporation – https://www.rand.org/pubs/research_reports/RR3027.html
  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • In this thought-provoking episode of the Cyber Distortion Podcast, we’re joined by Wes Kussmaul, a visionary in the realm of secure online identities and the founder of Delphi Internet Services Corporation—the company behind the Kussmaul Encyclopedia, the world’s first computerized encyclopedia and one of the earliest forms of hypertext. With over three decades of experience building secure online spaces, Wes brings a unique blend of historical perspective and forward-thinking innovation to the conversation around privacy, authentication, and identity protection.

    As digital threats evolve, so must our understanding of how we prove who we are online. Wes breaks down the role of public and private key cryptography in securing not just our communications, but our very identities and intellectual property. Through vivid analogies and real-world examples, he illustrates how Public Key Infrastructure (PKI) can serve as the backbone of a more trustworthy internet—one where authenticity and privacy aren’t afterthoughts, but foundations.

    We also explore his groundbreaking work with Reliable Identities, an initiative focused on reestablishing digital trust in an age of phishing, spoofing, and identity theft. Wes shares why the current system of usernames and passwords is fundamentally flawed—and how we can replace it with something far more secure and future-proof.

    Whether you're a cybersecurity expert, a tech enthusiast, or simply curious about the future of online trust, this episode will reshape how you view identity in the digital world. Tune in to hear from one of the internet’s earliest innovators on how we can protect who we are—and what we create—online.

    Wes is the author of several books about privacy and authenticity, including Quiet Enjoyment (2004), Own Your Privacy (2007), The Future Needs You (2007), and Don’t Get Norteled (2014). He is also an individual adherent of the International Union of Latin Notaries and has been appointed a Notary Ambassador by the National Notary Association.

    Wes received his BS in Physics from the University of Central Missouri in 1971 while serving in the US Air Force at Whiteman Air Force Base (SAC).

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS:

    LinkedIn: https://www.linkedin.com/in/weskussmaul/

    Wes’ Personal Website: https://weskussmaul.com/about-wes/

    Authentiverse: https://authentiverse.net

    Authenticity Alliance:

    https://www.whatisauthenticity.com/

    City of Osmio:

    https://www.osmio.ch/our-name.html

    Buy Wes’ Books:

    https://www.pkipress.com/

    The Authenticity Institute:

    https://www.authenticityinstitute.com/index.html

    More information on Sutton Smith (a.k.a. Sutton Love):

    https://www.reversecanarymission.org/person/sutton-smith-66936d96d1a13a06fe312995

    Sutton’s Instagram:

    https://www.instagram.com/sutton.loves/

  • In this gripping episode of the Cyber Distortion Podcast, we sit down with Ricoh Danielson — a former U.S. Army Combat Veteran of Iraq and Afghanistan, national security expert, and digital forensics specialist. With a career that bridges the battlefield and the digital frontlines, Ricoh brings a rare and powerful perspective on the evolving threats to our national security and critical infrastructure. From his firsthand experiences in war zones to his current role as a VCISO and digital forensic expert, Ricoh shares stories that are as eye-opening as they are inspiring. We dive into the real-world challenges facing the nation today — from protecting our energy grids and communication systems to defending against cyber threats that target both the public and private sectors. Ricoh also recounts some of his most intense moments in service, revealing what it takes to operate in high-stakes environments, both overseas and in high-profile courtrooms. This episode is a must-listen for anyone interested in cybersecurity, national defense, or the human element behind protecting our digital and physical worlds. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. Citations & Helpful Links:

    National Security Agency (NSA) Cybersecurity: The NSA provides resources aimed at preventing and eradicating cyber threats to U.S. national security systems, with a focus on the Defense Industrial Base and the enhancement of U.S. weapons' security.

    https://www.nsa.gov/cybersecurity/

    Department of Defense Cyber Crime Center (DC3): DC3 offers integrated services including cyber training, digital and multimedia forensics, and vulnerability disclosure, supporting law enforcement and counterintelligence efforts.

    https://csrc.nist.gov/ ‱ SANS Institute: A renowned organization specializing in information security and cybersecurity training, offering courses on topics like cyber and network defenses, penetration testing, incident response, and digital forensics. https://www.sans.org/ https://www.dc3.mil/

    National Institute of Standards and Technology (NIST) Computer Security Resource Center: NIST's CSRC provides access to cybersecurity and information security-related projects, publications, and news, supporting government, industry, and academic efforts in securing information systems.

    https://csrc.nist.gov/

    Cybersecurity and Infrastructure Security Agency (CISA) Free Cybersecurity Services and Tools: CISA has curated a database of free cybersecurity services and tools to help organizations reduce cybersecurity risks across U.S. critical infrastructure sectors.

    https://www.cisa.gov/resources-tools/... For listeners interested in connecting with Ricoh Danielson or learning more about his work:

    Official Website: Ricoh's personal website offers insights into his background, services, and expertise.

    https://www.ricohd.us/

    Contact Page: To reach out to Ricoh directly, visit his contact page where you can send a message or inquiry.

    https://www.ricohd.us/contact

    Instagram: Follow Ricoh on Instagram for updates and insights related to cybersecurity and his professional endeavors. / ricoh_danielson_

    These resources provide a comprehensive starting point for those interested in delving deeper into the fields of national security and digital forensics.

  • Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself.

    In this episode, we look into how differing generational outlooks—from the Silent Generation, to Baby Boomers, Gen X, Millennials, and Gen Z—shape the ways teams solve problems and interact within today’s corporate landscape. We explore how historical events, technological exposure, and shifting cultural norms have impacted each generation’s communication style, work ethic, and appetite for risk. Through candid anecdotes and real-world examples, we uncover the advantages of blending diverse generational perspectives to spark innovation, build more inclusive workplace cultures, and tackle company challenges more effectively.

    We discuss bridging generational gaps and nurturing an environment where each age group can contribute its strengths. Whether it’s harnessing the discipline and experience of older employees or tapping into the digital fluency and fresh ideas of younger ones, this episode offers strategies for leaders to cultivate synergy and drive growth.

    Ultimately, we hope that listeners will come away with a clearer understanding of why inclusive, cross-generational collaboration isn’t just a nice-to-have—but a critical differentiator in a rapidly evolving corporate world.

    We hope you enjoy this kickoff episode of our new 4th season of the podcast!!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Visit our premier sponsor’s pages here:

    Threatlocker - a global cybersecurity platform that provides endpoint protection using a Zero Trust approach, focusing on controlling and managing applications and devices to protect organizations from cyber threats, including malware and ransomware.

    https://www.threatlocker.com

    Alacrinet - a Palo Alto-based nationwide IT Security consulting firm focused on delivering best-in-class enterprise cybersecurity solutions and services. They are dedicated to people and strive to build positive, long-term relationships - both internally and with clients. We’re an agile company with a team atmosphere and ‘get it done’ mentality to do what’s needed for our clients.

    https://www.alacrinet.com

    Fulcrum Technology Solutions - exists to solve critical business problems shoulder to shoulder with you. In the pursuit of that goal, 2/3 of our company are engineers, but 100% of us are problem solvers. Whether we are tackling Security, Infrastructure, Cloud, or Big Data issues, our team won't stop until we finish the job! Our word defines us, and motivates us to give you the service that you deserve!

    https://www.ftsc.com

    Cyphernova.AI - we recognize that we are in the midst of a profound technological revolution. The way we work, learn, and communicate is evolving rapidly and will never be the same. Leveraging over 30 years of expertise in Technology and Cybersecurity, we are committed to guiding you through this transformative era.

    We offer a comprehensive suite of AI + Machine Learning solutions tailored to meet the unique needs of both individuals and organizations. Our services include an extensive AI Services Platform, robust training programs, ongoing support, and customized projects. As your trusted partner, we are here to help you implement and navigate the ever-changing landscape of AI.

    https://cyphernova.ai

  • In this season finale of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion, tackle one of the most critical topics in modern cybersecurity—incident response and disaster recovery. When a cyber incident strikes, every second counts. Organizations need to be ready with well-orchestrated plans to respond effectively and recover swiftly. This episode delves deep into the strategies, tools, and best practices that every cybersecurity professional and organization should know to minimize damage and ensure resilience.

    Kevin and Jason guide listeners through the intricacies of incident response, breaking it down into digestible phases like preparation, detection, containment, eradication, and recovery. They also explore the role of disaster recovery planning, highlighting how businesses can resume operations quickly and securely after a breach or significant event. The hosts share real-world examples and practical tips, making these complex processes relatable and actionable for professionals at all levels.

    As the final episode of the season, this is one you don’t want to miss. Kevin and Jason bring their signature blend of expertise and engaging conversation to ensure listeners walk away with a solid understanding of incident response frameworks, key roles and responsibilities, and the importance of regular testing and improvement. Whether you’re a seasoned cybersecurity practitioner or just starting, this episode offers something valuable for everyone.

