Cyber Distortion Podcast Series cover art

Cyber Distortion Podcast Series

Cyber Distortion Podcast Series

By: Jason Popillion CISSP and Kevin Pentecost CISSP
Listen for free

About this listen

Jason and Kevin, seasoned Cyber Security professionals, explain cyber security concepts that everyone needs to know in simple terms. They will leave you with practical takeaways you can use to keep yourself and your organizations safe. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Manager for a Manufacturing company.Jason Popillion Politics & Government
Episodes
  • S4 - Episode 010 – The Making of I AM MACHINE – w/Chris Glanden & Len Noe
    Sep 12 2025
    Description: In this compelling episode of the Cyber Distortion Podcast, hosts Jason sits down with the extraordinary trio behind the groundbreaking documentary I AM MACHINE — a deep dive into the life and mission of transhuman white hat hacker, Len Noe. Known for merging biology with embedded technology, Len’s journey into transhumanism is as provocative as it is visionary. He uses his cybernetic implants not only to push the boundaries of human capability but also as a powerful tool to demonstrate vulnerabilities in both physical and digital security systems. From real-world pen tests to live hacking demos, Len’s ethical hacking blurs the line between man and machine — all in the name of education and awareness. Joining the conversation is director Chris Glanden from Barcode Security, who provides insight into the creative vision behind the documentary and how the concept was brought to life. Kevin, who also served as the film’s editor, gets put in the hot seat by Jason to share his unique perspective on shaping the story from raw footage to finished film. Together, the team explores the challenges, inspirations, and revelations involved in documenting such a futuristic and deeply personal subject. Whether you're fascinated by transhumanism, cybersecurity, or the art of storytelling, this episode unpacks the making of I AM MACHINE from concept to screen — and everything in between. Here are several good resources for listeners to learn more about embedded technology, ethical hacking, and to visit the sites you mentioned. I’ve grouped them by topic so you can explore what interests you most: 🔌 Embedded Technology Resources TI Developer Zone – Embedded Development Texas Instruments provides hardware + software development tools, demos, software libraries & example projects to help developers get started with embedded systems. (Texas Instruments) Embedded.com – Hands‑On Experience Articles, webinars, and practical labs for embedded tech, sensors, microcontroller work – great for seeing how embedded software and hardware interact in real world applications. (Embedded)Embedded Artistry – Resources A curated set of articles, tutorials, libraries, podcasts, and community content for both beginners and those with more experience. Offers insight into best practices, architectures, hardware/software integration. (Embedded Artistry) STMicroelectronics IoT / Embedded ML Platform Free educational resources around embedded systems + machine learning, helping bridge the gap between raw hardware and AI / intelligent embedded systems. (STMicroelectronics)“Awesome Embedded” (Adafruit’s curated list) A big collection of blogs, code, tools, designs, hardware boards, etc., all focused around embedded systems & related tech. (blog.adafruit.com) 🛡 Ethical Hacking / Cybersecurity Resources TryHackMe A platform with guided, hands‑on labs for ethical hacking, useful for beginners and intermediate learners. Offers real‑world style challenges. (slickhacker.com)Hack The Box (HTB) More advanced penetration‑testing style labs and “boxes” that you can hack in a safe environment. Great for up‑skilling. (slickhacker.com)OWASP (Open Web Application Security Project) Very well‑regarded project that publishes tools, frameworks, cheat‑sheets, open source projects (e.g. WebGoat, Juice Shop) and guidance on securing web apps. (slickhacker.com)GitHub — “Awesome Ethical Hacking Resources” repos Repositories like vadymurupa/ethical‑hacking‑resources or hassnainfareed/awesome‑ethical‑hacking‑resources gather lists of books, courses, vulnerable machines, tools, write‑ups, etc. (GitHub) Cyberly Tutorials, guides, and free content on cybersecurity, ethical hacking, privacy, and emerging threats. Great for self‑paced learners. (cyberly.org) 🌐 Websites You Should Definitely Visit I AM MACHINE — https://i‑am‑machine.com The official website for the documentary. Includes information about Len Noe, embedded tech, screenings, news, trailer, etc. (assumed from context).Cyber Circus Network — https://www.cybercircusnetwork.com The network behind Cyber Distortion Podcast and related content. Good place to get more episodes, background, community, and related materials.
    Show More Show Less
    1 hr and 15 mins
  • S4 - Episode 009 – Codewaves Rising – Surfing Latin Americas Talent Tide (w/ Roger Einstoss)
    Aug 7 2025

    Description:

    🎙️ New Episode Alert – Cyber Distortion Podcast 🚨
    Welcome back! In this episode we're diving deep into one of the most pressing challenges in cybersecurity: finding the right talent. Join us for an eye-opening conversation with Roger Einstoss, co-founder of Braintly, a company revolutionizing how organizations source cybersecurity professionals from across Latin America. With decades of experience and a sharp eye for global tech talent, Roger shares insider knowledge on tapping into thriving hubs like Argentina, Brazil, and beyond.

    We explore how Latin America is rapidly emerging as a hotbed for skilled cybersecurity professionals—and why North American companies are increasingly turning south of the border for outsourced expertise. Roger walks us through Braintly’s unique approach to vetting and placing top-tier talent, the challenges companies face in scaling their security teams, and why understanding cultural fit is just as crucial as technical skills.

    Whether you're a CISO looking to grow your team, a tech leader exploring nearshoring options, or simply curious about the evolving cybersecurity workforce, this episode delivers both practical insights and global perspective. Roger's passion for empowering Latin American professionals and building cross-border partnerships is not only inspiring—it’s exactly what the cybersecurity industry needs right now.

