エピソード

  • S4 - Episode 005 – The Art of the HVCK! (w/ Ryan Williams)
    2025/05/05

    In this electrifying episode, we dive deep into the world of hacking, privacy, and offensive security with Ryan Williams, Editor of HVCK Magazine and Director of Smart Cyber Solutions Pty Ltd. Ryan is more than just a cybersecurity consultant—he's a red team enthusiast, blue team strategist, and relentless innovator in the cyber arena.

    We explore Ryan's journey from pen tester to publisher, and uncover the vision behind HVCK Magazine—an online publication dedicated to all things hacking, from OSINT and threat intelligence to offensive tooling and real-world exploits. Learn about his contributions to the community with projects like Commander, MxFlex, AllTheThings, and Flight Freaker, and how these tools are helping redefine modern cybersecurity practices.

    Whether you're an aspiring hacker, seasoned security pro, or just cyber-curious, this episode is packed with insights, inspiration, and a behind-the-scenes look at the evolving hacking landscape.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    🔐 Tune in to hear:

    • How HVCK Magazine is shaping the hacker culture online
    • The power of community-driven security innovation
    • Red vs. Blue: Ryan’s dual mindset in offensive and defensive ops
    • Real talk on bespoke security tooling and Essential Eight uplifts
    • And a few unexpected stories from the field...

    🧠 Stay sharp. Stay curious. Stay distorted.


    Citations:

    🔗 Connect with Ryan Williams

    • LinkedIn: Explore Ryan's professional background and connect with him on LinkedIn.
    • Smart Cyber Solutions: Learn more about his cybersecurity consultancy, Smart Cyber Solutions Pty Ltd, on their Facebook page. ​

    📰 Dive into HVCK Magazine

    • HVCK Magazine Back Issues: Discover the mission and content of HVCK Magazine in this feature on https://hvck-magazine.github.io/
    • HVCK Magazine New Issues: Discover the mission and content of HVCK Magazine in this feature on https://heyzine.com/flip-book/cd19181153.html

    • Contributors' Insights: Read about contributors' experiences and articles in HVCK Magazine, such as this LinkedIn post. ​

    🎧 Related Media & Community

    • YouTube Interview: Watch an in-depth interview with Ryan Williams discussing HVCK Magazine and cybersecurity challenges on YouTube.

    🧠 Explore More in Cybersecurity & Hacking

    • Phrack Magazine: A long-standing publication in the hacking community, available at phrack.org. ​
    • Hakin9 Magazine: Offers articles and resources on IT security and ethical hacking at hakin9.org. ​
    続きを読む 一部表示
    1 時間 24 分
  • S4 - Episode 004 – Human IOT: Sub-Molecular DNA Cybersecurity (w/ Dr. Gregory Carpenter)
    2025/04/28

    In this electrifying episode of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion dive into the fascinating crossroads of cybersecurity, health, and molecular science with a very special guest — Dr. Gregory Carpenter. Known worldwide for his pioneering research and groundbreaking work at the intersection of biotechnology and cybersecurity, Dr. Carpenter brings a unique and urgent perspective on the growing risks and innovations tied to DNA hacking and cybersecurity at the molecular level.

    Together, they explore how advances in genetics, bioinformatics, and synthetic biology are creating new vulnerabilities — and why protecting health data and even the biological code of life itself has become a critical frontier for cybersecurity professionals. Dr. Carpenter shares real-world insights, discusses current threats and emerging trends, and offers his expert take on where regulation, technology, and human ingenuity must evolve to stay ahead of threats we are only beginning to understand.