    Thank you for joining us this season on Cyber Distortion. We’ve loved exploring the multifaceted world of cybersecurity with our incredible audience, and we’re ending this season with a bang. We hope you enjoy this finale as much as we enjoyed creating it. Stay tuned for future seasons as we continue to navigate the dynamic and ever-evolving landscape of cybersecurity!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    MORE VALUABLE RESOURCES:

    Incident Response Resources

    National Institute of Standards and Technology (NIST): Computer Security Incident Handling Guide Resource: NIST SP 800-61 Rev. 2 Description: This guide provides a comprehensive framework for incident handling, detailing preparation, detection, analysis, containment, eradication, and recovery steps. SANS Institute: Incident Handler's Handbook Resource: SANS Reading Room - Incident Response Description: A practical guide for incident handlers, focusing on hands-on strategies for real-world scenarios. US-CERT: Incident Response Resources Resource: CISA Incident Response Guidance Description: A hub of information, tools, and best practices for incident response, provided by the Cybersecurity and Infrastructure Security Agency.

    Disaster Recovery Resources

    Federal Emergency Management Agency (FEMA): Continuity of Operations Planning Resource: FEMA Continuity Resources Description: Guidance on creating disaster recovery and continuity plans for organizations of all sizes. International Organization for Standardization (ISO): ISO 22301 Resource: ISO 22301: Business Continuity Management Systems Description: This standard focuses on managing and reducing risks during disruptive incidents. Disaster Recovery Institute International (DRI): Best Practices for Business Continuity Resource: DRI Resources Description: A compilation of best practices, frameworks, and tools for effective disaster recovery planning.

    Cybersecurity Education and Training

    MITRE ATT&CK Framework Resource: MITRE ATT&CK Description: A detailed knowledge base of adversary tactics and techniques to inform incident response planning. CERT Coordination Center: Incident Management Practices Resource: CERT Resources Description: Research and guidance from the Software Engineering Institute at Carnegie Mellon University.

    Additional Practical Tools

    Microsoft: Security Incident Response Playbooks Resource: Microsoft Incident Response Description: A collection of playbooks designed for cloud-centric incident response. National Cyber Security Centre (NCSC): Incident Management Guidance Resource: NCSC UK Description: Practical advice from the UK government’s cybersecurity body on managing incidents effectively.
  • Cybersecurity isn’t just about technology—it’s about people. In this eye-opening episode of the Cyber Distortion Podcast, we’re joined by Jessie Bolton, CEO of Bolt Resources and former Vice President of North Texas ISSA, to tackle one of the industry’s most pressing challenges: the human side of the cybersecurity skills gap.

    Jessie brings a wealth of experience from her collaborations with ISC2, WiCyS, NICE, Infosec Institute, and higher education institutions. She’s at the forefront of redefining how organizations identify, nurture, and retain talent in an industry facing a critical workforce shortage.

    From strategies to attract untapped talent to innovative training programs that prioritize real-world readiness, Jessie shares actionable insights for employers and aspiring cybersecurity professionals alike. If you’re passionate about building a stronger, more inclusive cybersecurity workforce, this is the conversation you’ve been waiting for.

    Tune in and discover how we can close the gap and secure the future—one human at a time!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Jessie’s LinkedIn Profile:

    https://www.linkedin.com/in/jessiebolt/

    Bolt Resources - Websites of Jessie’s:

    boltresources.net (Company) anchor.fm/s/ee4823f0/podcast/rss (RSS Feed) bizjournals.com/dallas/press-release/detail/9334/Bolt-Resources

    Cyberseek.org:

    https://www.cyberseek.org/

    Lightcast.io:

    https://lightcast.io/

    OTHER Resources:

    https://venturebeat.com/programming-development/skills-shortage-persists-in-cybersecurity-with-many-jobs-going-unfilled/

    North Texas ISSA:

    https://www.ntxissa.org/

  • Protecting Your Privacy Online with Mark Weinstein đŸŽ™ïž

    In this must-listen episode of the Cyber Distortion Podcast, we dive deep into the critical topic of online privacy with our special guest, Mark Weinstein. As a world-renowned author, TedX speaker, tech visionary, and privacy advocate, Mark brings unparalleled insight into the digital privacy landscape.

    We explore strategies to safeguard your online presence, regain control over your personal data, and thrive in an increasingly connected world. Mark also shares groundbreaking ideas from his award-winning book, "Restoring Our Sanity Online – A Revolutionary Social Framework", offering a transformative approach to navigating the digital age.

    🔒 Don't miss this enlightening conversation about taking back your privacy and restoring balance in our online lives.

    🎧 Tune in now and learn how to protect what matters most—your personal privacy.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Mark’s LinkedIn Profile:

    https://www.linkedin.com/in/markfweinstein/

    Mark’s Twitter (X) Profile:

    https://twitter.com/markweinstein

    The Book – Restoring Our Sanity Online – A Revolutionary Social Framework

    https://www.markweinsteininventor.com/book

    Mark’s Tedx Talk:

    https://youtu.be/NAprT6hh33Y?feature=shared

    Mark’s Website:

    https://www.markweinsteininventor.com/

    About Mark:

    https://www.markweinsteininventor.com/about

    Speaking:

    https://www.markweinsteininventor.com/speaking

    Press Coverage:

    https://www.markweinsteininventor.com/press

  • So, do you think your business is secure? Think again. This October, Jason and Kevin met with CompTIA’s Wayne Selk, to uncover what businesses and individuals must know to stay ahead of today’s online threats. Don't miss out on this essential conversation – your online safety might just depend on it!