    🔗 Don’t miss this one—subscribe now and tune in to the Cyber Distortion Podcast on your favorite platform.

    Connect with Roger here: LinkedIn – Roger Einstoss

    🎧 Featured Guest: Roger Einstoss

    • LinkedIn: https://www.linkedin.com/in/rogereinstoss
    • Twitter/X: (Not publicly listed, but you can search or ask Roger directly)
    • Company Website (Braintly): https://www.braintly.com
    • Braintly on LinkedIn: https://www.linkedin.com/company/braintly

    🌎 Explore Braintly

    Braintly helps companies worldwide connect with top-tier tech and cybersecurity talent across Latin America.

    • 🌐 Homepage: https://www.braintly.com
    • 🔍 Services Overview: https://www.braintly.com#services
    • 📩 Contact Braintly: https://www.braintly.com#contact
    • 📘 Braintly Blog (if available): (Currently no blog listed on homepage—check for updates)

    🧠 Learn More: Latin America's Cybersecurity Talent Landscape

    Here are some external resources you can reference or share to expand on the discussion:

    • 📈 "Why Latin America is the Next Frontier for Tech Talent" – TechCrunch
      https://techcrunch.com/2021/08/24/latin-america-tech-talent
    • 📊 "Cybersecurity Workforce Study" – (ISC)² 2024
      https://www.isc2.org/Research/Workforce-Study
    • 🌍 "Nearshore Outsourcing Trends in 2025" – Nearshore Americas
      https://nearshoreamericas.com
    • 🗺️ "Top Tech Hubs in Latin America: Argentina, Brazil, Mexico" – Globalization Partners
      https://www.globalization-partners.com/blog/tech-hubs-latin-america
    Show More Show Less
    1 hr and 2 mins
  • S4 - Episode 008 – Unleashing Your Inner Hacker (w/ Ted Harrington)
    Jul 29 2025
    This episode welcomes Ted Harrington, a celebrated ethical hacker, TED‑X keynote speaker, and executive partner at Independent Security Evaluators (ISE). With decades of real‑world experience hacking everything from iPhones and cars to medical devices, cryptocurrency platforms, and password managers, Ted brings unmatched expertise to our conversation. He’s built a reputation for uncovering hidden vulnerabilities, helping clients such as Google, Amazon, Netflix, Microsoft, Disney, and Adobe to fix tens of thousands of security flaws—demonstrating why no system is truly unhackable. In this episode, Ted walks us through his journey from early penetration testing to leading elite security research. We discuss the lessons from Ted’s two influential books: Hackable: How to Do Application Security Right and Inner Hacker. Hackable guides developers, executives, and security teams through building threat models, finding and fixing vulnerabilities early in development, and integrating security into code and culture so organizations can earn trust—and sales. Inner Hacker delves deeper into the hacker mindset: how curiosity, creativity, and rule‑breaking thinking can be applied, not only to cybersecurity, but also to entrepreneurship and personal growth. Finally, Ted reflects on his TED‑X talk “Why You Need to Think Like a Hacker” and delivers ideas from his keynote programs—inviting listeners of Cyber Distortion Podcast to embrace four hacker traits (curiosity, creativity, persistence, and nonconformity) and use them to out-think attackers, address novel threats like AI‑driven deepfakes, and build stronger systems and teams from inside out. Tune in to enjoy a lively, illuminating mix of war stories, strategic insight, and actionable takeaways from one of the most trusted voices in ethical hacking today. CITATIONS & LINKS: 🎙️ Official and Authoritative Links Ted Harrington’s official website (home page) – the main hub for his bio, speaking, books, and more https://www.tedharrington.com 📚 Buy Ted’s Books Purchase Hackable: How to Do Application Security Right on Amazon (ebook/print) – direct link for buying online https://www.podchaser.com/podcasts/hacker-valley-studio-889742/episodes/think-like-a-hacker-solve-like-234696483?utm_source=chatgpt.comPre‑order Inner Hacker (anticipated Summer 2025) via official site waitlist page https://www.tedharrington.com/inner-hacker?utm_source=chatgpt.com 🎤 Talks and Keynotes “Why You Need to Think Like a Hacker” TED‑X Talk – video available via Ted’s speaking page https://www.tedharrington.com/speaking?utm_source=chatgpt.comHacker Valley Studio episode: “Think Like a Hacker, Solve Like a Leader” featuring Ted Harrington – show notes & episode link from a popular cybersecurity podcast https://hackervalley.com/e/think-like-a-hacker-solve-like-a-leader-featuring-ted-harrington?utm_source=chatgpt.com 🎧 Other Podcasts & Interviews Social‑Engineer.com Podcast Ep. 172 – “Creating Psychological Salt” – Ted Harrington joins Chris Hadnagy to discuss security awareness and his book Hackable https://www.social-engineer.org/podcasts/ep-172-security-awareness-series-creating-psychological-salt-with-ted-harrington/?utm_source=chatgpt.comHuman Factor Security Podcast Ep. 153—Ted Harrington interview – on security as a business advantage, Hackable, and real‑world anecdotes https://humanfactorsecurity.co.uk/episode-153-ted-harrington/?utm_source=chatgpt.com 🔗 Professional Profiles & Media Ted Harrington on LinkedIn – connect and follow his professional updates (often referenced in podcast show notes) hackervalleystudio.podbean.comPodchaser “Cybersecurity Videos” section on his website – demo reels, hacking case studies, keynote previews, and more tedharrington.com
    Show More Show Less
    1 hr and 26 mins
No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.