    Don’t miss this thought-provoking conversation that bridges the digital and biological worlds — and challenges how we think about security in an era where data isn’t just on servers, but in our very cells. Whether you're a cybersecurity expert, a health industry professional, or just fascinated by where technology is taking us next, this is one episode you won't want to miss!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    🔗 Citations and Related Links:

    • Biomalware: Malware Encoded in DNA
      Wired – https://www.wired.com/story/malware-dna-hack/
    • Scientists Hack a Computer Using DNA
      MIT Technology Review – https://www.technologyreview.com/2017/08/10/150013/scientists-hack-a-computer-using-dna/
    • Healing the Body with Sound Frequencies
      Donovan Health – https://www.donovanhealth.com/blog/healing-the-body-with-frequencies-the-basics-explained
    • Dire Wolves and Woolly Mammoths: Concerns About Resurrecting Extinct Species
      BBC Future – https://www.bbc.com/future/article/20250425-why-scientists-fear-attempts-to-resurrect-extinct-animals-may-backfire
    • DEFCON Conference (Official Site)
      https://defcon.org/
    • CRISPR and the Threat of Biohacking
      Harvard International Review – https://hir.harvard.edu/crispr-and-the-threat-of-biohacking/
    • Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy
      Frontiers in Bioengineering and Biotechnology – https://www.frontiersin.org/articles/10.3389/fbioe.2019.00020/full
    • The Growing Threat of Biosecurity Risks in Synthetic Biology
      RAND Corporation – https://www.rand.org/pubs/research_reports/RR3027.html
    続きを読む 一部表示
    1 時間 49 分
  • S4 - Episode 003 – Hackers Love You...And Your Overshared Instagram Posts! (w/ Wes Kussmaul)
    2025/04/10

    In this thought-provoking episode of the Cyber Distortion Podcast, we’re joined by Wes Kussmaul, a visionary in the realm of secure online identities and the founder of Delphi Internet Services Corporation—the company behind the Kussmaul Encyclopedia, the world’s first computerized encyclopedia and one of the earliest forms of hypertext. With over three decades of experience building secure online spaces, Wes brings a unique blend of historical perspective and forward-thinking innovation to the conversation around privacy, authentication, and identity protection.

    As digital threats evolve, so must our understanding of how we prove who we are online. Wes breaks down the role of public and private key cryptography in securing not just our communications, but our very identities and intellectual property. Through vivid analogies and real-world examples, he illustrates how Public Key Infrastructure (PKI) can serve as the backbone of a more trustworthy internet—one where authenticity and privacy aren’t afterthoughts, but foundations.

    We also explore his groundbreaking work with Reliable Identities, an initiative focused on reestablishing digital trust in an age of phishing, spoofing, and identity theft. Wes shares why the current system of usernames and passwords is fundamentally flawed—and how we can replace it with something far more secure and future-proof.

    Whether you're a cybersecurity expert, a tech enthusiast, or simply curious about the future of online trust, this episode will reshape how you view identity in the digital world. Tune in to hear from one of the internet’s earliest innovators on how we can protect who we are—and what we create—online.

    Wes is the author of several books about privacy and authenticity, including Quiet Enjoyment (2004), Own Your Privacy (2007), The Future Needs You (2007), and Don’t Get Norteled (2014). He is also an individual adherent of the International Union of Latin Notaries and has been appointed a Notary Ambassador by the National Notary Association.

    Wes received his BS in Physics from the University of Central Missouri in 1971 while serving in the US Air Force at Whiteman Air Force Base (SAC).

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS:

    LinkedIn: https://www.linkedin.com/in/weskussmaul/

    Wes’ Personal Website: https://weskussmaul.com/about-wes/

    Authentiverse: https://authentiverse.net

    Authenticity Alliance:

    https://www.whatisauthenticity.com/

    City of Osmio:

    https://www.osmio.ch/our-name.html

    Buy Wes’ Books:

    https://www.pkipress.com/

    The Authenticity Institute:

    https://www.authenticityinstitute.com/index.html

    More information on Sutton Smith (a.k.a. Sutton Love):

    https://www.reversecanarymission.org/person/sutton-smith-66936d96d1a13a06fe312995