    An esteemed expert in the industry, Wayne brings over 25 years of cybersecurity expertise, helping businesses and individuals strengthen their defenses against online threats. From common phishing scams to advanced ransomware tactics, Wayne breaks down the latest in cybersecurity best practices and shares practical tips to keep you, your data, and your organization safe.

    Prior to his current role, Selk served as Senior Director of Cybersecurity Initiatives at ConnectWise from November 2018 to March 2022. He also held positions at Sienna Group LLC as a Principal Consultant and at Integrity Data Solutions, LLC as President. His earlier roles include Senior Manager at Symantec Federal Services and Network Engineer at BAE Systems.

    Selk holds a bachelor’s degree in information systems security from the University of Phoenix and has earned certifications such as Certified Data Protection Solutions Engineer (CDPSE) and previously held the Certified Information Systems Security Professional (CISSP).

    In his role at CompTIA, Selk focuses on enhancing cybersecurity programs and facilitating information sharing among organizations to improve collective security postures.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Wayne’s LinkedIn Profile:

    https://www.linkedin.com/in/wayne-selk/

    Wayne’s Twitter (X) Profile:

    https://x.com/WayneSiennaSec

    CompTIA’s LinkedIn Profile:

    https://www.linkedin.com/company/comptia/

    CompTIA’s Twitter (X) Profile:

    https://x.com/CompTIA

    CompTIA Certification Information:

    https://www.comptia.org/certifications

    Trustmark Framework:

    https://connect.comptia.org/membership/company/comptia-trustmarks

    CISA.gov Resources and Tools:

    https://www.cisa.gov/resources-tools/all-resources-tools

  • In this episode of the Cyber Distortion Podcast, we sit down with Dustin Dykes, better known as Wirefall, the founder of the Dallas Hackers Association (DHA). Join us as we dive into the origins of DHA, its impact on the cybersecurity community, and Wirefall's journey in the hacking world.

    Dustin is a Tribe of Hackers and Art of Intrusion Contributor, a public speaker, an improv and stand up student and performer, and of course, a technical guru! He is a local security community advocate. Founder of the Dallas Hackers Association and former board member of BSides DFW and TheLab.MS.

    He is a military and law enforcement veteran with 25+ years of security consulting experience focused on attack and penetration testing.

    We also get into the other really cool business that Dustin is a part of, Telesploit. The Telesploit solution enables organizations to remotely perform internal vulnerability assessments and penetration tests leveraging resources located anywhere in the world.

    Whether you're a seasoned hacker or just curious about the culture, this episode is packed with insights you won’t want to miss!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Wirefall’s LinkedIn Profile:

    https://www.linkedin.com/in/wirefall/

    Wirefalls’s Twitter (X) Profile:

    https://twitter.com/DHAhole

    DHA (Dallas Hackers Association) (X) Profile:

    https://twitter.com/Dallas_Hackers

    Telesploit:

    https://www.telesploit.com/

    Telesploit ‘X’ Profile:

    https://twitter.com/telesploit

    Telesploit LinkedIn Profile:

    https://www.linkedin.com/company/telesploit/

    OTHER D/FW Hacker Groups:

    DC214 ‘X’ Profile:

    https://twitter.com/DC214DFW

    DC940 ‘X’ Profile:

    https://twitter.com/DCG940

    Hack FtW’s Profile:

    https://twitter.com/Hack_FtW

  • Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. Today, Kevin and Jason have the privilege of talking with FC. FC or, “Freaky Clown” as he’s known more commonly by his hacker handle, is a renowned ethical hacker and social engineer, as well as global keynote speaker. He has been working in the information security field for over 25 years and is motivated by a drive to make individuals, organizations, and countries more secure. When he is not legally breaking into companies, FC takes audiences on an eye-opening journey into the hacker’s mindset. He has delivered over 50 keynotes including CPX360, C-E-R-N and Intersec. FC demystifies security with his expertise, humor, and passion.

    His bestselling book ‘How I Rob Banks – and other Such Places’ was published in June 2023.

    In today’s conversation, the guys delve into many of FC’s crazy stories from his physical penetration testing days. Many of the stories are actually covered in his awesome book but there is so much more to FC’s story.

    FC and his amazing wife Dr. Jessica Barker, also run their company Cygenta, which is centered around security in 3 key areas. Their approach to cyber security is more than just penetration testing or awareness training. They are experts in combining the technical, human and physical aspects of security best practice. They help some of the largest and most complicated organizations build resilience and sustainability in their risk management, not just their technical response. With Cygenta’s approach to cyber security, you and your people are safer, your technology is more resilient and your perimeters are more secure.

    Enjoy this amazing and very entertaining story time episode!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    FC’s LinkedIn Profile:

    https://www.linkedin.com/in/freakyclown/

    FC’s Twitter (X) Profile:

    https://twitter.com/_Freakyclown_

    Jessica’s LinkedIn Profile:

    https://www.linkedin.com/in/jessica-barker/

    Jessica’s Twitter (X) Profile:

    https://twitter.com/drjessicabarker

    Cygenta LinkedIn Profile:

    https://www.linkedin.com/company/cygenta/

    Cygenta Website:

    https://www.cygenta.co.uk/

    FC’s Book on Amazon:

    https://www.amazon.com/How-Rob-Banks-Other-Places/dp/B0C8WJCRN6/

    Jessica’s Book on Amazon:

    https://www.amazon.com/Hacked-Uncovering-Strategies-Secrets-Attacks/dp/1398613703

  • Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. Today, we have a truly extraordinary guest joining us: Len Noe, a Transhumanist with over 10 chips embedded in his body. Len isn’t just a futurist—he’s living proof of what the future could hold, using his integrated technology to perform hacks and complete takeovers on various devices. His unique perspective challenges the boundaries between human and machine, and today, he’s here to share his incredible journey and insights with us.

    Len’s path to becoming a white hat hacker and a technical evangelist at CyberArk is as fascinating as the technology he wields. Once a 1%er biker, Len made a dramatic transition from the world of outlaw motorcycle clubs to the front lines of cyber defense. His story is one of transformation, not just in terms of his career but in the very way he interacts with the world around him, using the embedded chips in his body as tools for exploration, protection, and demonstration.

    In this conversation, we’ll dive deep into the world of Transhumanism, explore the ethical implications of merging man with machine, and discuss how Len’s experiences have shaped his views on the future of cybersecurity. Whether you’re a tech enthusiast, a security professional, or just curious about the possibilities of human augmentation, this episode promises to be a thought-provoking journey into the unknown.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Len’s LinkedIn Profile:

    https://www.linkedin.com/in/len-noe/

    William McCurdy Article (The Standard – UK):

    https://www.standard.co.uk/news/tech/cyborg-hacker-infiltrate-phone-office-len-noe-b1072862.html

    Len’s Book “Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker”:

    Buy it on Amazon

    Cyber Ark:

    https://www.cyberark.com/

    The Cyber Cognition Podcast:

    https://www.itspmagazine.com/cyber-cognition-podcast

    Dangerous Things – Embedded Biohacking Stuff:

    https://dangerousthings.com/

    More on the PegLeg Impanted Device:

    http://pegleg.org/

    More on the Biohacking Village at DEFCON and Beyond:

    https://www.villageb.io/

    Biohacking Wearables:

    https://www.diygenius.com/best-biohacking-wearables/

  • In today’s episode, Kevin and Jason talk with a good friend Justin "Hutch" Hutchens.

    Hutch is a technology leader and visionary. He is the author of the book "The Language of Deception: Weaponizing Next Generation AI", the creator of Sociosploit.com, a research blog which examines exploitation opportunities on the social web – a confluence of his interests in both technical hacking and social psychology, and the co-host of Cyber Cognition, a podcast focused on the rapidly evolving technical landscape of artificial intelligence and machine learning. Hutch is an award-winning public speaker and has spoken at multiple Universities and global conferences to include the RSA Conference, and DEF CON.

    The guys dig into the topics considered somewhat controversial in today’s world of AI, and they discuss Hutche’s projects as well as his new book.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Hutch’s LinkedIn Profile:

    linkedin.com/in/justinhutchens

    Hutch’s Book “The Language of Deception: Weaponizing Next Generation AI”

    Buy it on Amazon

    Sociosploit Blog Site:

    https://www.sociosploit.com/

    The Cyber Cognition Podcast:

    https://www.itspmagazine.com/cyber-cognition-podcast

  • In this episode, Kevin and Jason hit 15 different topics on the Insane Impact of AI on our businesses, in our daily lives, in healthcare, and beyond. Each topic will be covered in 5 minutes or less in a new format we’re calling “Firetalks 15!”

    The guys like to talk, and if you’ve listened to more than a few episodes, keeping any topic under 5 minutes proved to be a very challenging thing as you’ll see in this interesting new format!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

  • In this episode, Kevin and Jason sit down to talk shop with George Kamide and George Al-Koura the hosts of the awesome podcast “Bare Knuckles and Brass Tacks.” Their podcast is focused on talking about whether or not there truly is a vendor/customer divide. It’s a cybersecurity podcast dedicated to answering that question.