    Sutton’s Instagram:

    https://www.instagram.com/sutton.loves/

    続きを読む 一部表示
    1 時間 29 分
  • S4 - Episode 002 - Staring Down the Barrel of a Loaded Gun (w/ Ricoh Danielson)
    2025/03/27
    In this gripping episode of the Cyber Distortion Podcast, we sit down with Ricoh Danielson — a former U.S. Army Combat Veteran of Iraq and Afghanistan, national security expert, and digital forensics specialist. With a career that bridges the battlefield and the digital frontlines, Ricoh brings a rare and powerful perspective on the evolving threats to our national security and critical infrastructure. From his firsthand experiences in war zones to his current role as a VCISO and digital forensic expert, Ricoh shares stories that are as eye-opening as they are inspiring. We dive into the real-world challenges facing the nation today — from protecting our energy grids and communication systems to defending against cyber threats that target both the public and private sectors. Ricoh also recounts some of his most intense moments in service, revealing what it takes to operate in high-stakes environments, both overseas and in high-profile courtrooms. This episode is a must-listen for anyone interested in cybersecurity, national defense, or the human element behind protecting our digital and physical worlds. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. Citations & Helpful Links: National Security Agency (NSA) Cybersecurity: The NSA provides resources aimed at preventing and eradicating cyber threats to U.S. national security systems, with a focus on the Defense Industrial Base and the enhancement of U.S. weapons' security. https://www.nsa.gov/cybersecurity/ Department of Defense Cyber Crime Center (DC3): DC3 offers integrated services including cyber training, digital and multimedia forensics, and vulnerability disclosure, supporting law enforcement and counterintelligence efforts. https://csrc.nist.gov/ • SANS Institute: A renowned organization specializing in information security and cybersecurity training, offering courses on topics like cyber and network defenses, penetration testing, incident response, and digital forensics. https://www.sans.org/ https://www.dc3.mil/ National Institute of Standards and Technology (NIST) Computer Security Resource Center: NIST's CSRC provides access to cybersecurity and information security-related projects, publications, and news, supporting government, industry, and academic efforts in securing information systems. https://csrc.nist.gov/ Cybersecurity and Infrastructure Security Agency (CISA) Free Cybersecurity Services and Tools: CISA has curated a database of free cybersecurity services and tools to help organizations reduce cybersecurity risks across U.S. critical infrastructure sectors. https://www.cisa.gov/resources-tools/... For listeners interested in connecting with Ricoh Danielson or learning more about his work: Official Website: Ricoh's personal website offers insights into his background, services, and expertise. https://www.ricohd.us/ Contact Page: To reach out to Ricoh directly, visit his contact page where you can send a message or inquiry. https://www.ricohd.us/contact Instagram: Follow Ricoh on Instagram for updates and insights related to cybersecurity and his professional endeavors. / ricoh_danielson_ These resources provide a comprehensive starting point for those interested in delving deeper into the fields of national security and digital forensics.
    続きを読む 一部表示
    1 時間 22 分
  • S4 – Episode 001 – [CTRL-ALT-GEN] Resetting the Generational Tech Divide
    2025/03/17

    Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself.

    In this episode, we look into how differing generational outlooks—from the Silent Generation, to Baby Boomers, Gen X, Millennials, and Gen Z—shape the ways teams solve problems and interact within today’s corporate landscape. We explore how historical events, technological exposure, and shifting cultural norms have impacted each generation’s communication style, work ethic, and appetite for risk. Through candid anecdotes and real-world examples, we uncover the advantages of blending diverse generational perspectives to spark innovation, build more inclusive workplace cultures, and tackle company challenges more effectively.

    We discuss bridging generational gaps and nurturing an environment where each age group can contribute its strengths. Whether it’s harnessing the discipline and experience of older employees or tapping into the digital fluency and fresh ideas of younger ones, this episode offers strategies for leaders to cultivate synergy and drive growth.

    Ultimately, we hope that listeners will come away with a clearer understanding of why inclusive, cross-generational collaboration isn’t just a nice-to-have—but a critical differentiator in a rapidly evolving corporate world.