    George Kamide comes from the vendor side, and George Al-Koura is a CISO on the customer side. They have REAL conversations from opposing sides of the pitch about cybersecurity marketing, sales, and go-to-market strategies. They confront these topics and bad practices with bare knuckles. Then it’s down to brass tacks, as they look for solutions. They have guests on either side, including CISOs, SMEs, leaders, frontline account managers, and more.

    George Kamide is a Multi-disciplinary thinker with a penchant for blowing up silos. He loves tackling big problems. This might mean orchestrating go-to-market product strategies, or creating stimulating thought leadership in dynamic tech environments. Other times it means taking on industry-wide issues of representation, customer/vendor trust challenges, or big questions like responsible AI.

    George Al-Koura is a CISO Chief Information Security Officer, he leads the strategy and execution of cybersecurity for a global online dating company that empowers people to connect and explore their relationships. He has over 15 years of experience in the security profession, spanning military, government, and commercial sectors, with a focus on cyber and security threat intelligence.

    We pick their brains on their podcast, their origin story, and much, much more


    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS:

    Links to find the Bare Knuckles Team:

    Web:

    https://www.bareknucklespod.com/

    LinkedIn:

    Bare Knuckles: https://www.linkedin.com/company/bare-knuckles-brass-tacks/

    George Kamide: https://www.linkedin.com/in/george-kamide/

    George Al-Koura: https://www.linkedin.com/in/george-y-al-koura/

    SquadCon:

    https://blackgirlshack.org/

  • In this episode, Jason and Kevin sit down with the one and only storyteller from the dark side of the internet, Jack Rhysider. Jack is the beloved voice behind the extremely popular podcast The Darknet Diaries. Tonight, it’s a podcaster-to-podcaster conversational happy hour!

    Jack attended a highly ranked university to study computer engineering with an emphasis on software engineering. Received formal training in Linux, Unix, Windows, C, C++, Java, ASM, logic, and electrical engineering.

    After college, he spent over a decade conducting network hardening by securing, analyzing, and testing network equipment such as firewalls, routers, and IDS units. Completed work on dozens of client's networks ranging from schools, banks, commercial, government, and defense contractors. Acquired numerous certifications in Cisco and Juniper and other security related training. Architected and built a SOC using a SIEM to detect network threats and intrusions for clients.

    Darknet Diaries produces audio stories specifically intended to capture, preserve, and explain the culture around hacking and cyber security in order to educate and entertain both technical and non-technical audiences.

    At Darknet Diaries, they adhere to journalistic standards by fact checking and ethical sourcing of information. They adopt principles of truthfulness, accuracy, objectivity, impartiality, fairness, and public accountability.

    Darknet Diaries is trustworthy, they strive to enhance intellectual development, expand knowledge, deepen aural enjoyment, increase the awareness of living in a highly technical society, and result in a service to listeners which makes them more responsive, informed citizens of their digital lives.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS:

    Darknet Diaries Website:

    https://www.darknetdiaries.com

    Darknet Diaries SWAG Shop:

    https://shop.darknetdiaries.com/

    Jack’s LinkedIn:

    https://www.linkedin.com/in/jack-rhysider-02922a167/

    Twitter:

    https://twitter.com/JackRhysider

    https://twitter.com/DarknetDiaries

    YouTube Channel:

    https://www.youtube.com/@JackRhysider

    Spotify:

    https://open.spotify.com/show/4XPl3uEEL9hvqMkoZrzbx5

    Apple Podcasts:

    https://podcasts.apple.com/us/podcast/darknet-diaries/id1296350485

    Reddit:

    https://www.reddit.com/r/darknetdiaries/

    Patreon:

    https://www.patreon.com/darknetdiaries

  • EPISODE DESCRIPTION:

    In this episode, we sit down with Sr. Security Consultant and Red Teamer, Alethe Denis. Alethe is a social engineer who excels in the art of human hacking.

    Alethe Denis is a Senior Security Consultant on the Red Team at Bishop Fox, an offensive cyber security company that helps clients protect their assets and data. She holds the Certified Ethical Hacker (CEH) certification and has multiple awards and publications in the field of social engineering and cybersecurity.

    Pursuing her passion for hacking she joined the cyber security industry after winning the prestigious DEF CON Social Engineering Capture the Flag competition in 2019 and receiving a coveted DEF CON Black Badge. Since then, she has been a leading social engineering expert and cybersecurity ally for companies around the globe, specializing in red team attack emulative social engineering. She is also a board member of DEF CON Groups and a member of InfraGard, a partnership between the FBI and the private sector.