    We hope you enjoy this kickoff episode of our new 4th season of the podcast!!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Visit our premier sponsor’s pages here:

    Threatlocker - a global cybersecurity platform that provides endpoint protection using a Zero Trust approach, focusing on controlling and managing applications and devices to protect organizations from cyber threats, including malware and ransomware.

    https://www.threatlocker.com

    Alacrinet - a Palo Alto-based nationwide IT Security consulting firm focused on delivering best-in-class enterprise cybersecurity solutions and services. They are dedicated to people and strive to build positive, long-term relationships - both internally and with clients. We’re an agile company with a team atmosphere and ‘get it done’ mentality to do what’s needed for our clients.

    https://www.alacrinet.com

    Fulcrum Technology Solutions - exists to solve critical business problems shoulder to shoulder with you. In the pursuit of that goal, 2/3 of our company are engineers, but 100% of us are problem solvers. Whether we are tackling Security, Infrastructure, Cloud, or Big Data issues, our team won't stop until we finish the job! Our word defines us, and motivates us to give you the service that you deserve!

    https://www.ftsc.com

    Cyphernova.AI - we recognize that we are in the midst of a profound technological revolution. The way we work, learn, and communicate is evolving rapidly and will never be the same. Leveraging over 30 years of expertise in Technology and Cybersecurity, we are committed to guiding you through this transformative era.

    We offer a comprehensive suite of AI + Machine Learning solutions tailored to meet the unique needs of both individuals and organizations. Our services include an extensive AI Services Platform, robust training programs, ongoing support, and customized projects. As your trusted partner, we are here to help you implement and navigate the ever-changing landscape of AI.

    https://cyphernova.ai

    続きを読む 一部表示
    1 時間 21 分
  • S3 – Episode 014 – Navigating the Storm: Mastering Incident Response and Disaster Recovery
    2024/12/26
    In this season finale of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion, tackle one of the most critical topics in modern cybersecurity—incident response and disaster recovery. When a cyber incident strikes, every second counts. Organizations need to be ready with well-orchestrated plans to respond effectively and recover swiftly. This episode delves deep into the strategies, tools, and best practices that every cybersecurity professional and organization should know to minimize damage and ensure resilience. Kevin and Jason guide listeners through the intricacies of incident response, breaking it down into digestible phases like preparation, detection, containment, eradication, and recovery. They also explore the role of disaster recovery planning, highlighting how businesses can resume operations quickly and securely after a breach or significant event. The hosts share real-world examples and practical tips, making these complex processes relatable and actionable for professionals at all levels. As the final episode of the season, this is one you don’t want to miss. Kevin and Jason bring their signature blend of expertise and engaging conversation to ensure listeners walk away with a solid understanding of incident response frameworks, key roles and responsibilities, and the importance of regular testing and improvement. Whether you’re a seasoned cybersecurity practitioner or just starting, this episode offers something valuable for everyone. Thank you for joining us this season on Cyber Distortion. We’ve loved exploring the multifaceted world of cybersecurity with our incredible audience, and we’re ending this season with a bang. We hope you enjoy this finale as much as we enjoyed creating it. Stay tuned for future seasons as we continue to navigate the dynamic and ever-evolving landscape of cybersecurity! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. MORE VALUABLE RESOURCES: Incident Response Resources National Institute of Standards and Technology (NIST): Computer Security Incident Handling Guide Resource: NIST SP 800-61 Rev. 2Description: This guide provides a comprehensive framework for incident handling, detailing preparation, detection, analysis, containment, eradication, and recovery steps. SANS Institute: Incident Handler's Handbook Resource: SANS Reading Room - Incident ResponseDescription: A practical guide for incident handlers, focusing on hands-on strategies for real-world scenarios. US-CERT: Incident Response Resources Resource: CISA Incident Response GuidanceDescription: A hub of information, tools, and best practices for incident response, provided by the Cybersecurity and Infrastructure Security Agency. Disaster Recovery Resources Federal Emergency Management Agency (FEMA): Continuity of Operations Planning Resource: FEMA Continuity ResourcesDescription: Guidance on creating disaster recovery and continuity plans for organizations of all sizes. International Organization for Standardization (ISO): ISO 22301 Resource: ISO 22301: Business Continuity Management SystemsDescription: This standard focuses on managing and reducing risks during disruptive incidents. Disaster Recovery Institute International (DRI): Best Practices for Business Continuity Resource: DRI ResourcesDescription: A compilation of best practices, frameworks, and tools for effective disaster recovery planning. Cybersecurity Education and Training MITRE ATT&CK Framework Resource: MITRE ATT&CKDescription: A detailed knowledge base of adversary tactics and techniques to inform incident response planning. CERT Coordination Center: Incident Management Practices Resource: CERT ResourcesDescription: Research and guidance from the Software Engineering Institute at Carnegie Mellon University. Additional Practical Tools Microsoft: Security Incident Response Playbooks Resource: Microsoft Incident ResponseDescription: A collection of playbooks designed for cloud-centric incident response. National Cyber Security Centre (NCSC): Incident Management Guidance Resource: NCSC UKDescription: Practical advice from the UK government’s cybersecurity body on managing incidents effectively.
    続きを読む 一部表示
    1 時間 38 分
  • S3 – Episode 013 – Bridging the Cyber Skills Gap w/Jessie Bolton
    2024/12/04