    We get into some of her amazing stories in this episode so snap on that chin strap. We’re going to have some fun!!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS:

    HOW TO FIND ALETHE

    LinkedIn:

    https://www.linkedin.com/in/alethe/

    Twitter:

    https://twitter.com/AletheDenis

    Bishop Fox:

    https://bishopfox.com/authors/alethe-denis

    We are Tech Women Interview:

    https://wearetechwomen.com/inspirational-woman-alethe-denis-senior-security-consultant/

    Social Engineering Links:

    https://www.se.community/

    https://linktr.ee/sec_defcon

    DEFCON:

    https://defcon.org/

    Black Badge Hall of Fame & More on the Black Badge:

    https://defcon.org/html/links/dc-black-badge.html

    https://defcon.org/html/links/dc-bb-policy.html

  • EPISODE DESCRIPTION:

    In this episode, Kevin and Jason sit down to talk shop with Cyber-guru Phillip Wylie. Phillip is a friend and a member of the newly formed Cyber Circus network which includes other podcasters including Chris Glanden of BarCode Security as well as Kevin & Jason from the Cyber Distortion Podcast.

    Phillip Wylie is a well-known figure in the cybersecurity and ethical hacking community, recognized for his extensive experience and contributions to the field.

    Background and Expertise: Phillip has a background in penetration testing and ethical hacking. His career spans over two decades, during which he has held various roles in IT and security, including penetration tester, security engineer, and security consultant. His expertise lies in identifying and exploiting vulnerabilities in computer systems and networks to help organizations strengthen their security postures.

    Education and Advocacy: He is known for his efforts in cybersecurity education and advocacy, working to raise awareness about the importance of cybersecurity and sharing knowledge with aspiring cybersecurity professionals. Wylie often speaks at conferences and seminars, sharing his insights on ethical hacking, penetration testing, and cybersecurity trends.

    The Pwn School Project: Phillip is the founder of The Pwn School Project, an educational initiative aimed at teaching ethical hacking and cybersecurity skills to a wider audience. The project focuses on providing free or low-cost education to those interested in pursuing a career in cybersecurity, emphasizing hands-on learning and practical skills.

    Authorship and Thought Leadership: He has contributed to the cybersecurity community as a writer and thought leader, sharing his knowledge through articles, books, and research papers. His work often covers topics related to ethical hacking techniques, career advice for cybersecurity professionals, and the latest trends in cyber threats and defenses.

    Mentorship: Phillip is also known for his mentorship role in the cybersecurity community, guiding newcomers and helping them navigate the complexities of starting a career in cybersecurity. He advocates for continuous learning and ethical practices within the field.

    Jason Popillion is a CISSP and former CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS:

    Links to find Phillip:

    Web:

    https://www.thehackermaker.com/

    LinkedIn:

    https://www.linkedin.com/in/phillipwylie/

    Twitter - X:

    https://twitter.com/PhillipWylie

    YouTube:

    https://www.youtube.com/@PhillipWylie

    Spotify:

    https://open.spotify.com/show/6LH3TYGlg0JRsK7UzDmbjb?si=3f1c8f364613460c

    DEFCON Meetup Groups:

    https://forum.defcon.org/social-groups

    DC940 (Denton Texas):

    https://twitter.com/DCG940

  • In this episode, Kevin and Jason kick of what we expect will be our most exciting season to date. We come out of the gate like two savage wildebeests ready to devour anything in our path! Wait, that sounds extreme. Maybe it’s on that intense, but it’s LEGIT intense as we tackle a topic that only the fearless dare unpackage DEEPFAKES!

    In this octane fueled episode, we delve into the intricate world of deepfakes, a term that has rapidly evolved from obscure tech lingo to a hot-button issue at the intersection of technology, ethics, and reality. We give funny examples and enjoy a light-hearted segment showing how deepfakes are used for laughs, but the light-hearted fun only lasts so long.

    The episode takes a critical turn as we examine the darker side of deepfakes, highlighting instances where they've been used to spread misinformation, and create non-consensual explicit content. The conversation also covers the psychological and societal impacts of living in a world where seeing is no longer believing, and how our understanding of truth and reality is being challenged.

    "Down the Deepfake Rabbit Hole" offers a comprehensive and nuanced examination of deepfakes, encouraging listeners to ponder the profound questions they raise about innovation, authenticity, and the fabric of our digital lives. Join us for this thought-provoking journey into one of the most fascinating and controversial topics in today's digital age.

    Jason Popillion is a CISSP and serves as a former CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    CTRL_SHIFT_FACE:

    Their awesome channel can be found out on YouTube. Check out some of the great deepfakes they’re creating out there at https://www.youtube.com/@CtrlShiftFace

    AICPA Guidance:

    https://www.aicpa-cima.com/news/article/deepfakes-emerge-as-real-cybersecurity-threat

    AI DEEPFAKE SCAM STORY:

    https://www.theguardian.com/world/2024/feb/05/hong-kong-company-deepfake-video-conference-call-scam

    AI TEACHER SEX SCANDAL STORIES:

    https://www.fox26houston.com/news/houston-area-student-accused-of-creating-deep-fake-explicit-photos-of-teacher-sharing-them-online

    https://nypost.com/2023/04/14/texas-student-faked-nudes-of-teacher-report/

    TOOLS USED IN THE EPISODE INTRO:

    Speechify:

    https://speechify.com/

    Swapface:

    https://www.swapface.org

    Envato Elements (Images):

    https://elements.envato.com

    Audio (Audio):

    https://audiojungle.net/

  • Get ready for an electrifying evening as the "Lone Star Cyber Circus" pitches its virtual tent at the renowned Hop & Sting Brewery in Grapevine, Texas! This live podcast event, a harmonious blend of cutting-edge cyber talks and classic Texan hospitality, promises an experience like no other.

    As you step into the rustic yet modern ambiance of Hop & Sting Brewery, you'll be greeted by the rich aroma of craft beers, a hallmark of this beloved local establishment. The brewery's spacious interior, adorned with hints of Texan charm and cyber-themed décor, sets the perfect stage for an evening of engaging discussions and lively entertainment.

    The "Lone Star Cyber Circus" is more than just a podcast; it's a celebration of the digital age, wrapped in the warmth of Texan culture. Hosted by charismatic cyber experts, Chris Glanden (Barcode Security), Phillip Wylie (Phillip Wylie Show), and Kevin Pentecost & Jason Popillion (Cyber Distortion Podcast). Their discussions are a riveting blend of expert insights, humorous anecdotes, and lively banter.

    What makes this event truly unique is its interactive format. The live audience, a diverse mix of tech enthusiasts, local patrons, and visitors, gets to participate in Q&A sessions, offering a dynamic and inclusive experience.

    As the podcast rolled, guests enjoyed Hop & Sting's exquisite selection of craft beers, each brew telling its own story of local ingredients and brewing artistry. The brewery's friendly staff were more than happy to guide you through their selection, ensuring a perfect pairing for your podcast experience.

    Throughout the evening, the "Lone Star Cyber Circus" also features special guests - from renowned tech gurus to local cybersecurity heroes - adding depth and diversity to the conversation. These guest appearances are a crowd favorite, often leading to insightful, sometimes heated, but always entertaining discussions. The event featured experts in the area of the DFW Hacking scene: Wirefall (Dallas Hackers Association), Juneau Jones (DC214), and NEURAL PHANTOM (HackFTW), Phillip Wylie himself, represented Denton and (DC940).

    Following the awesome discussion on the DFW Hacker scene, we shifted into another very hot topic on AI and where it’s headed in the near future. Special guests Justin “Hutch” Hutchins, and Quentin Rhoads-Herrera stole the show with this topic.

    Please follow our AWESOME SPONSORS: Cyberstrike and Trace3 who made it all happen. We want to extend the most heartfelt THANK YOU to both of them for making this event possible!!

    As the night draws to a close, the lively atmosphere of Hop & Sting Brewery, combined with the thought-provoking content of "Lone Star Cyber Circus," leaves you with a sense of connection - to the community, the evolving digital world, and the vibrant culture of Texas. It's an experience that goes beyond a typical podcast recording, leaving you enriched, entertained, and eager for the next episode.

    Whether you were a tech aficionado, a beer enthusiast, or just in search of a unique night out in Grapevine, the "Lone Star Cyber Circus" at Hop & Sting Brewery was an event you didn’t want to miss. If you missed this one, follow us on Twitter for more information about the next live Cyber Circus event! We had so much fun, we can’t wait for the next one!!

    Join us for an evening where the cyber world and Texas charm collide, creating an unforgettable podcast experience! đŸ»đŸŽȘ

    CITATIONS:

    CyberStrike: https://cyberstrikegroup.com/

    Trace3: https://www.trace3.com/

    Barcode Security: https://barcodesecurity.com/

    Phillip Wylie Show: https://www.phillipwylieshow.com/

    Cyber Distortion Podcast on Twitter: https://cyberdistortionpodcast.com/

    DFW Hacker Scene:

    Dallas Hackers Association: https://twitter.com/Dallas_Hackers

    DC214: https://twitter.com/DC214DFW

    DC940: https://twitter.com/DCG940

    HackFTW: https://twitter.com/Hack_FtW

    Thanks to Kiss for the amazing tune “Psycho Circus” which we used as our walk-up song at the event!