    Cybersecurity isn’t just about technology—it’s about people. In this eye-opening episode of the Cyber Distortion Podcast, we’re joined by Jessie Bolton, CEO of Bolt Resources and former Vice President of North Texas ISSA, to tackle one of the industry’s most pressing challenges: the human side of the cybersecurity skills gap.

    Jessie brings a wealth of experience from her collaborations with ISC2, WiCyS, NICE, Infosec Institute, and higher education institutions. She’s at the forefront of redefining how organizations identify, nurture, and retain talent in an industry facing a critical workforce shortage.

    From strategies to attract untapped talent to innovative training programs that prioritize real-world readiness, Jessie shares actionable insights for employers and aspiring cybersecurity professionals alike. If you’re passionate about building a stronger, more inclusive cybersecurity workforce, this is the conversation you’ve been waiting for.

    Tune in and discover how we can close the gap and secure the future—one human at a time!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Jessie’s LinkedIn Profile:

    https://www.linkedin.com/in/jessiebolt/

    Bolt Resources - Websites of Jessie’s:

    • boltresources.net (Company)
    • anchor.fm/s/ee4823f0/podcast/rss (RSS Feed)
    • bizjournals.com/dallas/press-release/detail/9334/Bolt-Resources

    Cyberseek.org:

    https://www.cyberseek.org/

    Lightcast.io:

    https://lightcast.io/

    OTHER Resources:

    https://venturebeat.com/programming-development/skills-shortage-persists-in-cybersecurity-with-many-jobs-going-unfilled/

    North Texas ISSA:

    https://www.ntxissa.org/

    続きを読む 一部表示
    1 時間 49 分
  • S3 – Episode 012 – Slaying the Surveillance Capitalist Pigs w/Mark Weinstein
    2024/11/21

    Protecting Your Privacy Online with Mark Weinstein 🎙️

    In this must-listen episode of the Cyber Distortion Podcast, we dive deep into the critical topic of online privacy with our special guest, Mark Weinstein. As a world-renowned author, TedX speaker, tech visionary, and privacy advocate, Mark brings unparalleled insight into the digital privacy landscape.

    We explore strategies to safeguard your online presence, regain control over your personal data, and thrive in an increasingly connected world. Mark also shares groundbreaking ideas from his award-winning book, "Restoring Our Sanity Online – A Revolutionary Social Framework", offering a transformative approach to navigating the digital age.

    🔒 Don't miss this enlightening conversation about taking back your privacy and restoring balance in our online lives.

    🎧 Tune in now and learn how to protect what matters most—your personal privacy.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Mark’s LinkedIn Profile:

    https://www.linkedin.com/in/markfweinstein/

    Mark’s Twitter (X) Profile:

    https://twitter.com/markweinstein

    The Book – Restoring Our Sanity Online – A Revolutionary Social Framework

    https://www.markweinsteininventor.com/book

    Mark’s Tedx Talk:

    https://youtu.be/NAprT6hh33Y?feature=shared

    Mark’s Website:

    https://www.markweinsteininventor.com/

    About Mark:

    https://www.markweinsteininventor.com/about

    Speaking:

    https://www.markweinsteininventor.com/speaking

    Press Coverage:

    https://www.markweinsteininventor.com/press

    続きを読む 一部表示
    1 時間 16 分